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"}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r5) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{}, r5, 0x14, @inherit={0x58, &(0x7f0000000180)={0x1, 0x2, 0x20, 0xffffffffffff496c, {0xc, 0x1, 0x0, 0xff, 0x80000001}, [0x9, 0x9]}}, @subvolid=0x75f968a}) r6 = dup(r1) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) (async) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@fscache}, {@aname={'aname', 0x3d, '$'}}], [], 0x6b}}) (async) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:18:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 246.453575] erofs: read_super, device -> /dev/loop5 [ 246.459102] erofs: options -> fault_injection=0x0000000000000001, [ 246.475688] erofs: FAULT_INJECTION was not selected [ 246.483275] erofs: read_super, device -> /dev/loop4 [ 246.488300] erofs: options -> fault_injection=0x0000000000000001, [ 246.499088] erofs: read_super, device -> /dev/loop0 [ 246.504115] erofs: options -> fault_injection=0x0000000000000001, [ 246.513338] erofs: root inode @ nid 36 [ 246.517797] erofs: bogus i_mode (0) @ nid 36 [ 246.524148] erofs: FAULT_INJECTION was not selected [ 246.546961] erofs: cannot find valid erofs superblock 17:18:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:30 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001840)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x9) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='Y', 0x5e}], 0x1, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdf8c, 0x6c}, 0x0, 0xfff, 0x0, 0x4, 0x40000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @vsock={0x28, 0x0, 0xffffd8ef}, @generic={0x2b, "d415ae6a529376cef0472486acaa"}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='syz_tun\x00', 0x300}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000400)={{}, r5, 0x0, @inherit={0x88, &(0x7f0000001880)=ANY=[@ANYBLOB="5252beec3e4b830a1f82bcd4226625fe1e8e64ede806c86186e29bdeae462cd574c0341712cfbbc2d84989272f98ecf068e02c51f885939c7c6a2999dc77b272faccff8acc3ae82d75894b95c631e68032c44e6cc81a21ee41ecebe8cec0ef5578de89f441b1e17eff7f694c30e07c0922916f73e7ae589dc119429d43bad397a97336570ad366f779d940b5a99ea30c16feb809710deca18de5cfe3972ed7696f119b6696c8eb348dd1766e0b7cde343772df1f167c0834311e3a24b15d7aa2dad8b047b7da6447240b68b1f485b7fb110c4e83d0e455e08baa7dc2a33f49d7fc133c3717532eb0a28ad1391842"]}, @name="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"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{r2}, r5, 0x4, @unused=[0x0, 0x2, 0x835, 0x8], @subvolid=0xbc4}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000180)={{}, r5, 0x14, @inherit={0x70, &(0x7f0000001980)=ANY=[@ANYBLOB="01000000000000000500000000000000200400000000000005000000000000000900000000000000f7ffffffffffffff01000000000000000400000000000000b70c000000000000f8ffffffffffffffff070000000000000703000000000000080000000000000000002b93469732feda3d6b4d6b08e4212c47cd491c4bd6042e58870bcd79d161efd5b221728c61b0490c7c5962e8525ef50b052c1c70a214c9bc77ef303236b5c18044066a615194009555c6259e5c696f917694c0c2ee2230115317489b82d00c3a29e79f3533f7d476f73b9d9c8233d2f976908b479c21fd20877297a0d902c38bb770074ba7036e65a3db9efa3bd24b7af1de02427b301608d50c34f0337346fdd3a367408154dead111d4b2ae518049c42c65dd66aea00f1e51b78c4f7bc81f58b0b1e5c27885f370dd22802e41a132bb56ee8a1fe40e61f49971a958837e6a95f62af0463ecbb9e8c4c217e5568"]}, @name="b9e2763a8072b43e4490998ea34fa4281a1ab196ca1aa9f1be4130b3be384bea850b58a224a00239265cd7b59eb2e5b4733f9e3fd7e271b6264e09f8e17cd5e7cea8c0852de676ab2c8a4448c81f463aa68b20c442fd1435025581532bc57140fe82885cd75671b28f24fe968216e09dff885accc4aebd8a73fb82d388086fa1df43b8f6554fcce30ce6cdcef7f3f91b938922a1b780427231562af6e321da050a8c4735688c96baf54df71bf123e2c34799dc30dee9cd4d4938969c4f0b6e66a7f5fa74301d462f146f7c1ef08c2423229a8cfa6844d56dbb3544bc1956cc198f3a9783ca8e9cf20067898aa0c31c60decc3221e0dab153c5bc35bab4ef45dd859b5d3c6239f99080599aa90b40c627dbae5663541e1293407fc40c9796adf8352ee2f7b03bb5a9f83bddbc2a8942cd3530d1dda119139a697f636d8bf0c4c124d5456ff8c786eb6d9e604af7fa7603af0a998bd15c243127401f74f8d8cbbf059c9fb18a4096759feda0256819fd1959b7fef96ef1dd89fe06ef1228d3c9ef5606122eae148631d3140f694295c11ceffff24387140bef07485b8d0798ad722ab7108be17068271dab049650418eccec6fe4eb0499a5698ed5477a0dd3e97461bac5a844673df158157d5fa72aa45cd168dc211726f5287fbbb80102f91203ed399ce2a42bbc10381be219aa877b9acad1e378e0e08aeea58c886b14f5e228528ef77a894f81756a90940cd6d22a136362bf6cd8223cecb500cd0a0dc5079f9e89204becf03b88dab39a01c40e898bb7367bdc2e1d50a7d8673a7722be9fcafc54be753dbf2c0df9aa104e98ea8f010724597047da0f9b550f95e601e08f30e525441afe859b68c2c0cfc3c49c01e5d9b7326acc343254b7d0a15f5eb3048325b159229a702a04e5d5bb8dc40e873d2ef546e9111fcbac80dd0df0e6177c8fc5af852029fdbf37794c9024ac4ed354fd4a7c5289f5a56b7d9fff305cc2818d4e75ccbc41764c358d8c6cc990ed71e8fcbb87895701f2b0ecdae9066817cc83a0895e3270e30a010e4c8ab0f5fc15a68d0fdb5363e69eed666211c53b858c862612064c04779b803c9ca8798ff6b92ac22fbed564569dcaad012de4174438d2095dd6f08a1e51505c321ebe9631e92a392b84888fc25ef7bd1e70b458902819c64fba456acb10510f61f2da3b3e1f7d962f769e50ee13f2c92e64c43ddec7149d6461bca9416b90f5f0b9a126c7086bdf3b8998381118dce886cc675971953614bcaee2a582dd2b8f948ccbe8a08139b4f68ffb3bad0a93834942467e88d0ab1374643eb1970a384be02704eb5c1b2c9a5f3b567d4e2fe67899c188fd770dd8f09dfc07931f6a45591dc567495adcda444c6f3aad1f004a3c7d9e949c5addc8ee0fea359ddd33c6c5fb442b9b2a33bb8393cde6467bd2114a69d99248a26e3f5e9e9bbcc3cc0ebc996bf96206c95179f60bfd0be5aae029558316b64d796a1ae487d8033da147f5e02a60d40ebca10a3ae67fed177f46d00c153321b7a935d663d50e28b44bd29612a0381a3bd32af2eaa9c79b26f4b9b5dd97cc06cf1d67720c8ea9ffeed2637e825d3b3b9768f22a775dd139dfe62e2090c2fac6662e67a6f4ff8775897499f28f83879175e3fc4c6d8f98dd00f62ab592c90bae8a876a7d8e726cccbb68ba033e9497db300d8ad7d06de4ac19c1336048e0c629e47b8d0051de793adc18b6f2a7475c8524fe5de78f2207c83bc6732115fa7c231b4ddd018c9e6f09abd823e520f70a62a324970bbd35f9fb546889b3a3d2ec2a4318b9f86b08b3f7e306b34c5eda8e86e01cf66c8adbf124b169378b5c989b56248857a0efc2c73e8131e06eb6c14ca7a4bf6167d56c112f05305234d0ca30c8ebda3f41949918efd12181551d97c6281dcd4fc3e63f28710f533939f9246673a0c8595104f0f5cc12c174f55286115cfc88482aa1cb640d558b9d117faf41537fcf3bfb884d4d5b5831378b53ae8091f85058a1d178871638e76b5711ff37df229efcc29c27d503a81047391684a347ecaa0501ac0410bdbbce5a8432a258d5b9f822273b32298eee845128500181ecf1ece66c3cda77b14bf5f49e7874afb6f6ba3472a43e05ad4a18f202b6a2c565c49c8791f71b9aaab7b56ba72f633d88eb73d0aa802173aa935fa1d494cbd6d7875e445357a65f304513ed2be61f638bfeeef5e60987e284431cae90a92200e4b100639bed5efc745e817c1ceb5455e90181875076c0a1af0c39f7172f15f5ccf21e96c3d4617f5e6ba433cbbff7290fcb8b0dae6182fbec3d1d10d2a5f3876d3cf241505c01fcdb76f3ebc979693c5fd566a32db27acea2ae9d817e3ce084500f21d975e2073b65db9f0143a187cf383a2e26bc76dfa13c620b7d7ef8491a73b34d90e76c63c2fcf762c525d0e38b7364541c128f5503fe8f1f4cdde16eddf03eab2399850d6c09741ca5e1eb4bc7e81a5893db6bc3500026e5e7842100052599f307a2013c1b05a474ce85ccc25050ed2f19160464e7551371b9aa3bc63e6e95764aa11764ce8d6bc7bfe9b55af5bb52155f9632d0e03b49fb05947343a487895cd58508114f1d4bb73ec48a26461b328f02f03a5c67a84d82679d14f6b7f80d988c44856fbcf61796ec9aea1b4039e4ac1701cb885863651ef092a54d7d0a2bc1f7978952a7ad5575a96c6b404aabf59492301223407d0d5661a18ac510e01e37cd7899c3a9d4d201d152486ca96f2b4f626e0ffaf70d865cf41fda67b0ed058af20dfb9f51b18f9b4577a25ebcbb3b0c9e95d7622fd5bd6c5717abe23f87fcad7ebeddf362598a2c30cc8d23c15dbf79a7abe6d269c43aaba8f9906cdcc03873f96554f3da89e7913df88359e027c396b6a3c9d740c315ebade5096f093dfaf330c51a1421a2236df6ec4d949cf867b89e86d341f3bc12bcf010ea3746e6a839819c71a9822c303d9a7e0822f99b42bece79c30ebf9a363db9f566508b0ab7ba21fa0bd4071e5db9299600527ea36cdd430d66f91a4f55b96b8066c0f3c89729006fa82bb89d77524ad7b108d87cf820a7011e6bd7ebca0406528e6b25fbac592f808e0f989fff8a734df6e0ae1162a58744393a72b60dc91800673e399c8ec11237cf8e5962b1ba28b41704767b7813385390f78b8fcf9f6eea6a29cbf9ad7c5cfb97d33da6c8a935d180e84115ed9fda3038ac9511f60bab6cac1174d07e99ee89b3223744633cef498060a516ef5f2f7045f6303d94650f35429ecc9374537d22068cd33725da117ec895e26e911605c01b1e13b0c2704bd85a2b84daa48a5123943f4a67d9b79ddc5bb220613f3b15ed60c1a9a91218c2bc7f0e47928e4960d0b6df13630f05c285b7b7a1793ad1d0255ef3291b901763645d3fc11419b67f5b713487851715a321db5b7b46ddf7bf3340896702997de6bd1a569062d8cda5b0136e8922a208c89078d487588aaf496addf6b7e52167278743aed9bcaaeee90db4f5308a4dfa64021ca7771e48a6c3debf28f1be81a24ccd01950ea13c70aac2a637a4e104780cda2ab4d5c08d40ac6f1fd7514bfd2a4bc09690c95f4cbb1774f3e1806812c75df3d955819f1fe107fe84aa2fbea0585bcab0314daba1e16d2b1096a7bfd8d9dcb293fe5907a013e85484366191a37df2bd60081cdf1b10d4e3b47e779dddf23dd8fb1b8843534b3638f6fd03841381b12e48387359d439a169e13a4b913a501146155f360a2845ec2aa7f6a2284fbdeaccf5c1f49b6d6b97eb3a7f954d888603b0f9fa3728ccb83d529c64f1994107258e592141237f5e9430dcc2b5984033fcefe013f1d320a64669bed209c05f5cfd2fe104df3e12aba9553fe415159e4bfe28d9c252459aeefc5007ce448643b97bcac310700f4749156b0a78c66810cb79fed6da1106c2e472c92d7e236fe50aca9b4550b0821abdc03b7eb87751d6707741a145a22b05d40050ae66988d322bc8c43113f110613218d78cdd0de179c80c73ce27acc6bed935fe229c25765f47c347db5ef80783fd0e7f28c2dc293ad94f72a5a21e097ef6400d8f49906ea9885fe9ea6fec07dd42d5e95a2d4167c002ca328eed4e62b804a9e65f1177dff64a8553e4e1f3ab5ea567f3b67b2ec803603bb361d82f86b2732bb2094d3058bed45e5edb7dd5dcb31edbd191e7ccca51dfe380407983805f944cf4f2866bc8b102f07bfd28a6801c8076fd48d13618c522e2b5e6837d1a10e2d0074869ffa52c02b05c679ad76bfc19496d848e545c9be6da56263f564d06067c55f4717a5fe6f7899354673ce9d468948538b7a0c677ae9b4270cda83a3164289e31369e99b9fdf8bbf07a014d1aefe2b446dff0e587962ee56ca9313ab62411d8ff7e9c8f83c6960d08ddc9e937699bdc36c77d2aee6c22eefbb11f8548306c2e577a0ed954869ae5036e026bc5956a34ee10b2a335067c393f6b0f0ce8e44059948aece2c01ccc7b63dc99f044262fba7d07d150b8d2fc19523ee993be47faec2a170cd246f51d9cbb7db74b968756e03181eb0e4afbac5a7a64c12927e956d1ce956bdf4b020d2cb8b4d258b900fe2d2f3d17a618c24805db3433cfc509aa1ef3ebfa85d5afeed876db1eeb85a7ce0a87deb7882c30b2a9569fc3a424396be6d275279663c17433786762d6ac9b375918aa0aba93e2e76aa6453a5c8f1bd152584177002275dd7d464f0bbae5dab96782464b3de4b826d17e42c09b3c163fe9838a66349e0261f2f6dcb87884cb901b50c5e7ad5afcc46de81ae48bcda932c95a59366234b807673fab333a43086bebe6cfcce44acbc83b2ba699073fc5e6199a869de4cefecbae4c317c703e01bbcd37a26b65abcc8f9ba30fa257c979245156a37d30987c19d8774a466d91cdc723af064147ab9568c23fda873542d794e629c1f09497aae596ca666b9e6bfdd3b0ff10fd2ce216349c1a07178b5c63e75e3ea71c0df19e162de7cedf92752dfc619921b3fde611624fb0a662d15eb15ad858b836755c8b8f8d262b7b76c2ff0afdcd9f4078764742b5adfbe8c26bf88f2ae08473bbbc835de5924cc657dd061819248f593c22052ac400c46a1c9db6e201d182ec783f94148e6c55aebcb48584c477d8e6021b795988314c2abf7f0121848cca25cda4e48f18d52403b8f3622f6b81fb1fae11cffb7734e7e6649e6ba69d21846886e24287b8b52cf4b3f6217a2df98b6c257bfde438577e6c32954fd9bb4bd331ef2b42da98786cf9d9c065555a19d3cd6c9dba6b158997d08e9dfdfb1f9ebee095cd457b6b3141454ccbad0b83f6dc64269a13e42402d9725483ac56683bebf2bd48af929778b3f75bb18c1d64650ff8d5e0edb7686bd0629dd96f192779a5f3faf303ae1ecc68f2f958b4918b5943c6817009e509f2e754a36018d0d992397f8b7b8473fb6a7f54a2c36a25be67f72a8c7e05893919c51b8b6088240b041f152fec11dda19f1eaff0c36cc169df880b19a8f13d6b2d2ffad2f5206b563a9f6e4ac390add1f09423d65ab75b392f9785b8af8c4e365e108093d3c5b488acf8fc4223ef4d41c740a2cc3f58d329e46dc14c3e081405fb75c830c9360bfeb75fbf0b28ddefda1410f6f1fe256a2a8033808cebf0b0c2b25cf8c683f32fb0b44f360225a422abc1bdd1149709e9e2ee6ba22b619580a612ca488412b2c6a60a94c0332466c231"}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r5) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{}, r5, 0x14, @inherit={0x58, &(0x7f0000000180)={0x1, 0x2, 0x20, 0xffffffffffff496c, {0xc, 0x1, 0x0, 0xff, 0x80000001}, [0x9, 0x9]}}, @subvolid=0x75f968a}) r6 = dup(r1) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@fscache}, {@aname={'aname', 0x3d, '$'}}], [], 0x6b}}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) (async) pipe2$9p(&(0x7f0000000240), 0x0) (async) write$P9_RVERSION(r1, &(0x7f0000001840)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x9) (async) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='Y', 0x5e}], 0x1, 0x0, 0x0) (async) ftruncate(0xffffffffffffffff, 0x3) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdf8c, 0x6c}, 0x0, 0xfff, 0x0, 0x4, 0x40000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @vsock={0x28, 0x0, 0xffffd8ef}, @generic={0x2b, "d415ae6a529376cef0472486acaa"}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='syz_tun\x00', 0x300}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001640)) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000400)={{}, r5, 0x0, @inherit={0x88, &(0x7f0000001880)=ANY=[@ANYBLOB="5252beec3e4b830a1f82bcd4226625fe1e8e64ede806c86186e29bdeae462cd574c0341712cfbbc2d84989272f98ecf068e02c51f885939c7c6a2999dc77b272faccff8acc3ae82d75894b95c631e68032c44e6cc81a21ee41ecebe8cec0ef5578de89f441b1e17eff7f694c30e07c0922916f73e7ae589dc119429d43bad397a97336570ad366f779d940b5a99ea30c16feb809710deca18de5cfe3972ed7696f119b6696c8eb348dd1766e0b7cde343772df1f167c0834311e3a24b15d7aa2dad8b047b7da6447240b68b1f485b7fb110c4e83d0e455e08baa7dc2a33f49d7fc133c3717532eb0a28ad1391842"]}, @name="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"}) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{r2}, r5, 0x4, @unused=[0x0, 0x2, 0x835, 0x8], @subvolid=0xbc4}) (async) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000180)={{}, r5, 0x14, @inherit={0x70, &(0x7f0000001980)=ANY=[@ANYBLOB="01000000000000000500000000000000200400000000000005000000000000000900000000000000f7ffffffffffffff01000000000000000400000000000000b70c000000000000f8ffffffffffffffff070000000000000703000000000000080000000000000000002b93469732feda3d6b4d6b08e4212c47cd491c4bd6042e58870bcd79d161efd5b221728c61b0490c7c5962e8525ef50b052c1c70a214c9bc77ef303236b5c18044066a615194009555c6259e5c696f917694c0c2ee2230115317489b82d00c3a29e79f3533f7d476f73b9d9c8233d2f976908b479c21fd20877297a0d902c38bb770074ba7036e65a3db9efa3bd24b7af1de02427b301608d50c34f0337346fdd3a367408154dead111d4b2ae518049c42c65dd66aea00f1e51b78c4f7bc81f58b0b1e5c27885f370dd22802e41a132bb56ee8a1fe40e61f49971a958837e6a95f62af0463ecbb9e8c4c217e5568"]}, @name="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"}) (async) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r5) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{}, r5, 0x14, @inherit={0x58, &(0x7f0000000180)={0x1, 0x2, 0x20, 0xffffffffffff496c, {0xc, 0x1, 0x0, 0xff, 0x80000001}, [0x9, 0x9]}}, @subvolid=0x75f968a}) (async) dup(r1) (async) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) (async) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@fscache}, {@aname={'aname', 0x3d, '$'}}], [], 0x6b}}) (async) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) [ 246.555453] erofs: root inode @ nid 36 [ 246.560216] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:30 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:30 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001840)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x9) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='Y', 0x5e}], 0x1, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdf8c, 0x6c}, 0x0, 0xfff, 0x0, 0x4, 0x40000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @vsock={0x28, 0x0, 0xffffd8ef}, @generic={0x2b, "d415ae6a529376cef0472486acaa"}, 0xf0f4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='syz_tun\x00', 0x300}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r3, 0x50009418, &(0x7f0000000400)={{}, r5, 0x0, @inherit={0x88, &(0x7f0000001880)=ANY=[@ANYBLOB="5252beec3e4b830a1f82bcd4226625fe1e8e64ede806c86186e29bdeae462cd574c0341712cfbbc2d84989272f98ecf068e02c51f885939c7c6a2999dc77b272faccff8acc3ae82d75894b95c631e68032c44e6cc81a21ee41ecebe8cec0ef5578de89f441b1e17eff7f694c30e07c0922916f73e7ae589dc119429d43bad397a97336570ad366f779d940b5a99ea30c16feb809710deca18de5cfe3972ed7696f119b6696c8eb348dd1766e0b7cde343772df1f167c0834311e3a24b15d7aa2dad8b047b7da6447240b68b1f485b7fb110c4e83d0e455e08baa7dc2a33f49d7fc133c3717532eb0a28ad1391842"]}, @name="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"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000680)={{r2}, r5, 0x4, @unused=[0x0, 0x2, 0x835, 0x8], @subvolid=0xbc4}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000180)={{}, r5, 0x14, @inherit={0x70, &(0x7f0000001980)=ANY=[@ANYBLOB="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"]}, @name="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"}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r5) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000380)={{}, r5, 0x14, @inherit={0x58, &(0x7f0000000180)={0x1, 0x2, 0x20, 0xffffffffffff496c, {0xc, 0x1, 0x0, 0xff, 0x80000001}, [0x9, 0x9]}}, @subvolid=0x75f968a}) r6 = dup(r1) write$FUSE_BMAP(r6, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@fscache}, {@aname={'aname', 0x3d, '$'}}], [], 0x6b}}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 246.663109] erofs: unmounted for /dev/loop4 17:18:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 246.691418] erofs: read_super, device -> /dev/loop2 [ 246.700442] erofs: options -> fault_injection=0x0000000000000001, 17:18:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 246.746848] erofs: FAULT_INJECTION was not selected [ 246.763984] erofs: root inode @ nid 36 [ 246.773751] erofs: bogus i_mode (300) @ nid 36 17:18:30 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 246.796408] erofs: read_super, device -> /dev/loop4 [ 246.801807] erofs: options -> fault_injection=0x0000000000000001, [ 246.815845] erofs: FAULT_INJECTION was not selected [ 246.825684] erofs: root inode @ nid 36 [ 246.836673] erofs: bogus i_mode (0) @ nid 36 17:18:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:30 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 246.915296] erofs: read_super, device -> /dev/loop0 [ 246.924961] erofs: read_super, device -> /dev/loop5 [ 246.930442] erofs: options -> fault_injection=0x0000000000000001, [ 246.938021] erofs: options -> fault_injection=0x0000000000000001, [ 246.953228] erofs: read_super, device -> /dev/loop1 [ 246.958274] erofs: options -> fault_injection=0x0000000000000001, [ 246.959717] erofs: cannot find valid erofs superblock [ 246.972182] erofs: cannot find valid erofs superblock [ 246.980843] erofs: read_super, device -> /dev/loop4 [ 246.996957] erofs: read_super, device -> /dev/loop2 [ 247.001687] erofs: options -> fault_injection=0x0000000000000001, [ 247.008160] erofs: options -> fault_injection=0x0000000000000001, 17:18:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 247.015864] erofs: FAULT_INJECTION was not selected [ 247.022115] erofs: FAULT_INJECTION was not selected [ 247.025223] erofs: root inode @ nid 36 [ 247.030893] erofs: root inode @ nid 36 [ 247.033548] erofs: FAULT_INJECTION was not selected [ 247.035746] erofs: bogus i_mode (300) @ nid 36 [ 247.046212] erofs: bogus i_mode (0) @ nid 36 [ 247.048351] erofs: root inode @ nid 36 [ 247.055337] erofs: bogus i_mode (0) @ nid 36 17:18:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 247.247653] erofs: read_super, device -> /dev/loop2 [ 247.262087] erofs: options -> fault_injection=0x0000000000000001, [ 247.279140] erofs: read_super, device -> /dev/loop5 [ 247.284417] erofs: options -> fault_injection=0x0000000000000001, [ 247.285895] erofs: FAULT_INJECTION was not selected [ 247.301231] erofs: read_super, device -> /dev/loop3 [ 247.307037] erofs: root inode @ nid 36 [ 247.314678] erofs: options -> fault_injection=0x0000000000000001, [ 247.321849] erofs: read_super, device -> /dev/loop0 [ 247.327274] erofs: bogus i_mode (300) @ nid 36 [ 247.327348] erofs: cannot find valid erofs superblock [ 247.332506] erofs: options -> fault_injection=0x0000000000000001, [ 247.351287] erofs: cannot read erofs superblock 17:18:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 247.379733] erofs: read_super, device -> /dev/loop4 [ 247.399142] erofs: options -> fault_injection=0x0000000000000001, [ 247.418259] erofs: FAULT_INJECTION was not selected 17:18:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') read$FUSE(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lseek(r2, 0x0, 0x3) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x108}}, 0x50) write$FUSE_INIT(r2, &(0x7f0000000000)={0x50, 0xfffffffffffffff5, r5, {0x7, 0x24, 0x7, 0x82080, 0x4, 0xe, 0x3f, 0x785}}, 0x50) [ 247.426911] erofs: FAULT_INJECTION was not selected [ 247.433021] erofs: root inode @ nid 36 [ 247.441837] erofs: root inode @ nid 36 [ 247.446992] erofs: bogus i_mode (0) @ nid 36 [ 247.455908] erofs: bogus i_mode (0) @ nid 36 17:18:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') read$FUSE(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lseek(r2, 0x0, 0x3) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x108}}, 0x50) write$FUSE_INIT(r2, &(0x7f0000000000)={0x50, 0xfffffffffffffff5, r5, {0x7, 0x24, 0x7, 0x82080, 0x4, 0xe, 0x3f, 0x785}}, 0x50) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') (async) read$FUSE(r0, 0x0, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) lseek(r2, 0x0, 0x3) (async) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) (async) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) (async) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) read$FUSE(r4, &(0x7f00000021c0)={0x2020}, 0x2020) (async) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x108}}, 0x50) (async) write$FUSE_INIT(r2, &(0x7f0000000000)={0x50, 0xfffffffffffffff5, r5, {0x7, 0x24, 0x7, 0x82080, 0x4, 0xe, 0x3f, 0x785}}, 0x50) (async) [ 247.540230] erofs: read_super, device -> /dev/loop5 [ 247.545539] erofs: options -> fault_injection=0x0000000000000001, 17:18:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c04100007400000000000000ffffff", 0x13, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 247.585664] erofs: cannot find valid erofs superblock 17:18:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') read$FUSE(r0, 0x0, 0x0) (async) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lseek(r2, 0x0, 0x3) (async) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) (async) read$FUSE(r4, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50, 0x0, r5, {0x7, 0x1f, 0x0, 0x108}}, 0x50) (async) write$FUSE_INIT(r2, &(0x7f0000000000)={0x50, 0xfffffffffffffff5, r5, {0x7, 0x24, 0x7, 0x82080, 0x4, 0xe, 0x3f, 0x785}}, 0x50) [ 247.665644] erofs: read_super, device -> /dev/loop3 [ 247.667820] erofs: read_super, device -> /dev/loop2 [ 247.672057] erofs: options -> fault_injection=0x0000000000000001, [ 247.686880] erofs: read_super, device -> /dev/loop4 [ 247.690996] erofs: cannot read erofs superblock [ 247.694524] erofs: options -> fault_injection=0x0000000000000001, 17:18:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 247.712738] erofs: options -> fault_injection=0x0000000000000001, [ 247.720875] erofs: FAULT_INJECTION was not selected [ 247.726278] erofs: root inode @ nid 36 [ 247.732485] erofs: read_super, device -> /dev/loop0 [ 247.737514] erofs: options -> fault_injection=0x0000000000000001, [ 247.740034] erofs: FAULT_INJECTION was not selected [ 247.747291] erofs: root inode @ nid 36 [ 247.758248] erofs: read_super, device -> /dev/loop5 [ 247.771953] erofs: options -> fault_injection=0x0000000000000001, [ 247.778676] erofs: FAULT_INJECTION was not selected [ 247.782440] erofs: bogus i_mode (0) @ nid 36 [ 247.788656] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 247.798877] erofs: root inode @ nid 36 [ 247.803151] erofs: cannot find valid erofs superblock [ 247.813719] erofs: bogus i_mode (0) @ nid 36 17:18:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 1: r0 = getpid() sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpgid(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(r0, &(0x7f0000000000)='loginuid\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lseek(r4, 0x0, 0x3) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r7, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000400", @ANYRES16=r7, @ANYBLOB="00042bbd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x30, r2, 0x605, 0x0, 0x0, {{}, {0x0, 0x6}, {0x14, 0x19, {0x0, 0x7c}}}}, 0x30}}, 0x0) getpgid(r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x820, 0x70bd26, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) 17:18:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c04100007400000000000000ffffff", 0x13, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:31 executing program 1: r0 = getpid() sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpgid(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(r0, &(0x7f0000000000)='loginuid\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lseek(r4, 0x0, 0x3) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r7, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000400", @ANYRES16=r7, @ANYBLOB="00042bbd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x30, r2, 0x605, 0x0, 0x0, {{}, {0x0, 0x6}, {0x14, 0x19, {0x0, 0x7c}}}}, 0x30}}, 0x0) getpgid(r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x820, 0x70bd26, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) getpid() (async) sched_setscheduler(0x0, 0x5, 0x0) (async) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setpgid(r0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_open_procfs(r0, &(0x7f0000000000)='loginuid\x00') (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) lseek(r4, 0x0, 0x3) (async) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) (async) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r7, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) (async) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000400", @ANYRES16=r7, @ANYBLOB="00042bbd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x30, r2, 0x605, 0x0, 0x0, {{}, {0x0, 0x6}, {0x14, 0x19, {0x0, 0x7c}}}}, 0x30}}, 0x0) (async) getpgid(r0) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x820, 0x70bd26, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) (async) [ 247.934662] erofs: read_super, device -> /dev/loop2 [ 247.954810] erofs: options -> fault_injection=0x0000000000000001, [ 247.962273] erofs: unmounted for /dev/loop4 [ 247.973267] erofs: read_super, device -> /dev/loop3 [ 247.974206] erofs: FAULT_INJECTION was not selected [ 247.978296] erofs: options -> fault_injection=0x0000000000000001, [ 247.978349] erofs: cannot read erofs superblock [ 247.985024] erofs: root inode @ nid 36 [ 248.001073] erofs: read_super, device -> /dev/loop0 [ 248.016174] erofs: bogus i_mode (0) @ nid 36 [ 248.019273] erofs: options -> fault_injection=0x0000000000000001, [ 248.028185] erofs: cannot find valid erofs superblock 17:18:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 1: r0 = getpid() sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpgid(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(r0, &(0x7f0000000000)='loginuid\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lseek(r4, 0x0, 0x3) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r7, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000400", @ANYRES16=r7, @ANYBLOB="00042bbd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x30, r2, 0x605, 0x0, 0x0, {{}, {0x0, 0x6}, {0x14, 0x19, {0x0, 0x7c}}}}, 0x30}}, 0x0) getpgid(r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x820, 0x70bd26, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) getpid() (async) sched_setscheduler(0x0, 0x5, 0x0) (async) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setpgid(r0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_open_procfs(r0, &(0x7f0000000000)='loginuid\x00') (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) lseek(r4, 0x0, 0x3) (async) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) (async) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r7, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) (async) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000400", @ANYRES16=r7, @ANYBLOB="00042bbd7000fddbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) (async) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x30, r2, 0x605, 0x0, 0x0, {{}, {0x0, 0x6}, {0x14, 0x19, {0x0, 0x7c}}}}, 0x30}}, 0x0) (async) getpgid(r0) (async) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, 0x0, 0x820, 0x70bd26, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}}, 0x2c}}, 0x0) (async) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) (async) [ 248.111696] erofs: read_super, device -> /dev/loop5 [ 248.116741] erofs: options -> fault_injection=0x0000000000000001, [ 248.143158] erofs: cannot find valid erofs superblock [ 248.186836] erofs: read_super, device -> /dev/loop2 [ 248.192545] erofs: options -> fault_injection=0x0000000000000001, [ 248.207730] erofs: FAULT_INJECTION was not selected [ 248.213836] erofs: root inode @ nid 36 [ 248.217915] erofs: bogus i_mode (0) @ nid 36 17:18:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.253158] erofs: read_super, device -> /dev/loop4 [ 248.258611] erofs: options -> fault_injection=0x0000000000000001, [ 248.269682] erofs: FAULT_INJECTION was not selected [ 248.274791] erofs: root inode @ nid 36 [ 248.280135] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.309402] erofs: read_super, device -> /dev/loop3 [ 248.314891] erofs: options -> fault_injection=0x0000000000000001, [ 248.316824] erofs: read_super, device -> /dev/loop0 [ 248.343058] erofs: options -> fault_injection=0x0000000000000001, 17:18:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x28}}, 0x840) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getmulticast={0x14, 0x3a, 0x200, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) [ 248.359439] erofs: unmounted for /dev/loop4 [ 248.360224] erofs: cannot find valid erofs superblock [ 248.380480] erofs: cannot read erofs superblock [ 248.381367] erofs: read_super, device -> /dev/loop5 [ 248.396255] erofs: options -> fault_injection=0x0000000000000001, 17:18:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x28}}, 0x840) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getmulticast={0x14, 0x3a, 0x200, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) [ 248.410764] erofs: cannot find valid erofs superblock 17:18:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.512475] erofs: read_super, device -> /dev/loop4 [ 248.515637] erofs: read_super, device -> /dev/loop2 [ 248.521472] erofs: options -> fault_injection=0x0000000000000001, [ 248.536103] erofs: options -> fault_injection=0x0000000000000001, 17:18:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x28}}, 0x840) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getmulticast={0x14, 0x3a, 0x200, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x28}}, 0x840) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getmulticast={0x14, 0x3a, 0x200, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) (async) 17:18:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.572957] erofs: cannot find valid erofs superblock [ 248.578281] erofs: FAULT_INJECTION was not selected [ 248.600307] erofs: root inode @ nid 36 [ 248.606000] erofs: bogus i_mode (0) @ nid 36 17:18:32 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_writepages_result\x00'}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000440)='ingress\x00') r4 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24000000) r5 = getpgid(0x0) prlimit64(r5, 0x0, 0x0, &(0x7f0000000000)) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x1c, 0x1, @tid=r5}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x4000000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="00000000000000002e2f26696c653000df068f5667da7d0ea423bccd3a8227c1b74c6b5cdf7363086dbb0aa85ca6683442dfe730185cbf867f7ed0304b5f66fe178dcd544a1b03dc5768fba646632abe9b0a5e9d67f81bc62e7c2d2bde4013862cbc710300000025674d17a74fb0199d96a169dbbf1a67c8e6558117c9d3a2a0015fc0175f1cbcc2a386875f86f298c21e28f74daa13bad916d5ff040bae29bb26adf0288f1f434fa21f3bb807dda97bf77471a7e7f8c535f1c9f3004e9523ea16f4fefba4d1d399661237b22dd4ef0608910aef9effa90cc7041f1e49840dabac50b5eedfd3dd4be516b799dde91e570c2ec57aeb83e89e0eb40a7319258056cd31ad511b827ae4c516193e941beb5e7dbb456b418ecd5cc631ea7aa056695ddfe9fc51d80fd58b52d39dbfe7c45fedcd9fdbea12c36f29e8450ad3aa9158fffe8d65aa985130fba3ded822460ddc7e108d6ad07b06b6edd4fb7cdb5ebec841bb0b49d201957502e4a991693c04bd0aa51cbf69c03d000000000000000000000000000092efcb899f8dfc16d26bc70c21f0d35d86"]) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="034113f014de98a0f7080ec69b1cec6b21b61282656004c1e7234fc9cc62e550acf7b7704642d809961c25dbecc1dd2d0c4fe868fbb11e83c0bb2f45d5dd561c932e2c08c4b015bdf4639d06c258365419e3a782f813a7d530329aac19fa35948d8fa8cb3fdd855b0aea65247173f03bb623949f2aedf79faaa9896400"/137, @ANYRES32, @ANYBLOB="00000000ffffffff000010000c000100696e677265737300"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000002c00270d08000000ff03000000000000", @ANYRES32, @ANYBLOB="00000000000000000c000000080001007533320020000200140005"], 0x4c}}, 0x0) [ 248.645275] erofs: read_super, device -> /dev/loop3 [ 248.646003] erofs: read_super, device -> /dev/loop5 [ 248.651429] erofs: options -> fault_injection=0x0000000000000001, [ 248.657809] erofs: options -> fault_injection=0x0000000000000001, [ 248.670170] erofs: cannot read erofs superblock [ 248.674921] erofs: cannot find valid erofs superblock [ 248.701992] erofs: read_super, device -> /dev/loop0 [ 248.707026] erofs: options -> fault_injection=0x0000000000000001, [ 248.725077] erofs: cannot find valid erofs superblock 17:18:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.797100] nla_parse: 6 callbacks suppressed [ 248.797448] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 17:18:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.838370] erofs: read_super, device -> /dev/loop2 17:18:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 248.879826] erofs: options -> fault_injection=0x0000000000000001, [ 248.944105] erofs: read_super, device -> /dev/loop4 [ 248.959963] erofs: cannot find valid erofs superblock [ 248.970449] erofs: options -> fault_injection=0x0000000000000001, [ 248.977202] erofs: FAULT_INJECTION was not selected [ 248.985642] erofs: root inode @ nid 36 [ 249.013725] erofs: bogus i_mode (0) @ nid 36 [ 249.023163] erofs: read_super, device -> /dev/loop5 [ 249.031618] erofs: options -> fault_injection=0x0000000000000001, [ 249.039252] erofs: read_super, device -> /dev/loop0 [ 249.044279] erofs: options -> fault_injection=0x0000000000000001, 17:18:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000", 0x4, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.067918] erofs: read_super, device -> /dev/loop3 [ 249.073613] erofs: cannot find valid erofs superblock [ 249.079578] erofs: blksize 1 isn't supported on this platform [ 249.085761] erofs: options -> fault_injection=0x0000000000000001, [ 249.093286] erofs: cannot read erofs superblock 17:18:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.231825] erofs: read_super, device -> /dev/loop2 [ 249.237453] erofs: read_super, device -> /dev/loop4 [ 249.246909] erofs: options -> fault_injection=0x0000000000000001, [ 249.254657] erofs: cannot find valid erofs superblock [ 249.262390] erofs: options -> fault_injection=0x0000000000000001, 17:18:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.286056] erofs: FAULT_INJECTION was not selected [ 249.297665] erofs: root inode @ nid 36 [ 249.303753] erofs: bogus i_mode (0) @ nid 36 17:18:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041000074000000", 0xc, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.343957] erofs: read_super, device -> /dev/loop5 [ 249.344472] erofs: read_super, device -> /dev/loop0 [ 249.354660] erofs: options -> fault_injection=0x0000000000000001, [ 249.362387] erofs: read_super, device -> /dev/loop3 [ 249.367415] erofs: options -> fault_injection=0x0000000000000001, [ 249.373217] erofs: options -> fault_injection=0x0000000000000001, [ 249.405917] erofs: blksize 1 isn't supported on this platform [ 249.410327] erofs: FAULT_INJECTION was not selected [ 249.423993] erofs: cannot find valid erofs superblock [ 249.432964] erofs: root inode @ nid 36 [ 249.443078] erofs: bogus i_mode (0) @ nid 36 [ 249.519620] erofs: read_super, device -> /dev/loop2 [ 249.525613] erofs: options -> fault_injection=0x0000000000000001, [ 249.532949] erofs: read_super, device -> /dev/loop4 [ 249.546991] erofs: options -> fault_injection=0x0000000000000001, [ 249.555574] erofs: FAULT_INJECTION was not selected 17:18:33 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r1 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) r2 = socket(0x10, 0x3, 0x0) (async) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_writepages_result\x00'}, 0x10) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000440)='ingress\x00') r4 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24000000) r5 = getpgid(0x0) prlimit64(r5, 0x0, 0x0, &(0x7f0000000000)) (async) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x1c, 0x1, @tid=r5}, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x4000000) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="00000000000000002e2f26696c653000df068f5667da7d0ea423bccd3a8227c1b74c6b5cdf7363086dbb0aa85ca6683442dfe730185cbf867f7ed0304b5f66fe178dcd544a1b03dc5768fba646632abe9b0a5e9d67f81bc62e7c2d2bde4013862cbc710300000025674d17a74fb0199d96a169dbbf1a67c8e6558117c9d3a2a0015fc0175f1cbcc2a386875f86f298c21e28f74daa13bad916d5ff040bae29bb26adf0288f1f434fa21f3bb807dda97bf77471a7e7f8c535f1c9f3004e9523ea16f4fefba4d1d399661237b22dd4ef0608910aef9effa90cc7041f1e49840dabac50b5eedfd3dd4be516b799dde91e570c2ec57aeb83e89e0eb40a7319258056cd31ad511b827ae4c516193e941beb5e7dbb456b418ecd5cc631ea7aa056695ddfe9fc51d80fd58b52d39dbfe7c45fedcd9fdbea12c36f29e8450ad3aa9158fffe8d65aa985130fba3ded822460ddc7e108d6ad07b06b6edd4fb7cdb5ebec841bb0b49d201957502e4a991693c04bd0aa51cbf69c03d000000000000000000000000000092efcb899f8dfc16d26bc70c21f0d35d86"]) (async, rerun: 32) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="034113f014de98a0f7080ec69b1cec6b21b61282656004c1e7234fc9cc62e550acf7b7704642d809961c25dbecc1dd2d0c4fe868fbb11e83c0bb2f45d5dd561c932e2c08c4b015bdf4639d06c258365419e3a782f813a7d530329aac19fa35948d8fa8cb3fdd855b0aea65247173f03bb623949f2aedf79faaa9896400"/137, @ANYRES32, @ANYBLOB="00000000ffffffff000010000c000100696e677265737300"], 0x30}}, 0x0) (rerun: 32) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000002c00270d08000000ff03000000000000", @ANYRES32, @ANYBLOB="00000000000000000c000000080001007533320020000200140005"], 0x4c}}, 0x0) 17:18:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.575417] erofs: cannot find valid erofs superblock [ 249.579785] erofs: root inode @ nid 36 [ 249.597262] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:33 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_writepages_result\x00'}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000440)='ingress\x00') r4 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24000000) r5 = getpgid(0x0) prlimit64(r5, 0x0, 0x0, &(0x7f0000000000)) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x1c, 0x1, @tid=r5}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x4000000) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="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"]) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="034113f014de98a0f7080ec69b1cec6b21b61282656004c1e7234fc9cc62e550acf7b7704642d809961c25dbecc1dd2d0c4fe868fbb11e83c0bb2f45d5dd561c932e2c08c4b015bdf4639d06c258365419e3a782f813a7d530329aac19fa35948d8fa8cb3fdd855b0aea65247173f03bb623949f2aedf79faaa9896400"/137, @ANYRES32, @ANYBLOB="00000000ffffffff000010000c000100696e677265737300"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000002c00270d08000000ff03000000000000", @ANYRES32, @ANYBLOB="00000000000000000c000000080001007533320020000200140005"], 0x4c}}, 0x0) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_writepages_result\x00'}, 0x10) (async) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan0\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000440)='ingress\x00') (async) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24000000) (async) getpgid(0x0) (async) prlimit64(r5, 0x0, 0x0, &(0x7f0000000000)) (async) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x1c, 0x1, @tid=r5}, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000060000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x4000000) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="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"]) (async) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="034113f014de98a0f7080ec69b1cec6b21b61282656004c1e7234fc9cc62e550acf7b7704642d809961c25dbecc1dd2d0c4fe868fbb11e83c0bb2f45d5dd561c932e2c08c4b015bdf4639d06c258365419e3a782f813a7d530329aac19fa35948d8fa8cb3fdd855b0aea65247173f03bb623949f2aedf79faaa9896400"/137, @ANYRES32, @ANYBLOB="00000000ffffffff000010000c000100696e677265737300"], 0x30}}, 0x0) (async) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000002c00270d08000000ff03000000000000", @ANYRES32, @ANYBLOB="00000000000000000c000000080001007533320020000200140005"], 0x4c}}, 0x0) (async) [ 249.670738] erofs: read_super, device -> /dev/loop3 [ 249.673177] erofs: read_super, device -> /dev/loop5 [ 249.676971] erofs: options -> fault_injection=0x0000000000000001, [ 249.688953] erofs: read_super, device -> /dev/loop0 [ 249.693978] erofs: options -> fault_injection=0x0000000000000001, [ 249.708673] erofs: FAULT_INJECTION was not selected [ 249.713889] erofs: options -> fault_injection=0x0000000000000001, 17:18:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.715109] erofs: blksize 1 isn't supported on this platform [ 249.726186] erofs: unmounted for /dev/loop4 [ 249.728651] erofs: root inode @ nid 36 [ 249.736384] erofs: bogus i_mode (0) @ nid 36 [ 249.742920] erofs: FAULT_INJECTION was not selected [ 249.748003] erofs: root inode @ nid 36 [ 249.753321] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. 17:18:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.814107] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 249.859300] erofs: read_super, device -> /dev/loop2 17:18:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 249.889481] erofs: read_super, device -> /dev/loop4 [ 249.897379] erofs: unmounted for /dev/loop5 [ 249.906290] erofs: options -> fault_injection=0x0000000000000001, [ 249.925434] erofs: options -> fault_injection=0x0000000000000001, [ 249.937700] erofs: cannot find valid erofs superblock [ 249.948268] erofs: FAULT_INJECTION was not selected [ 249.949549] erofs: read_super, device -> /dev/loop3 [ 249.958888] erofs: options -> fault_injection=0x0000000000000001, [ 249.976143] erofs: root inode @ nid 36 [ 249.997754] erofs: bogus i_mode (300) @ nid 36 17:18:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.066570] erofs: FAULT_INJECTION was not selected 17:18:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.098532] erofs: root inode @ nid 36 [ 250.123116] erofs: read_super, device -> /dev/loop5 [ 250.128472] erofs: read_super, device -> /dev/loop0 [ 250.146270] erofs: options -> fault_injection=0x0000000000000001, [ 250.158990] erofs: bogus i_mode (0) @ nid 36 [ 250.163837] erofs: options -> fault_injection=0x0000000000000001, [ 250.166161] erofs: read_super, device -> /dev/loop2 [ 250.188618] erofs: options -> fault_injection=0x0000000000000001, [ 250.197121] erofs: blksize 1 isn't supported on this platform [ 250.209784] erofs: FAULT_INJECTION was not selected [ 250.216943] erofs: cannot find valid erofs superblock 17:18:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.232754] erofs: root inode @ nid 36 [ 250.237086] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 250.292728] erofs: unmounted for /dev/loop5 17:18:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.405162] erofs: read_super, device -> /dev/loop4 17:18:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.430018] erofs: options -> fault_injection=0x0000000000000001, [ 250.455664] erofs: FAULT_INJECTION was not selected [ 250.463868] erofs: root inode @ nid 36 [ 250.472916] erofs: bogus i_mode (300) @ nid 36 [ 250.485297] erofs: read_super, device -> /dev/loop0 [ 250.493978] erofs: options -> fault_injection=0x0000000000000001, [ 250.506483] erofs: blksize 1 isn't supported on this platform 17:18:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.546673] erofs: read_super, device -> /dev/loop5 [ 250.552078] erofs: read_super, device -> /dev/loop1 [ 250.552832] erofs: read_super, device -> /dev/loop3 [ 250.557098] erofs: options -> fault_injection=0x0000000000000001, [ 250.557155] erofs: blksize 1 isn't supported on this platform [ 250.583685] erofs: options -> fault_injection=0x0000000000000001, [ 250.584910] erofs: options -> fault_injection=0x0000000000000001, [ 250.616579] erofs: cannot find valid erofs superblock [ 250.616740] erofs: FAULT_INJECTION was not selected [ 250.627616] erofs: root inode @ nid 36 [ 250.634528] erofs: bogus i_mode (0) @ nid 36 [ 250.639210] erofs: read_super, device -> /dev/loop2 [ 250.644237] erofs: options -> fault_injection=0x0000000000000001, 17:18:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.673460] erofs: cannot find valid erofs superblock 17:18:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.784343] erofs: read_super, device -> /dev/loop4 [ 250.789698] erofs: options -> fault_injection=0x0000000000000001, [ 250.796345] erofs: FAULT_INJECTION was not selected [ 250.802519] erofs: root inode @ nid 36 [ 250.806700] erofs: bogus i_mode (300) @ nid 36 [ 250.817034] erofs: read_super, device -> /dev/loop5 17:18:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041000074", 0x9, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.831369] erofs: options -> fault_injection=0x0000000000000001, [ 250.839572] erofs: cannot find valid erofs superblock [ 250.848949] erofs: read_super, device -> /dev/loop0 [ 250.865393] erofs: options -> fault_injection=0x0000000000000001, 17:18:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.879199] erofs: blksize 1 isn't supported on this platform 17:18:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 250.927249] erofs: read_super, device -> /dev/loop1 [ 250.935979] erofs: options -> fault_injection=0x0000000000000001, [ 250.964603] erofs: read_super, device -> /dev/loop3 [ 250.969772] erofs: read_super, device -> /dev/loop4 [ 250.969782] erofs: options -> fault_injection=0x0000000000000001, [ 250.970057] erofs: FAULT_INJECTION was not selected [ 250.994294] erofs: options -> fault_injection=0x0000000000000001, [ 250.995183] erofs: read_super, device -> /dev/loop2 [ 251.007951] erofs: blksize 1 isn't supported on this platform [ 251.011757] erofs: options -> fault_injection=0x0000000000000001, [ 251.020516] erofs: FAULT_INJECTION was not selected 17:18:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.027008] erofs: root inode @ nid 36 [ 251.033149] erofs: cannot find valid erofs superblock [ 251.039749] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 251.076086] erofs: root inode @ nid 36 17:18:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041000074", 0x9, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.102508] erofs: bogus i_mode (0) @ nid 36 [ 251.114112] erofs: unmounted for /dev/loop4 17:18:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.172617] erofs: read_super, device -> /dev/loop0 [ 251.172659] erofs: read_super, device -> /dev/loop5 [ 251.177666] erofs: options -> fault_injection=0x0000000000000001, [ 251.181907] erofs: FAULT_INJECTION was not selected [ 251.188619] erofs: options -> fault_injection=0x0000000000000001, [ 251.190773] erofs: root inode @ nid 0 [ 251.199063] erofs: cannot find valid erofs superblock [ 251.201201] erofs: bogus i_mode (0) @ nid 0 17:18:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.250379] erofs: read_super, device -> /dev/loop2 [ 251.255635] erofs: options -> fault_injection=0x0000000000000001, [ 251.263088] erofs: cannot find valid erofs superblock [ 251.281311] erofs: read_super, device -> /dev/loop4 17:18:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.294829] erofs: options -> fault_injection=0x0000000000000001, [ 251.316359] erofs: FAULT_INJECTION was not selected [ 251.322438] erofs: root inode @ nid 36 [ 251.326663] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 251.337732] erofs: read_super, device -> /dev/loop1 [ 251.365312] erofs: options -> fault_injection=0x0000000000000001, [ 251.375996] erofs: read_super, device -> /dev/loop3 [ 251.377921] erofs: read_super, device -> /dev/loop5 [ 251.382195] erofs: options -> fault_injection=0x0000000000000001, [ 251.387175] erofs: options -> fault_injection=0x0000000000000001, [ 251.408858] erofs: read_super, device -> /dev/loop0 17:18:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.415404] erofs: FAULT_INJECTION was not selected [ 251.424051] erofs: unmounted for /dev/loop4 [ 251.427386] erofs: options -> fault_injection=0x0000000000000001, [ 251.435622] erofs: root inode @ nid 36 [ 251.439800] erofs: blksize 1 isn't supported on this platform [ 251.445299] erofs: FAULT_INJECTION was not selected [ 251.448614] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 251.453795] erofs: root inode @ nid 0 [ 251.459630] erofs: FAULT_INJECTION was not selected [ 251.468025] erofs: root inode @ nid 36 [ 251.470036] erofs: bogus i_mode (0) @ nid 0 [ 251.473363] erofs: bogus i_mode (0) @ nid 36 17:18:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:35 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.597758] erofs: unmounted for /dev/loop5 17:18:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.632757] erofs: read_super, device -> /dev/loop4 [ 251.636496] erofs: read_super, device -> /dev/loop2 [ 251.644460] erofs: options -> fault_injection=0x0000000000000001, [ 251.647642] erofs: options -> fault_injection=0x0000000000000001, [ 251.671620] erofs: FAULT_INJECTION was not selected [ 251.674106] erofs: FAULT_INJECTION was not selected 17:18:35 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.676734] erofs: root inode @ nid 36 [ 251.682490] erofs: root inode @ nid 36 [ 251.703513] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. [ 251.714501] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 251.749673] erofs: unmounted for /dev/loop4 [ 251.786023] erofs: unmounted for /dev/loop2 [ 251.870490] erofs: read_super, device -> /dev/loop3 [ 251.881254] erofs: read_super, device -> /dev/loop0 [ 251.886299] erofs: options -> fault_injection=0x0000000000000001, [ 251.900123] erofs: read_super, device -> /dev/loop5 [ 251.905166] erofs: options -> fault_injection=0x0000000000000001, [ 251.919567] erofs: options -> fault_injection=0x0000000000000001, [ 251.927437] erofs: FAULT_INJECTION was not selected [ 251.953554] erofs: FAULT_INJECTION was not selected [ 251.965556] erofs: FAULT_INJECTION was not selected [ 251.992160] erofs: root inode @ nid 36 [ 252.015363] erofs: read_super, device -> /dev/loop2 [ 252.041907] erofs: options -> fault_injection=0x0000000000000001, [ 252.042264] erofs: bogus i_mode (0) @ nid 36 [ 252.057629] erofs: root inode @ nid 36 [ 252.062256] erofs: root inode @ nid 0 [ 252.073136] erofs: bogus i_mode (0) @ nid 0 [ 252.077579] erofs: FAULT_INJECTION was not selected [ 252.079504] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. 17:18:36 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.090204] erofs: root inode @ nid 36 [ 252.095604] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. [ 252.126659] erofs: read_super, device -> /dev/loop4 [ 252.132183] erofs: options -> fault_injection=0x0000000000000001, [ 252.138567] erofs: FAULT_INJECTION was not selected [ 252.144252] erofs: root inode @ nid 36 [ 252.148336] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.209569] erofs: unmounted for /dev/loop2 17:18:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.261716] erofs: unmounted for /dev/loop5 17:18:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.343610] erofs: unmounted for /dev/loop4 [ 252.377743] erofs: read_super, device -> /dev/loop3 [ 252.383471] erofs: options -> fault_injection=0x0000000000000001, [ 252.395429] erofs: FAULT_INJECTION was not selected [ 252.401379] erofs: root inode @ nid 36 [ 252.405507] erofs: bogus i_mode (0) @ nid 36 [ 252.411736] erofs: read_super, device -> /dev/loop2 [ 252.414826] erofs: read_super, device -> /dev/loop0 [ 252.416763] erofs: options -> fault_injection=0x0000000000000001, [ 252.423915] erofs: options -> fault_injection=0x0000000000000001, [ 252.435763] erofs: cannot find valid erofs superblock [ 252.442751] erofs: FAULT_INJECTION was not selected [ 252.448179] erofs: root inode @ nid 36 [ 252.457987] erofs: bogus i_mode (0) @ nid 36 17:18:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.519308] erofs: read_super, device -> /dev/loop5 [ 252.524642] erofs: options -> fault_injection=0x0000000000000001, [ 252.535370] erofs: cannot find valid erofs superblock 17:18:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.669291] erofs: read_super, device -> /dev/loop4 [ 252.674662] erofs: options -> fault_injection=0x0000000000000001, [ 252.715059] erofs: FAULT_INJECTION was not selected [ 252.731427] erofs: root inode @ nid 36 [ 252.742933] erofs: bogus i_mode (0) @ nid 36 17:18:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 252.769521] erofs: read_super, device -> /dev/loop3 [ 252.774563] erofs: options -> fault_injection=0x0000000000000001, [ 252.785863] erofs: FAULT_INJECTION was not selected [ 252.789448] erofs: read_super, device -> /dev/loop5 [ 252.792145] erofs: read_super, device -> /dev/loop2 [ 252.797332] erofs: options -> fault_injection=0x0000000000000001, [ 252.808250] erofs: cannot find valid erofs superblock [ 252.816409] erofs: options -> fault_injection=0x0000000000000001, [ 252.822072] erofs: root inode @ nid 36 [ 252.828553] erofs: bogus i_mode (0) @ nid 36 [ 252.831311] erofs: cannot find valid erofs superblock [ 252.847762] erofs: read_super, device -> /dev/loop0 [ 252.853429] erofs: options -> fault_injection=0x0000000000000001, [ 252.860402] erofs: FAULT_INJECTION was not selected [ 252.866012] erofs: root inode @ nid 36 [ 252.870884] erofs: bogus i_mode (0) @ nid 36 17:18:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="0500", 0x2, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 253.036335] erofs: read_super, device -> /dev/loop2 [ 253.055016] erofs: options -> fault_injection=0x0000000000000001, [ 253.058125] erofs: read_super, device -> /dev/loop4 [ 253.068174] erofs: options -> fault_injection=0x0000000000000001, [ 253.081378] erofs: read_super, device -> /dev/loop0 [ 253.085023] erofs: FAULT_INJECTION was not selected [ 253.092066] erofs: read_super, device -> /dev/loop3 [ 253.092075] erofs: options -> fault_injection=0x0000000000000001, [ 253.096052] erofs: FAULT_INJECTION was not selected [ 253.113596] erofs: cannot find valid erofs superblock [ 253.131011] erofs: root inode @ nid 36 [ 253.135113] erofs: bogus i_mode (0) @ nid 36 [ 253.147748] erofs: options -> fault_injection=0x0000000000000001, [ 253.185169] erofs: FAULT_INJECTION was not selected [ 253.187029] erofs: root inode @ nid 36 [ 253.203119] erofs: read_super, device -> /dev/loop5 [ 253.216623] erofs: root inode @ nid 0 [ 253.221559] erofs: options -> fault_injection=0x0000000000000001, [ 253.226077] erofs: bogus i_mode (0) @ nid 36 [ 253.228075] erofs: bogus i_mode (0) @ nid 0 [ 253.236601] erofs: cannot find valid erofs superblock 17:18:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 253.486426] erofs: read_super, device -> /dev/loop3 [ 253.491266] erofs: read_super, device -> /dev/loop4 [ 253.497822] erofs: options -> fault_injection=0x0000000000000001, [ 253.503761] erofs: options -> fault_injection=0x0000000000000001, [ 253.516450] erofs: FAULT_INJECTION was not selected [ 253.525177] erofs: root inode @ nid 36 [ 253.527945] erofs: read_super, device -> /dev/loop2 [ 253.531972] erofs: FAULT_INJECTION was not selected [ 253.534199] erofs: options -> fault_injection=0x0000000000000001, [ 253.534275] erofs: FAULT_INJECTION was not selected [ 253.545103] erofs: bogus i_mode (0) @ nid 36 [ 253.546628] erofs: read_super, device -> /dev/loop5 [ 253.550980] erofs: read_super, device -> /dev/loop0 [ 253.569962] erofs: options -> fault_injection=0x0000000000000001, [ 253.578087] erofs: root inode @ nid 36 17:18:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 253.586218] erofs: options -> fault_injection=0x0000000000000001, [ 253.591101] erofs: bogus i_mode (0) @ nid 36 [ 253.599808] erofs: FAULT_INJECTION was not selected [ 253.607415] erofs: blksize 1 isn't supported on this platform [ 253.607857] erofs: root inode @ nid 0 [ 253.618563] erofs: root inode @ nid 36 17:18:37 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 253.647216] erofs: bogus i_mode (0) @ nid 0 [ 253.657911] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. 17:18:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 253.785100] erofs: unmounted for /dev/loop2 [ 253.793221] erofs: read_super, device -> /dev/loop4 [ 253.813644] erofs: options -> fault_injection=0x0000000000000001, [ 253.826032] erofs: FAULT_INJECTION was not selected [ 253.836841] erofs: root inode @ nid 36 [ 253.843853] erofs: bogus i_mode (300) @ nid 36 [ 253.850635] erofs: read_super, device -> /dev/loop3 [ 253.856542] erofs: options -> fault_injection=0x0000000000000001, [ 253.863378] erofs: FAULT_INJECTION was not selected [ 253.868449] erofs: root inode @ nid 36 [ 253.872581] erofs: bogus i_mode (0) @ nid 36 [ 253.895126] erofs: read_super, device -> /dev/loop5 [ 253.900667] erofs: options -> fault_injection=0x0000000000000001, [ 253.918369] erofs: read_super, device -> /dev/loop1 [ 253.924860] erofs: options -> fault_injection=0x0000000000000001, [ 253.937878] erofs: read_super, device -> /dev/loop0 17:18:37 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 253.940771] erofs: read_super, device -> /dev/loop2 [ 253.947852] erofs: options -> fault_injection=0x0000000000000001, [ 253.948010] erofs: options -> fault_injection=0x0000000000000001, [ 253.968368] erofs: blksize 1 isn't supported on this platform [ 253.970029] erofs: cannot read erofs superblock [ 253.980334] erofs: FAULT_INJECTION was not selected [ 253.985453] erofs: FAULT_INJECTION was not selected [ 253.986789] erofs: root inode @ nid 0 [ 253.992566] erofs: root inode @ nid 36 [ 253.996265] erofs: bogus i_mode (0) @ nid 0 [ 254.001081] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. [ 254.036987] erofs: read_super, device -> /dev/loop3 17:18:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.060626] erofs: options -> fault_injection=0x0000000000000001, [ 254.071851] erofs: unmounted for /dev/loop2 [ 254.076729] erofs: FAULT_INJECTION was not selected [ 254.082750] erofs: root inode @ nid 36 [ 254.087118] erofs: bogus i_mode (0) @ nid 36 17:18:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.109469] erofs: read_super, device -> /dev/loop4 [ 254.127571] erofs: options -> fault_injection=0x0000000000000001, [ 254.134282] erofs: FAULT_INJECTION was not selected [ 254.139941] erofs: root inode @ nid 36 [ 254.144026] erofs: bogus i_mode (300) @ nid 36 17:18:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.269332] erofs: read_super, device -> /dev/loop5 [ 254.274581] erofs: options -> fault_injection=0x0000000000000001, [ 254.302848] erofs: blksize 1 isn't supported on this platform 17:18:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.327945] erofs: read_super, device -> /dev/loop2 [ 254.334274] erofs: options -> fault_injection=0x0000000000000001, [ 254.343057] erofs: FAULT_INJECTION was not selected [ 254.348307] erofs: root inode @ nid 36 [ 254.366212] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. 17:18:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.402195] erofs: read_super, device -> /dev/loop1 [ 254.402488] erofs: read_super, device -> /dev/loop0 [ 254.407451] erofs: options -> fault_injection=0x0000000000000001, [ 254.414555] erofs: options -> fault_injection=0x0000000000000001, [ 254.425410] erofs: cannot read erofs superblock [ 254.432273] erofs: cannot find valid erofs superblock [ 254.447436] erofs: unmounted for /dev/loop2 [ 254.470389] erofs: read_super, device -> /dev/loop3 [ 254.475660] erofs: read_super, device -> /dev/loop4 [ 254.481057] erofs: options -> fault_injection=0x0000000000000001, [ 254.487797] erofs: options -> fault_injection=0x0000000000000001, [ 254.492869] erofs: FAULT_INJECTION was not selected [ 254.498675] erofs: FAULT_INJECTION was not selected [ 254.504599] erofs: root inode @ nid 36 [ 254.507946] erofs: root inode @ nid 36 [ 254.509272] erofs: bogus i_mode (0) @ nid 36 [ 254.515494] erofs: bogus i_mode (300) @ nid 36 17:18:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05", 0x1}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.599806] erofs: read_super, device -> /dev/loop5 [ 254.605168] erofs: options -> fault_injection=0x0000000000000001, [ 254.612351] erofs: blksize 1 isn't supported on this platform 17:18:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.651857] erofs: read_super, device -> /dev/loop2 [ 254.656906] erofs: options -> fault_injection=0x0000000000000001, [ 254.672413] erofs: cannot find valid erofs superblock 17:18:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.769293] erofs: read_super, device -> /dev/loop3 [ 254.775826] erofs: options -> fault_injection=0x0000000000000001, [ 254.784261] erofs: FAULT_INJECTION was not selected [ 254.785730] erofs: read_super, device -> /dev/loop0 [ 254.798735] erofs: read_super, device -> /dev/loop4 [ 254.804037] erofs: read_super, device -> /dev/loop1 [ 254.806390] erofs: options -> fault_injection=0x0000000000000001, [ 254.809334] erofs: options -> fault_injection=0x0000000000000001, [ 254.821953] erofs: options -> fault_injection=0x0000000000000001, [ 254.830044] erofs: cannot find valid erofs superblock [ 254.834901] erofs: root inode @ nid 36 [ 254.845718] erofs: cannot read erofs superblock [ 254.851808] erofs: bogus i_mode (0) @ nid 36 17:18:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.865343] erofs: FAULT_INJECTION was not selected 17:18:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05", 0x1}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 254.891856] erofs: root inode @ nid 36 [ 254.902790] erofs: bogus i_mode (0) @ nid 36 [ 254.930636] erofs: read_super, device -> /dev/loop5 [ 254.936978] erofs: options -> fault_injection=0x0000000000000001, [ 254.944980] erofs: blksize 1 isn't supported on this platform 17:18:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.010803] erofs: read_super, device -> /dev/loop2 [ 255.015856] erofs: options -> fault_injection=0x0000000000000001, 17:18:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.076342] erofs: cannot find valid erofs superblock [ 255.129264] erofs: read_super, device -> /dev/loop3 [ 255.130219] erofs: read_super, device -> /dev/loop1 [ 255.134319] erofs: options -> fault_injection=0x0000000000000001, [ 255.161486] erofs: FAULT_INJECTION was not selected [ 255.166543] erofs: root inode @ nid 36 [ 255.171366] erofs: options -> fault_injection=0x0000000000000001, [ 255.174953] erofs: bogus i_mode (0) @ nid 36 [ 255.188229] erofs: cannot read erofs superblock 17:18:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.231055] erofs: read_super, device -> /dev/loop0 [ 255.236117] erofs: options -> fault_injection=0x0000000000000001, 17:18:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05", 0x1}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.271914] erofs: cannot find valid erofs superblock [ 255.289247] erofs: read_super, device -> /dev/loop5 [ 255.294510] erofs: read_super, device -> /dev/loop4 [ 255.319576] erofs: options -> fault_injection=0x0000000000000001, [ 255.324261] erofs: options -> fault_injection=0x0000000000000001, [ 255.330978] erofs: FAULT_INJECTION was not selected [ 255.334747] erofs: blksize 1 isn't supported on this platform [ 255.337533] erofs: root inode @ nid 36 [ 255.350759] erofs: read_super, device -> /dev/loop1 [ 255.359221] erofs: options -> fault_injection=0x0000000000000001, [ 255.366438] erofs: bogus i_mode (0) @ nid 36 17:18:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.372433] erofs: cannot read erofs superblock [ 255.429306] erofs: read_super, device -> /dev/loop2 [ 255.434349] erofs: options -> fault_injection=0x0000000000000001, [ 255.441506] erofs: cannot find valid erofs superblock 17:18:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e80300000000000000000000020000000000000000000000c66dbdd5c28b4111a3e94b4211a04d92", 0x40, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.530146] erofs: read_super, device -> /dev/loop0 [ 255.535202] erofs: options -> fault_injection=0x0000000000000001, [ 255.539216] erofs: read_super, device -> /dev/loop3 [ 255.584404] erofs: options -> fault_injection=0x0000000000000001, [ 255.600138] erofs: FAULT_INJECTION was not selected [ 255.612274] erofs: FAULT_INJECTION was not selected [ 255.625979] erofs: read_super, device -> /dev/loop4 [ 255.631547] erofs: root inode @ nid 36 [ 255.635892] erofs: root inode @ nid 36 [ 255.642713] erofs: read_super, device -> /dev/loop5 [ 255.646936] erofs: options -> fault_injection=0x0000000000000001, [ 255.651526] erofs: bogus i_mode (0) @ nid 36 [ 255.659990] erofs: options -> fault_injection=0x0000000000000001, [ 255.666954] erofs: bogus i_mode (0) @ nid 36 [ 255.672249] erofs: FAULT_INJECTION was not selected [ 255.679105] erofs: FAULT_INJECTION was not selected 17:18:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 255.684246] erofs: root inode @ nid 0 [ 255.690652] erofs: read_super, device -> /dev/loop2 [ 255.695423] erofs: root inode @ nid 36 [ 255.702932] erofs: options -> fault_injection=0x0000000000000001, [ 255.705684] erofs: read_super, device -> /dev/loop1 [ 255.727230] erofs: bogus i_mode (0) @ nid 0 17:18:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 255.727249] erofs: options -> fault_injection=0x0000000000000001, [ 255.736917] erofs: blksize 1 isn't supported on this platform [ 255.746425] erofs: cannot read erofs superblock [ 255.754474] erofs: bogus i_mode (0) @ nid 36 17:18:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 17:18:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.022909] erofs: read_super, device -> /dev/loop3 [ 256.027958] erofs: options -> fault_injection=0x0000000000000001, [ 256.034566] erofs: read_super, device -> /dev/loop5 [ 256.038534] erofs: read_super, device -> /dev/loop1 [ 256.041581] erofs: options -> fault_injection=0x0000000000000001, [ 256.044967] erofs: read_super, device -> /dev/loop4 [ 256.058453] erofs: read_super, device -> /dev/loop2 [ 256.063629] erofs: cannot find valid erofs superblock 17:18:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 17:18:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.063944] erofs: options -> fault_injection=0x0000000000000001, [ 256.070026] erofs: FAULT_INJECTION was not selected [ 256.080315] erofs: options -> fault_injection=0x0000000000000001, [ 256.080572] erofs: blksize 1 isn't supported on this platform [ 256.090857] erofs: options -> fault_injection=0x0000000000000001, [ 256.098988] erofs: root inode @ nid 0 [ 256.103718] erofs: bogus i_mode (0) @ nid 0 [ 256.115011] erofs: blksize 1 isn't supported on this platform 17:18:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.145371] erofs: cannot find valid erofs superblock 17:18:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:40 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:18:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.325198] erofs: read_super, device -> /dev/loop3 [ 256.341954] erofs: options -> fault_injection=0x0000000000000001, [ 256.361039] erofs: read_super, device -> /dev/loop5 [ 256.367219] erofs: options -> fault_injection=0x0000000000000001, 17:18:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.373130] erofs: cannot find valid erofs superblock [ 256.382501] erofs: read_super, device -> /dev/loop2 [ 256.389839] erofs: options -> fault_injection=0x0000000000000001, [ 256.403704] erofs: blksize 1 isn't supported on this platform [ 256.410044] erofs: FAULT_INJECTION was not selected [ 256.415313] erofs: root inode @ nid 0 [ 256.419820] erofs: bogus i_mode (0) @ nid 0 [ 256.472039] erofs: read_super, device -> /dev/loop4 [ 256.477095] erofs: options -> fault_injection=0x0000000000000001, [ 256.483773] erofs: cannot find valid erofs superblock 17:18:40 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.536033] erofs: read_super, device -> /dev/loop0 [ 256.547614] erofs: read_super, device -> /dev/loop1 [ 256.560645] erofs: options -> [ 256.566974] erofs: options -> fault_injection=0x0000000000000001, [ 256.573389] erofs: root inode @ nid 36 [ 256.577321] erofs: bogus i_mode (0) @ nid 36 [ 256.634290] erofs: blksize 1 isn't supported on this platform [ 256.643991] erofs: read_super, device -> /dev/loop3 [ 256.667786] erofs: options -> fault_injection=0x0000000000000001, [ 256.676569] erofs: cannot find valid erofs superblock 17:18:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 256.749596] erofs: read_super, device -> /dev/loop4 [ 256.751858] erofs: read_super, device -> /dev/loop2 [ 256.754636] erofs: options -> fault_injection=0x0000000000000001, [ 256.760361] erofs: options -> fault_injection=0x0000000000000001, [ 256.773021] erofs: blksize 1 isn't supported on this platform [ 256.775014] erofs: read_super, device -> /dev/loop5 17:18:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 1) [ 256.808761] erofs: options -> fault_injection=0x0000000000000001, [ 256.820949] erofs: cannot find valid erofs superblock [ 256.825490] erofs: FAULT_INJECTION was not selected [ 256.843282] FAULT_INJECTION: forcing a failure. [ 256.843282] name failslab, interval 1, probability 0, space 0, times 1 [ 256.855021] CPU: 1 PID: 18346 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 256.856996] erofs: root inode @ nid 36 [ 256.862909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.862916] Call Trace: [ 256.862938] dump_stack+0x1fc/0x2ef [ 256.862957] should_fail.cold+0xa/0xf [ 256.862976] ? setup_fault_attr+0x200/0x200 [ 256.862991] ? lock_acquire+0x170/0x3c0 [ 256.863010] __should_failslab+0x115/0x180 [ 256.863026] should_failslab+0x5/0x10 [ 256.863039] __kmalloc+0x2ab/0x3c0 [ 256.863051] ? __se_sys_memfd_create+0xf8/0x440 [ 256.863068] __se_sys_memfd_create+0xf8/0x440 [ 256.863082] ? memfd_file_seals_ptr+0x150/0x150 [ 256.863099] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.863115] ? trace_hardirqs_off_caller+0x6e/0x210 [ 256.863129] ? do_syscall_64+0x21/0x620 [ 256.863145] do_syscall_64+0xf9/0x620 [ 256.863163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.863174] RIP: 0033:0x7fbfc0e6e0e9 [ 256.863186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 256.863197] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 256.884032] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 256.886386] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6e0e9 [ 256.886395] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fbfc0ec71ee [ 256.886402] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fbfbf7e31d0 17:18:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 2) [ 256.886413] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 257.011157] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 257.020875] ieee802154 phy0 wpan0: encryption failed: -22 [ 257.026534] ieee802154 phy1 wpan1: encryption failed: -22 17:18:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 257.100355] erofs: read_super, device -> /dev/loop1 [ 257.105685] erofs: read_super, device -> /dev/loop2 [ 257.124642] erofs: options -> fault_injection=0x0000000000000001, [ 257.129849] erofs: read_super, device -> /dev/loop3 [ 257.132863] erofs: options -> fault_injection=0x0000000000000001, [ 257.138318] erofs: options -> fault_injection=0x0000000000000001, [ 257.164751] erofs: cannot read erofs superblock [ 257.175073] erofs: unmounted for /dev/loop5 [ 257.178039] FAULT_INJECTION: forcing a failure. [ 257.178039] name failslab, interval 1, probability 0, space 0, times 0 [ 257.193560] erofs: blksize 1 isn't supported on this platform [ 257.214317] erofs: cannot find valid erofs superblock [ 257.223177] CPU: 1 PID: 18364 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 257.231153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.240487] Call Trace: [ 257.243059] dump_stack+0x1fc/0x2ef [ 257.246670] should_fail.cold+0xa/0xf [ 257.250464] ? setup_fault_attr+0x200/0x200 [ 257.254779] ? lock_acquire+0x170/0x3c0 [ 257.258738] __should_failslab+0x115/0x180 [ 257.262956] should_failslab+0x5/0x10 [ 257.266748] kmem_cache_alloc+0x277/0x370 [ 257.270880] ? shmem_destroy_callback+0xb0/0xb0 [ 257.275542] shmem_alloc_inode+0x18/0x40 [ 257.279690] ? shmem_destroy_callback+0xb0/0xb0 [ 257.284349] alloc_inode+0x5d/0x180 [ 257.287967] new_inode+0x1d/0xf0 [ 257.291429] shmem_get_inode+0x96/0x8d0 [ 257.295403] __shmem_file_setup.part.0+0x7a/0x2b0 [ 257.300236] shmem_file_setup+0x61/0x90 [ 257.304202] __se_sys_memfd_create+0x26b/0x440 [ 257.308780] ? memfd_file_seals_ptr+0x150/0x150 [ 257.313433] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.318782] ? trace_hardirqs_off_caller+0x6e/0x210 [ 257.323778] ? do_syscall_64+0x21/0x620 [ 257.327734] do_syscall_64+0xf9/0x620 [ 257.332047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.337214] RIP: 0033:0x7fbfc0e6e0e9 [ 257.340908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 257.359790] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 257.367479] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6e0e9 [ 257.374735] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fbfc0ec71ee [ 257.382165] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fbfbf7e31d0 [ 257.389413] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 257.396678] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:18:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 3) [ 257.463394] FAULT_INJECTION: forcing a failure. [ 257.463394] name failslab, interval 1, probability 0, space 0, times 0 [ 257.475048] CPU: 0 PID: 18371 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 257.482926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.492532] Call Trace: [ 257.495129] dump_stack+0x1fc/0x2ef [ 257.498769] should_fail.cold+0xa/0xf [ 257.502567] ? setup_fault_attr+0x200/0x200 [ 257.506874] ? lock_acquire+0x170/0x3c0 [ 257.510851] __should_failslab+0x115/0x180 [ 257.515083] should_failslab+0x5/0x10 [ 257.518879] kmem_cache_alloc+0x277/0x370 [ 257.523022] __d_alloc+0x2b/0xa10 [ 257.526460] d_alloc_pseudo+0x19/0x70 [ 257.530256] alloc_file_pseudo+0xc6/0x250 [ 257.534399] ? alloc_file+0x4d0/0x4d0 [ 257.538197] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 257.543817] ? shmem_get_inode+0x44c/0x8d0 [ 257.548041] __shmem_file_setup.part.0+0x102/0x2b0 [ 257.552961] shmem_file_setup+0x61/0x90 [ 257.557010] __se_sys_memfd_create+0x26b/0x440 [ 257.561576] ? memfd_file_seals_ptr+0x150/0x150 [ 257.566227] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.571596] ? trace_hardirqs_off_caller+0x6e/0x210 [ 257.576609] ? do_syscall_64+0x21/0x620 [ 257.580592] do_syscall_64+0xf9/0x620 [ 257.584397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.589579] RIP: 0033:0x7fbfc0e6e0e9 [ 257.593294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:18:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 4) [ 257.612190] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 257.619894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6e0e9 [ 257.627155] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fbfc0ec71ee [ 257.634406] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fbfbf7e31d0 [ 257.641658] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 257.648916] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:18:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 257.748772] erofs: read_super, device -> /dev/loop4 [ 257.767940] erofs: options -> fault_injection=0x0000000000000001, [ 257.792507] erofs: cannot find valid erofs superblock [ 257.793119] erofs: read_super, device -> /dev/loop5 17:18:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 257.843314] erofs: options -> fault_injection=0x0000000000000001, [ 257.851526] FAULT_INJECTION: forcing a failure. [ 257.851526] name failslab, interval 1, probability 0, space 0, times 0 [ 257.854767] erofs: read_super, device -> /dev/loop3 [ 257.871161] erofs: read_super, device -> /dev/loop2 [ 257.880864] erofs: options -> fault_injection=0x0000000000000001, [ 257.894041] erofs: read_super, device -> /dev/loop1 [ 257.901327] erofs: options -> fault_injection=0x0000000000000001, [ 257.907748] erofs: cannot read erofs superblock [ 257.923536] erofs: blksize 1 isn't supported on this platform [ 257.931970] erofs: FAULT_INJECTION was not selected 17:18:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {0x0}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 257.946118] erofs: options -> fault_injection=0x0000000000000001, [ 257.947673] CPU: 1 PID: 18392 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 257.958931] erofs: root inode @ nid 36 [ 257.960235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.960241] Call Trace: [ 257.960263] dump_stack+0x1fc/0x2ef [ 257.960280] should_fail.cold+0xa/0xf [ 257.960298] ? setup_fault_attr+0x200/0x200 [ 257.973614] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 257.976097] ? lock_acquire+0x170/0x3c0 [ 257.976120] __should_failslab+0x115/0x180 [ 257.976143] should_failslab+0x5/0x10 [ 257.981597] erofs: cannot find valid erofs superblock [ 257.983534] kmem_cache_alloc+0x277/0x370 [ 257.983554] __alloc_file+0x21/0x340 [ 257.983572] alloc_empty_file+0x6d/0x170 [ 258.024946] alloc_file+0x5e/0x4d0 [ 258.028487] alloc_file_pseudo+0x165/0x250 [ 258.032724] ? alloc_file+0x4d0/0x4d0 [ 258.036510] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 258.042117] ? shmem_get_inode+0x44c/0x8d0 [ 258.046403] __shmem_file_setup.part.0+0x102/0x2b0 [ 258.051319] shmem_file_setup+0x61/0x90 [ 258.055307] __se_sys_memfd_create+0x26b/0x440 [ 258.059892] ? memfd_file_seals_ptr+0x150/0x150 [ 258.064562] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.069919] ? trace_hardirqs_off_caller+0x6e/0x210 [ 258.074921] ? do_syscall_64+0x21/0x620 [ 258.078890] do_syscall_64+0xf9/0x620 [ 258.082683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.087857] RIP: 0033:0x7fbfc0e6e0e9 [ 258.091554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 258.110454] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 258.118150] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6e0e9 [ 258.125403] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fbfc0ec71ee [ 258.132660] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fbfbf7e31d0 [ 258.139914] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 17:18:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 5) [ 258.147163] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:18:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 258.199860] erofs: read_super, device -> /dev/loop4 [ 258.206725] erofs: options -> fault_injection=0x0000000000000001, [ 258.235317] FAULT_INJECTION: forcing a failure. [ 258.235317] name failslab, interval 1, probability 0, space 0, times 0 17:18:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 258.246656] erofs: unmounted for /dev/loop5 [ 258.251897] CPU: 1 PID: 18406 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 258.257821] erofs: cannot find valid erofs superblock [ 258.259789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.259795] Call Trace: [ 258.259817] dump_stack+0x1fc/0x2ef [ 258.259837] should_fail.cold+0xa/0xf [ 258.259856] ? setup_fault_attr+0x200/0x200 [ 258.259872] ? lock_acquire+0x170/0x3c0 [ 258.259892] __should_failslab+0x115/0x180 [ 258.259907] should_failslab+0x5/0x10 [ 258.259926] kmem_cache_alloc_trace+0x284/0x380 [ 258.305267] apparmor_file_alloc_security+0x394/0xad0 [ 258.310450] ? apparmor_file_receive+0x160/0x160 [ 258.315193] ? __alloc_file+0x21/0x340 [ 258.319073] security_file_alloc+0x40/0x90 [ 258.323296] __alloc_file+0xd8/0x340 [ 258.326994] alloc_empty_file+0x6d/0x170 [ 258.331042] alloc_file+0x5e/0x4d0 [ 258.334568] alloc_file_pseudo+0x165/0x250 [ 258.338788] ? alloc_file+0x4d0/0x4d0 [ 258.342570] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 258.348179] ? shmem_get_inode+0x44c/0x8d0 [ 258.352399] __shmem_file_setup.part.0+0x102/0x2b0 [ 258.357311] shmem_file_setup+0x61/0x90 [ 258.361269] __se_sys_memfd_create+0x26b/0x440 [ 258.365832] ? memfd_file_seals_ptr+0x150/0x150 [ 258.370484] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.375845] ? trace_hardirqs_off_caller+0x6e/0x210 [ 258.380852] ? do_syscall_64+0x21/0x620 [ 258.384807] do_syscall_64+0xf9/0x620 [ 258.388597] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.393766] RIP: 0033:0x7fbfc0e6e0e9 [ 258.397460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 258.416344] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 258.424033] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6e0e9 [ 258.431285] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fbfc0ec71ee [ 258.438537] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fbfbf7e31d0 17:18:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 6) [ 258.445793] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 258.453053] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:18:42 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 258.594406] FAULT_INJECTION: forcing a failure. [ 258.594406] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 258.607609] CPU: 1 PID: 18420 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 258.615510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.624855] Call Trace: [ 258.627437] dump_stack+0x1fc/0x2ef [ 258.631061] should_fail.cold+0xa/0xf [ 258.634847] ? lock_acquire+0x170/0x3c0 [ 258.638808] ? setup_fault_attr+0x200/0x200 [ 258.643117] __alloc_pages_nodemask+0x239/0x2890 [ 258.647854] ? __lock_acquire+0x6de/0x3ff0 [ 258.652079] ? static_obj+0x50/0x50 [ 258.655695] ? __lock_acquire+0x6de/0x3ff0 [ 258.659914] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 258.664741] ? __lock_acquire+0x6de/0x3ff0 [ 258.668962] ? mark_held_locks+0xf0/0xf0 [ 258.673008] ? unwind_next_frame+0xeee/0x1400 [ 258.677487] ? mark_held_locks+0xf0/0xf0 [ 258.681535] ? deref_stack_reg+0x134/0x1d0 [ 258.685752] ? get_reg+0x176/0x1f0 [ 258.689280] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 258.695149] alloc_pages_vma+0xf2/0x780 [ 258.699116] shmem_alloc_page+0x11c/0x1f0 [ 258.703247] ? shmem_swapin+0x220/0x220 [ 258.707217] ? percpu_counter_add_batch+0x126/0x180 [ 258.712231] ? __vm_enough_memory+0x316/0x650 [ 258.716721] shmem_alloc_and_acct_page+0x15a/0x850 [ 258.721648] shmem_getpage_gfp+0x4e9/0x37f0 [ 258.725975] ? shmem_alloc_and_acct_page+0x850/0x850 [ 258.731070] ? mark_held_locks+0xa6/0xf0 [ 258.735117] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 258.740288] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 258.745464] shmem_write_begin+0xff/0x1e0 [ 258.749600] generic_perform_write+0x1f8/0x4d0 [ 258.754168] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 258.758816] ? current_time+0x1c0/0x1c0 [ 258.762777] ? lock_acquire+0x170/0x3c0 [ 258.766732] __generic_file_write_iter+0x24b/0x610 [ 258.771650] generic_file_write_iter+0x3f8/0x730 [ 258.776392] __vfs_write+0x51b/0x770 [ 258.780092] ? kernel_read+0x110/0x110 [ 258.783969] ? check_preemption_disabled+0x41/0x280 [ 258.788976] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 258.793982] vfs_write+0x1f3/0x540 [ 258.797507] __x64_sys_pwrite64+0x1f7/0x250 [ 258.801811] ? ksys_pwrite64+0x1a0/0x1a0 [ 258.805856] ? trace_hardirqs_off_caller+0x6e/0x210 [ 258.810877] ? do_syscall_64+0x21/0x620 [ 258.814844] do_syscall_64+0xf9/0x620 [ 258.818640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.823822] RIP: 0033:0x7fbfc0e210b7 [ 258.827528] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 258.846414] RSP: 002b:00007fbfbf7e2f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 258.854107] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e210b7 [ 258.861359] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 258.868608] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 258.875858] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 258.883106] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 258.902813] erofs: read_super, device -> /dev/loop1 [ 258.907863] erofs: options -> fault_injection=0x0000000000000001, [ 258.924431] erofs: cannot read erofs superblock [ 258.934181] erofs: read_super, device -> /dev/loop2 [ 258.945678] erofs: options -> fault_injection=0x0000000000000001, [ 258.952685] erofs: FAULT_INJECTION was not selected [ 258.957856] erofs: root inode @ nid 0 [ 258.963822] erofs: bogus i_mode (0) @ nid 0 [ 258.968500] erofs: read_super, device -> /dev/loop3 [ 258.973515] erofs: options -> fault_injection=0x0000000000000001, [ 258.974975] erofs: read_super, device -> /dev/loop0 [ 258.990376] erofs: read_super, device -> /dev/loop5 [ 258.995407] erofs: options -> fault_injection=0x0000000000000001, [ 258.998022] erofs: options -> 17:18:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 259.026027] erofs: cannot find valid erofs superblock [ 259.045265] erofs: cannot find valid erofs superblock [ 259.057558] erofs: FAULT_INJECTION was not selected [ 259.072564] erofs: root inode @ nid 36 17:18:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 7) [ 259.076667] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 259.130699] erofs: read_super, device -> /dev/loop4 [ 259.132600] erofs: read_super, device -> /dev/loop1 [ 259.155067] erofs: options -> fault_injection=0x0000000000000001, [ 259.157626] erofs: read_super, device -> /dev/loop2 [ 259.167072] FAULT_INJECTION: forcing a failure. [ 259.167072] name failslab, interval 1, probability 0, space 0, times 0 17:18:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 259.176010] erofs: options -> fault_injection=0x0000000000000001, [ 259.183571] CPU: 1 PID: 18450 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 259.192499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.194009] erofs: cannot find valid erofs superblock [ 259.201850] Call Trace: [ 259.201872] dump_stack+0x1fc/0x2ef [ 259.201892] should_fail.cold+0xa/0xf [ 259.201910] ? setup_fault_attr+0x200/0x200 [ 259.201925] ? lock_acquire+0x170/0x3c0 [ 259.201944] __should_failslab+0x115/0x180 [ 259.201963] should_failslab+0x5/0x10 [ 259.201979] kmem_cache_alloc+0x277/0x370 [ 259.218058] erofs: options -> fault_injection=0x0000000000000001, [ 259.221444] getname_flags+0xce/0x590 [ 259.221463] do_sys_open+0x26c/0x520 [ 259.221479] ? filp_open+0x70/0x70 [ 259.221497] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.221516] ? trace_hardirqs_off_caller+0x6e/0x210 [ 259.243922] erofs: cannot find valid erofs superblock [ 259.247606] ? do_syscall_64+0x21/0x620 [ 259.247625] do_syscall_64+0xf9/0x620 17:18:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 8) [ 259.247646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.247657] RIP: 0033:0x7fbfc0e21004 [ 259.247672] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 259.269765] erofs: FAULT_INJECTION was not selected [ 259.270404] RSP: 002b:00007fbfbf7e2eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 259.274496] erofs: root inode @ nid 0 [ 259.278142] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e21004 [ 259.278151] RDX: 0000000000000002 RSI: 00007fbfbf7e2fe0 RDI: 00000000ffffff9c [ 259.278159] RBP: 00007fbfbf7e2fe0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 259.278167] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 259.278176] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 259.360683] erofs: unmounted for /dev/loop5 [ 259.393596] erofs: bogus i_mode (0) @ nid 0 17:18:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 259.448674] erofs: read_super, device -> /dev/loop3 [ 259.486552] erofs: options -> fault_injection=0x0000000000000001, [ 259.493756] FAULT_INJECTION: forcing a failure. [ 259.493756] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 259.505567] CPU: 0 PID: 18464 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 259.513442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.522785] Call Trace: [ 259.525367] dump_stack+0x1fc/0x2ef [ 259.528985] should_fail.cold+0xa/0xf [ 259.532779] ? setup_fault_attr+0x200/0x200 [ 259.537090] ? do_writepages+0x290/0x290 [ 259.541141] ? unlock_page+0x13d/0x230 [ 259.545026] __alloc_pages_nodemask+0x239/0x2890 [ 259.549777] ? lock_downgrade+0x720/0x720 [ 259.553915] ? check_preemption_disabled+0x41/0x280 [ 259.558923] ? __lock_acquire+0x6de/0x3ff0 [ 259.563151] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 259.567986] ? lock_downgrade+0x720/0x720 [ 259.572118] ? lock_acquire+0x170/0x3c0 [ 259.576088] ? up_write+0x18/0x150 [ 259.579614] ? generic_file_write_iter+0x381/0x730 [ 259.584531] ? iov_iter_init+0xb8/0x1d0 [ 259.588499] cache_grow_begin+0xa4/0x8a0 [ 259.592548] ? setup_fault_attr+0x200/0x200 [ 259.596860] ? lock_acquire+0x170/0x3c0 [ 259.600826] cache_alloc_refill+0x273/0x340 [ 259.605142] kmem_cache_alloc+0x346/0x370 [ 259.609281] getname_flags+0xce/0x590 [ 259.613072] do_sys_open+0x26c/0x520 [ 259.616776] ? filp_open+0x70/0x70 [ 259.620307] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.625665] ? trace_hardirqs_off_caller+0x6e/0x210 [ 259.630669] ? do_syscall_64+0x21/0x620 [ 259.634635] do_syscall_64+0xf9/0x620 [ 259.638432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.643608] RIP: 0033:0x7fbfc0e21004 [ 259.647311] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 259.666203] RSP: 002b:00007fbfbf7e2eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 259.673896] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e21004 17:18:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 259.681151] RDX: 0000000000000002 RSI: 00007fbfbf7e2fe0 RDI: 00000000ffffff9c [ 259.688403] RBP: 00007fbfbf7e2fe0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 259.695675] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 259.702929] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 259.711784] erofs: cannot find valid erofs superblock 17:18:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 259.802219] erofs: read_super, device -> /dev/loop5 [ 259.802636] erofs: read_super, device -> /dev/loop4 [ 259.809985] erofs: options -> fault_injection=0x0000000000000001, [ 259.816628] erofs: read_super, device -> /dev/loop0 [ 259.833894] erofs: options -> [ 259.837551] erofs: root inode @ nid 36 [ 259.859339] erofs: options -> fault_injection=0x0000000000000001, [ 259.880480] erofs: FAULT_INJECTION was not selected [ 259.885623] erofs: bogus i_mode (0) @ nid 36 [ 259.886283] erofs: cannot find valid erofs superblock [ 259.894421] erofs: root inode @ nid 0 [ 259.901782] erofs: bogus i_mode (0) @ nid 0 [ 259.939077] erofs: read_super, device -> /dev/loop1 [ 259.948634] erofs: read_super, device -> /dev/loop2 [ 259.954177] erofs: options -> fault_injection=0x0000000000000001, [ 259.961699] erofs: options -> fault_injection=0x0000000000000001, [ 259.967979] erofs: cannot find valid erofs superblock [ 259.974427] erofs: FAULT_INJECTION was not selected [ 259.980048] erofs: root inode @ nid 0 [ 259.984105] erofs: bogus i_mode (0) @ nid 0 17:18:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:44 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 9) 17:18:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 260.048109] erofs: read_super, device -> /dev/loop3 [ 260.054330] erofs: options -> fault_injection=0x0000000000000001, [ 260.065380] erofs: cannot find valid erofs superblock [ 260.119925] FAULT_INJECTION: forcing a failure. [ 260.119925] name failslab, interval 1, probability 0, space 0, times 0 [ 260.131341] CPU: 1 PID: 18503 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 260.139226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.148570] Call Trace: [ 260.151155] dump_stack+0x1fc/0x2ef [ 260.154775] should_fail.cold+0xa/0xf [ 260.158566] ? setup_fault_attr+0x200/0x200 [ 260.162888] ? lock_acquire+0x170/0x3c0 [ 260.166849] __should_failslab+0x115/0x180 [ 260.171069] should_failslab+0x5/0x10 [ 260.174854] kmem_cache_alloc+0x277/0x370 [ 260.178989] __alloc_file+0x21/0x340 [ 260.182684] alloc_empty_file+0x6d/0x170 [ 260.186728] path_openat+0xe9/0x2df0 [ 260.190424] ? __lock_acquire+0x6de/0x3ff0 [ 260.194645] ? path_lookupat+0x8d0/0x8d0 [ 260.198690] ? mark_held_locks+0xf0/0xf0 [ 260.202738] do_filp_open+0x18c/0x3f0 [ 260.206523] ? may_open_dev+0xf0/0xf0 [ 260.210309] ? __alloc_fd+0x28d/0x570 [ 260.214097] ? lock_downgrade+0x720/0x720 [ 260.218228] ? lock_acquire+0x170/0x3c0 [ 260.222191] ? __alloc_fd+0x34/0x570 [ 260.225892] ? do_raw_spin_unlock+0x171/0x230 [ 260.230371] ? _raw_spin_unlock+0x29/0x40 [ 260.234511] ? __alloc_fd+0x28d/0x570 [ 260.238305] do_sys_open+0x3b3/0x520 [ 260.242005] ? filp_open+0x70/0x70 [ 260.245527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.250887] ? trace_hardirqs_off_caller+0x6e/0x210 [ 260.255892] ? do_syscall_64+0x21/0x620 [ 260.259848] do_syscall_64+0xf9/0x620 [ 260.263632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.268802] RIP: 0033:0x7fbfc0e21004 [ 260.272495] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 260.291375] RSP: 002b:00007fbfbf7e2eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 260.299062] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e21004 [ 260.306313] RDX: 0000000000000002 RSI: 00007fbfbf7e2fe0 RDI: 00000000ffffff9c [ 260.313567] RBP: 00007fbfbf7e2fe0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 17:18:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 260.320827] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 260.328083] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 260.353717] erofs: read_super, device -> /dev/loop5 [ 260.411751] erofs: read_super, device -> /dev/loop2 [ 260.425453] erofs: read_super, device -> /dev/loop1 [ 260.432851] erofs: options -> fault_injection=0x0000000000000001, [ 260.435166] erofs: options -> fault_injection=0x0000000000000001, [ 260.449995] erofs: options -> fault_injection=0x0000000000000001, 17:18:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 10) [ 260.470075] erofs: FAULT_INJECTION was not selected [ 260.480943] erofs: cannot find valid erofs superblock [ 260.487324] erofs: FAULT_INJECTION was not selected [ 260.488884] erofs: root inode @ nid 36 [ 260.499797] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. [ 260.510005] erofs: read_super, device -> /dev/loop3 17:18:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 260.516602] erofs: options -> fault_injection=0x0000000000000001, [ 260.536043] erofs: cannot find valid erofs superblock [ 260.542415] erofs: root inode @ nid 0 [ 260.546547] erofs: bogus i_mode (0) @ nid 0 [ 260.555425] FAULT_INJECTION: forcing a failure. [ 260.555425] name failslab, interval 1, probability 0, space 0, times 0 [ 260.567509] CPU: 0 PID: 18523 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 260.575403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.584758] Call Trace: [ 260.587362] dump_stack+0x1fc/0x2ef [ 260.591008] should_fail.cold+0xa/0xf [ 260.594820] ? setup_fault_attr+0x200/0x200 [ 260.599149] ? lock_acquire+0x170/0x3c0 [ 260.603141] __should_failslab+0x115/0x180 [ 260.607386] should_failslab+0x5/0x10 [ 260.611196] kmem_cache_alloc_trace+0x284/0x380 [ 260.615881] apparmor_file_alloc_security+0x394/0xad0 [ 260.621086] ? apparmor_file_receive+0x160/0x160 [ 260.625852] ? __alloc_file+0x21/0x340 [ 260.629756] security_file_alloc+0x40/0x90 [ 260.634000] __alloc_file+0xd8/0x340 [ 260.637721] alloc_empty_file+0x6d/0x170 [ 260.641797] path_openat+0xe9/0x2df0 [ 260.645522] ? __lock_acquire+0x6de/0x3ff0 [ 260.649776] ? path_lookupat+0x8d0/0x8d0 [ 260.653852] ? mark_held_locks+0xf0/0xf0 [ 260.657927] do_filp_open+0x18c/0x3f0 [ 260.661736] ? may_open_dev+0xf0/0xf0 [ 260.665548] ? __alloc_fd+0x28d/0x570 [ 260.669368] ? lock_downgrade+0x720/0x720 [ 260.673521] ? lock_acquire+0x170/0x3c0 [ 260.677502] ? __alloc_fd+0x34/0x570 [ 260.681226] ? do_raw_spin_unlock+0x171/0x230 [ 260.685738] ? _raw_spin_unlock+0x29/0x40 [ 260.689889] ? __alloc_fd+0x28d/0x570 [ 260.693706] do_sys_open+0x3b3/0x520 [ 260.697427] ? filp_open+0x70/0x70 [ 260.700981] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.706355] ? trace_hardirqs_off_caller+0x6e/0x210 [ 260.711381] ? do_syscall_64+0x21/0x620 [ 260.715372] do_syscall_64+0xf9/0x620 [ 260.719180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.724374] RIP: 0033:0x7fbfc0e21004 [ 260.728091] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 260.746994] RSP: 002b:00007fbfbf7e2eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 260.754711] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e21004 [ 260.761990] RDX: 0000000000000002 RSI: 00007fbfbf7e2fe0 RDI: 00000000ffffff9c 17:18:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 11) [ 260.769268] RBP: 00007fbfbf7e2fe0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 260.776542] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 260.783816] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 260.834085] erofs: read_super, device -> /dev/loop4 [ 260.849979] erofs: options -> fault_injection=0x0000000000000001, [ 260.864263] erofs: cannot find valid erofs superblock [ 260.873177] erofs: unmounted for /dev/loop2 [ 260.891256] FAULT_INJECTION: forcing a failure. [ 260.891256] name failslab, interval 1, probability 0, space 0, times 0 [ 260.902910] CPU: 0 PID: 18535 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 260.910825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.920173] Call Trace: [ 260.922756] dump_stack+0x1fc/0x2ef [ 260.926372] should_fail.cold+0xa/0xf [ 260.930160] ? setup_fault_attr+0x200/0x200 [ 260.934480] ? lock_acquire+0x170/0x3c0 [ 260.938452] __should_failslab+0x115/0x180 [ 260.942692] should_failslab+0x5/0x10 [ 260.946486] kmem_cache_alloc+0x277/0x370 [ 260.950621] __kernfs_new_node+0xd2/0x680 [ 260.954756] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 260.959510] ? _raw_spin_unlock_irq+0x5a/0x80 [ 260.964000] ? __cpu_to_node+0x7b/0xa0 [ 260.967891] ? mark_held_locks+0xf0/0xf0 [ 260.971953] ? io_schedule_timeout+0x140/0x140 [ 260.976649] ? enqueue_entity+0xf86/0x3850 [ 260.980881] ? set_user_nice.part.0+0x3b9/0xab0 [ 260.985546] kernfs_create_dir_ns+0x9e/0x230 [ 260.989938] internal_create_group+0x1c1/0xb20 [ 260.994505] ? sysfs_remove_link_from_group+0x70/0x70 [ 260.999684] ? lock_downgrade+0x720/0x720 [ 261.003833] lo_ioctl+0xf7c/0x20e0 [ 261.007533] ? loop_set_status64+0x110/0x110 [ 261.011925] blkdev_ioctl+0x5cb/0x1a80 [ 261.015800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.021165] ? blkpg_ioctl+0x9d0/0x9d0 [ 261.025048] ? mark_held_locks+0xf0/0xf0 [ 261.029106] ? mark_held_locks+0xf0/0xf0 [ 261.033164] ? debug_check_no_obj_freed+0x201/0x490 [ 261.038180] ? lock_downgrade+0x720/0x720 [ 261.042338] block_ioctl+0xe9/0x130 [ 261.045956] ? blkdev_fallocate+0x3f0/0x3f0 [ 261.050272] do_vfs_ioctl+0xcdb/0x12e0 [ 261.054150] ? lock_downgrade+0x720/0x720 [ 261.058294] ? check_preemption_disabled+0x41/0x280 [ 261.063304] ? ioctl_preallocate+0x200/0x200 [ 261.067701] ? __fget+0x356/0x510 [ 261.071136] ? do_dup2+0x450/0x450 [ 261.074760] ? do_sys_open+0x2bf/0x520 [ 261.078659] ksys_ioctl+0x9b/0xc0 [ 261.082117] __x64_sys_ioctl+0x6f/0xb0 [ 261.085999] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 261.090564] do_syscall_64+0xf9/0x620 [ 261.094351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.099533] RIP: 0033:0x7fbfc0e6dea7 [ 261.103242] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 261.122131] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.129834] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 261.137095] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 261.144357] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 261.151606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 261.158866] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 261.202374] erofs: read_super, device -> /dev/loop0 [ 261.207412] erofs: options -> [ 261.227852] erofs: root inode @ nid 36 [ 261.234173] erofs: bogus i_mode (0) @ nid 36 [ 261.260726] erofs: read_super, device -> /dev/loop1 [ 261.266006] erofs: options -> fault_injection=0x0000000000000001, [ 261.277894] erofs: cannot find valid erofs superblock [ 261.290853] erofs: read_super, device -> /dev/loop5 [ 261.295886] erofs: options -> fault_injection=0x0000000000000001, [ 261.302879] erofs: read_super, device -> /dev/loop2 17:18:45 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 12) [ 261.315843] erofs: options -> fault_injection=0x0000000000000001, [ 261.326846] erofs: FAULT_INJECTION was not selected [ 261.328561] erofs: FAULT_INJECTION was not selected [ 261.335163] erofs: root inode @ nid 0 [ 261.337273] erofs: root inode @ nid 0 [ 261.356662] erofs: bogus i_mode (0) @ nid 0 17:18:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 261.370392] erofs: bogus i_mode (0) @ nid 0 [ 261.388876] erofs: read_super, device -> /dev/loop3 [ 261.395354] erofs: options -> fault_injection=0x0000000000000001, [ 261.403926] erofs: FAULT_INJECTION was not selected [ 261.409700] erofs: root inode @ nid 36 [ 261.413826] erofs: bogus i_mode (0) @ nid 36 17:18:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 261.444336] FAULT_INJECTION: forcing a failure. [ 261.444336] name failslab, interval 1, probability 0, space 0, times 0 [ 261.457161] CPU: 0 PID: 18559 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 261.465050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.474389] Call Trace: [ 261.476963] dump_stack+0x1fc/0x2ef [ 261.480577] should_fail.cold+0xa/0xf [ 261.484362] ? setup_fault_attr+0x200/0x200 [ 261.488666] ? lock_acquire+0x170/0x3c0 [ 261.492623] __should_failslab+0x115/0x180 [ 261.496840] should_failslab+0x5/0x10 [ 261.500621] kmem_cache_alloc+0x277/0x370 [ 261.504762] __kernfs_new_node+0xd2/0x680 [ 261.508895] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 261.513634] ? __cpu_to_node+0x7b/0xa0 [ 261.517502] ? account_entity_enqueue+0x2e5/0x440 [ 261.522326] ? mark_held_locks+0xf0/0xf0 [ 261.526374] ? enqueue_entity+0xf86/0x3850 [ 261.530602] ? set_user_nice.part.0+0x3b9/0xab0 [ 261.535269] kernfs_create_dir_ns+0x9e/0x230 [ 261.539673] internal_create_group+0x1c1/0xb20 [ 261.544245] ? sysfs_remove_link_from_group+0x70/0x70 [ 261.549427] ? lock_downgrade+0x720/0x720 [ 261.553575] lo_ioctl+0xf7c/0x20e0 [ 261.557107] ? loop_set_status64+0x110/0x110 [ 261.561506] blkdev_ioctl+0x5cb/0x1a80 [ 261.565378] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.570724] ? blkpg_ioctl+0x9d0/0x9d0 [ 261.574593] ? mark_held_locks+0xf0/0xf0 [ 261.578635] ? mark_held_locks+0xf0/0xf0 [ 261.582684] ? debug_check_no_obj_freed+0x201/0x490 [ 261.587683] ? lock_downgrade+0x720/0x720 [ 261.591813] block_ioctl+0xe9/0x130 [ 261.595421] ? blkdev_fallocate+0x3f0/0x3f0 [ 261.599724] do_vfs_ioctl+0xcdb/0x12e0 [ 261.603604] ? lock_downgrade+0x720/0x720 [ 261.607763] ? check_preemption_disabled+0x41/0x280 [ 261.612772] ? ioctl_preallocate+0x200/0x200 [ 261.617162] ? __fget+0x356/0x510 [ 261.620599] ? do_dup2+0x450/0x450 [ 261.624118] ? do_sys_open+0x2bf/0x520 [ 261.628002] ksys_ioctl+0x9b/0xc0 [ 261.631436] __x64_sys_ioctl+0x6f/0xb0 [ 261.635302] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 261.639873] do_syscall_64+0xf9/0x620 [ 261.643665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.648864] RIP: 0033:0x7fbfc0e6dea7 [ 261.652561] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 261.671443] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.679133] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 261.686407] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 261.693657] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 261.700923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 261.708183] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 261.780319] erofs: read_super, device -> /dev/loop4 [ 261.787694] erofs: read_super, device -> /dev/loop0 [ 261.797222] erofs: options -> fault_injection=0x0000000000000001, [ 261.803028] erofs: options -> [ 261.803941] erofs: cannot find valid erofs superblock [ 261.809280] erofs: root inode @ nid 36 [ 261.817360] erofs: read_super, device -> /dev/loop2 [ 261.822620] erofs: read_super, device -> /dev/loop1 [ 261.827637] erofs: options -> fault_injection=0x0000000000000001, [ 261.834527] erofs: options -> fault_injection=0x0000000000000001, [ 261.843108] erofs: cannot find valid erofs superblock [ 261.847583] erofs: bogus i_mode (0) @ nid 36 [ 261.849004] erofs: FAULT_INJECTION was not selected [ 261.872984] erofs: root inode @ nid 0 17:18:45 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 261.877561] erofs: bogus i_mode (0) @ nid 0 [ 261.888816] erofs: read_super, device -> /dev/loop5 [ 261.895894] erofs: options -> fault_injection=0x0000000000000001, [ 261.903163] erofs: cannot find valid erofs superblock [ 261.928865] erofs: read_super, device -> /dev/loop3 17:18:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 13) 17:18:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 261.960373] erofs: options -> fault_injection=0x0000000000000001, [ 261.966903] erofs: cannot find valid erofs superblock 17:18:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 262.065673] erofs: read_super, device -> /dev/loop4 [ 262.075510] erofs: options -> fault_injection=0x0000000000000001, [ 262.085499] erofs: read_super, device -> /dev/loop1 [ 262.094483] erofs: FAULT_INJECTION was not selected [ 262.103053] erofs: options -> fault_injection=0x0000000000000001, [ 262.106458] erofs: root inode @ nid 36 [ 262.117010] erofs: read_super, device -> /dev/loop5 [ 262.122613] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 262.135065] erofs: read_super, device -> /dev/loop2 [ 262.140420] erofs: options -> fault_injection=0x0000000000000001, [ 262.142863] erofs: cannot find valid erofs superblock [ 262.147063] erofs: FAULT_INJECTION was not selected [ 262.152569] erofs: options -> fault_injection=0x0000000000000001, [ 262.158751] erofs: root inode @ nid 0 [ 262.168073] erofs: bogus i_mode (0) @ nid 0 [ 262.173432] FAULT_INJECTION: forcing a failure. [ 262.173432] name failslab, interval 1, probability 0, space 0, times 0 [ 262.185664] CPU: 1 PID: 18613 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 262.189624] erofs: cannot find valid erofs superblock [ 262.193550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.208118] Call Trace: [ 262.210754] dump_stack+0x1fc/0x2ef [ 262.214366] should_fail.cold+0xa/0xf [ 262.218160] ? setup_fault_attr+0x200/0x200 [ 262.222466] ? lock_acquire+0x170/0x3c0 [ 262.226432] __should_failslab+0x115/0x180 [ 262.230672] should_failslab+0x5/0x10 [ 262.234457] kmem_cache_alloc+0x277/0x370 [ 262.238592] __kernfs_new_node+0xd2/0x680 [ 262.242740] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 262.247485] ? __mutex_unlock_slowpath+0xea/0x610 [ 262.252331] ? wait_for_completion_io+0x10/0x10 [ 262.256988] ? kernfs_next_descendant_post+0x19c/0x290 [ 262.262250] kernfs_new_node+0x92/0x120 [ 262.266208] __kernfs_create_file+0x51/0x340 [ 262.270601] sysfs_add_file_mode_ns+0x226/0x540 [ 262.275270] internal_create_group+0x355/0xb20 [ 262.279847] ? sysfs_remove_link_from_group+0x70/0x70 [ 262.285027] ? lock_downgrade+0x720/0x720 [ 262.289170] lo_ioctl+0xf7c/0x20e0 [ 262.292700] ? loop_set_status64+0x110/0x110 [ 262.297103] blkdev_ioctl+0x5cb/0x1a80 [ 262.300985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.306337] ? blkpg_ioctl+0x9d0/0x9d0 [ 262.310210] ? mark_held_locks+0xf0/0xf0 [ 262.314254] ? mark_held_locks+0xf0/0xf0 [ 262.318303] ? debug_check_no_obj_freed+0x201/0x490 [ 262.323319] ? lock_downgrade+0x720/0x720 [ 262.327461] block_ioctl+0xe9/0x130 [ 262.331082] ? blkdev_fallocate+0x3f0/0x3f0 [ 262.335396] do_vfs_ioctl+0xcdb/0x12e0 [ 262.339266] ? lock_downgrade+0x720/0x720 [ 262.343400] ? check_preemption_disabled+0x41/0x280 [ 262.348400] ? ioctl_preallocate+0x200/0x200 [ 262.352792] ? __fget+0x356/0x510 [ 262.356227] ? do_dup2+0x450/0x450 [ 262.359757] ? do_sys_open+0x2bf/0x520 [ 262.363631] ksys_ioctl+0x9b/0xc0 [ 262.367071] __x64_sys_ioctl+0x6f/0xb0 [ 262.370949] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 262.375526] do_syscall_64+0xf9/0x620 [ 262.379311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.384484] RIP: 0033:0x7fbfc0e6dea7 [ 262.388181] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 262.407062] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.414763] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 262.422019] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 262.429270] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 262.436522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.443776] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:46 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 262.491789] erofs: read_super, device -> /dev/loop3 [ 262.496836] erofs: options -> fault_injection=0x0000000000000001, [ 262.515061] erofs: unmounted for /dev/loop4 [ 262.515773] erofs: cannot find valid erofs superblock 17:18:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 262.568039] erofs: read_super, device -> /dev/loop0 [ 262.573166] erofs: options -> [ 262.586907] erofs: root inode @ nid 36 [ 262.601582] erofs: bogus i_mode (0) @ nid 36 17:18:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 14) [ 262.703897] erofs: read_super, device -> /dev/loop5 [ 262.723648] erofs: options -> fault_injection=0x0000000000000001, [ 262.730499] erofs: read_super, device -> /dev/loop1 [ 262.732422] erofs: read_super, device -> /dev/loop2 [ 262.735517] erofs: options -> fault_injection=0x0000000000000001, [ 262.735572] erofs: cannot find valid erofs superblock [ 262.752760] erofs: options -> fault_injection=0x0000000000000001, [ 262.773119] erofs: read_super, device -> /dev/loop4 [ 262.776595] erofs: cannot find valid erofs superblock [ 262.779206] erofs: options -> fault_injection=0x0000000000000001, [ 262.792868] erofs: cannot find valid erofs superblock [ 262.793462] erofs: FAULT_INJECTION was not selected 17:18:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 262.805605] erofs: root inode @ nid 36 [ 262.810875] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 262.831451] erofs: read_super, device -> /dev/loop3 [ 262.836486] erofs: options -> fault_injection=0x0000000000000001, [ 262.843148] FAULT_INJECTION: forcing a failure. [ 262.843148] name failslab, interval 1, probability 0, space 0, times 0 [ 262.857856] erofs: cannot find valid erofs superblock [ 262.863361] CPU: 1 PID: 18650 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 262.871241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.880577] Call Trace: [ 262.883151] dump_stack+0x1fc/0x2ef [ 262.886762] should_fail.cold+0xa/0xf [ 262.890552] ? setup_fault_attr+0x200/0x200 [ 262.894858] ? lock_acquire+0x170/0x3c0 [ 262.898840] __should_failslab+0x115/0x180 [ 262.903080] should_failslab+0x5/0x10 [ 262.906969] kmem_cache_alloc+0x277/0x370 [ 262.911121] __kernfs_new_node+0xd2/0x680 [ 262.915259] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 262.920008] ? __mutex_unlock_slowpath+0xea/0x610 [ 262.924851] ? wait_for_completion_io+0x10/0x10 [ 262.929509] ? kernfs_next_descendant_post+0x19c/0x290 [ 262.934786] kernfs_new_node+0x92/0x120 [ 262.938757] __kernfs_create_file+0x51/0x340 [ 262.943152] sysfs_add_file_mode_ns+0x226/0x540 [ 262.947820] internal_create_group+0x355/0xb20 [ 262.952390] ? sysfs_remove_link_from_group+0x70/0x70 [ 262.957564] ? lock_downgrade+0x720/0x720 [ 262.961700] lo_ioctl+0xf7c/0x20e0 [ 262.965229] ? loop_set_status64+0x110/0x110 [ 262.969623] blkdev_ioctl+0x5cb/0x1a80 [ 262.973497] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.978845] ? blkpg_ioctl+0x9d0/0x9d0 [ 262.982716] ? mark_held_locks+0xf0/0xf0 [ 262.986760] ? mark_held_locks+0xf0/0xf0 [ 262.990807] ? debug_check_no_obj_freed+0x201/0x490 [ 262.995821] ? lock_downgrade+0x720/0x720 [ 262.999963] block_ioctl+0xe9/0x130 [ 263.003580] ? blkdev_fallocate+0x3f0/0x3f0 [ 263.008018] do_vfs_ioctl+0xcdb/0x12e0 [ 263.011897] ? lock_downgrade+0x720/0x720 [ 263.016036] ? check_preemption_disabled+0x41/0x280 [ 263.021039] ? ioctl_preallocate+0x200/0x200 [ 263.025432] ? __fget+0x356/0x510 [ 263.028889] ? do_dup2+0x450/0x450 [ 263.032414] ? do_sys_open+0x2bf/0x520 [ 263.036292] ksys_ioctl+0x9b/0xc0 [ 263.039731] __x64_sys_ioctl+0x6f/0xb0 [ 263.043617] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 263.048191] do_syscall_64+0xf9/0x620 [ 263.051995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.057174] RIP: 0033:0x7fbfc0e6dea7 [ 263.060895] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 263.079782] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.087474] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 263.094725] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 263.101985] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 263.109237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 263.116491] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 263.258552] erofs: read_super, device -> /dev/loop0 17:18:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 263.279186] erofs: options -> [ 263.289540] erofs: root inode @ nid 36 [ 263.289751] erofs: read_super, device -> /dev/loop5 [ 263.299094] erofs: bogus i_mode (0) @ nid 36 17:18:47 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 263.324115] erofs: options -> fault_injection=0x0000000000000001, [ 263.330626] erofs: unmounted for /dev/loop4 [ 263.336865] erofs: FAULT_INJECTION was not selected [ 263.342443] erofs: root inode @ nid 36 [ 263.347009] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. 17:18:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 263.376424] erofs: unmounted for /dev/loop5 [ 263.408484] erofs: read_super, device -> /dev/loop3 [ 263.413636] erofs: options -> fault_injection=0x0000000000000001, [ 263.415096] erofs: read_super, device -> /dev/loop1 [ 263.422975] erofs: FAULT_INJECTION was not selected [ 263.425430] erofs: options -> fault_injection=0x0000000000000001, [ 263.437018] erofs: root inode @ nid 36 [ 263.441108] erofs: cannot find valid erofs superblock [ 263.442021] erofs: bogus i_mode (0) @ nid 36 17:18:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 15) 17:18:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 263.469939] erofs: read_super, device -> /dev/loop2 [ 263.474990] erofs: options -> fault_injection=0x0000000000000001, [ 263.498722] erofs: cannot find valid erofs superblock [ 263.604497] erofs: read_super, device -> /dev/loop3 [ 263.610334] erofs: options -> fault_injection=0x0000000000000001, [ 263.622514] erofs: read_super, device -> /dev/loop4 [ 263.627540] erofs: options -> fault_injection=0x0000000000000001, [ 263.633527] erofs: read_super, device -> /dev/loop5 17:18:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 263.652819] erofs: options -> fault_injection=0x0000000000000001, [ 263.659141] FAULT_INJECTION: forcing a failure. [ 263.659141] name failslab, interval 1, probability 0, space 0, times 0 [ 263.659159] CPU: 1 PID: 18695 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 263.659167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.659172] Call Trace: [ 263.659192] dump_stack+0x1fc/0x2ef [ 263.659215] should_fail.cold+0xa/0xf [ 263.679537] erofs: FAULT_INJECTION was not selected [ 263.687718] ? setup_fault_attr+0x200/0x200 [ 263.687735] ? lock_acquire+0x170/0x3c0 [ 263.687756] __should_failslab+0x115/0x180 [ 263.687773] should_failslab+0x5/0x10 [ 263.687790] kmem_cache_alloc+0x277/0x370 [ 263.692932] erofs: root inode @ nid 36 [ 263.693970] __kernfs_new_node+0xd2/0x680 [ 263.693991] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 263.694006] ? __mutex_unlock_slowpath+0xea/0x610 [ 263.694023] ? wait_for_completion_io+0x10/0x10 [ 263.699986] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 263.702831] ? kernfs_next_descendant_post+0x19c/0x290 [ 263.702855] kernfs_new_node+0x92/0x120 [ 263.702878] __kernfs_create_file+0x51/0x340 [ 263.710950] erofs: FAULT_INJECTION was not selected [ 263.711145] sysfs_add_file_mode_ns+0x226/0x540 [ 263.715479] erofs: root inode @ nid 36 [ 263.719154] internal_create_group+0x355/0xb20 [ 263.719175] ? sysfs_remove_link_from_group+0x70/0x70 [ 263.719190] ? lock_downgrade+0x720/0x720 [ 263.719215] lo_ioctl+0xf7c/0x20e0 [ 263.719234] ? loop_set_status64+0x110/0x110 [ 263.726801] erofs: bogus i_mode (0) @ nid 36 [ 263.727232] blkdev_ioctl+0x5cb/0x1a80 [ 263.733549] erofs: FAULT_INJECTION was not selected [ 263.736098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.736115] ? blkpg_ioctl+0x9d0/0x9d0 [ 263.736131] ? mark_held_locks+0xf0/0xf0 [ 263.736150] ? mark_held_locks+0xf0/0xf0 [ 263.743136] erofs: root inode @ nid 36 [ 263.745631] ? debug_check_no_obj_freed+0x201/0x490 [ 263.745652] ? lock_downgrade+0x720/0x720 [ 263.745666] block_ioctl+0xe9/0x130 [ 263.745680] ? blkdev_fallocate+0x3f0/0x3f0 [ 263.756000] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 263.759064] do_vfs_ioctl+0xcdb/0x12e0 [ 263.759083] ? lock_downgrade+0x720/0x720 [ 263.759099] ? check_preemption_disabled+0x41/0x280 [ 263.759113] ? ioctl_preallocate+0x200/0x200 [ 263.759131] ? __fget+0x356/0x510 [ 263.759151] ? do_dup2+0x450/0x450 [ 263.886480] ? do_sys_open+0x2bf/0x520 [ 263.890464] ksys_ioctl+0x9b/0xc0 [ 263.893904] __x64_sys_ioctl+0x6f/0xb0 [ 263.897780] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 263.902351] do_syscall_64+0xf9/0x620 [ 263.906145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.911329] RIP: 0033:0x7fbfc0e6dea7 [ 263.915023] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 263.933910] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.941604] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 263.948858] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 263.956108] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 263.963360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 263.970610] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000000000000200"/48, 0x30, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 16) [ 264.009001] erofs: read_super, device -> /dev/loop0 [ 264.014172] erofs: options -> [ 264.017731] erofs: root inode @ nid 36 [ 264.023636] erofs: bogus i_mode (0) @ nid 36 [ 264.034736] erofs: unmounted for /dev/loop5 [ 264.051267] erofs: unmounted for /dev/loop4 17:18:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 264.061249] erofs: read_super, device -> /dev/loop2 [ 264.066344] erofs: options -> fault_injection=0x0000000000000001, [ 264.076342] erofs: cannot find valid erofs superblock [ 264.110959] FAULT_INJECTION: forcing a failure. [ 264.110959] name failslab, interval 1, probability 0, space 0, times 0 [ 264.123837] CPU: 1 PID: 18714 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 264.131845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.141187] Call Trace: [ 264.143792] dump_stack+0x1fc/0x2ef [ 264.147410] should_fail.cold+0xa/0xf [ 264.151196] ? setup_fault_attr+0x200/0x200 [ 264.155500] ? lock_acquire+0x170/0x3c0 [ 264.159462] __should_failslab+0x115/0x180 [ 264.163693] should_failslab+0x5/0x10 [ 264.167486] kmem_cache_alloc+0x277/0x370 [ 264.171642] __kernfs_new_node+0xd2/0x680 [ 264.175823] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 264.180589] ? __mutex_unlock_slowpath+0xea/0x610 [ 264.185432] ? wait_for_completion_io+0x10/0x10 [ 264.190093] ? kernfs_next_descendant_post+0x19c/0x290 [ 264.195356] kernfs_new_node+0x92/0x120 [ 264.199320] __kernfs_create_file+0x51/0x340 [ 264.203725] sysfs_add_file_mode_ns+0x226/0x540 [ 264.208398] internal_create_group+0x355/0xb20 [ 264.212974] ? sysfs_remove_link_from_group+0x70/0x70 [ 264.218149] ? lock_downgrade+0x720/0x720 [ 264.222287] lo_ioctl+0xf7c/0x20e0 [ 264.225831] ? loop_set_status64+0x110/0x110 [ 264.230237] blkdev_ioctl+0x5cb/0x1a80 [ 264.234117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.239463] ? blkpg_ioctl+0x9d0/0x9d0 [ 264.243333] ? mark_held_locks+0xf0/0xf0 [ 264.247375] ? mark_held_locks+0xf0/0xf0 [ 264.251424] ? debug_check_no_obj_freed+0x201/0x490 [ 264.256431] ? lock_downgrade+0x720/0x720 [ 264.260565] block_ioctl+0xe9/0x130 [ 264.264175] ? blkdev_fallocate+0x3f0/0x3f0 [ 264.268478] do_vfs_ioctl+0xcdb/0x12e0 [ 264.272421] ? lock_downgrade+0x720/0x720 [ 264.276568] ? check_preemption_disabled+0x41/0x280 [ 264.281586] ? ioctl_preallocate+0x200/0x200 [ 264.285980] ? __fget+0x356/0x510 [ 264.289416] ? do_dup2+0x450/0x450 [ 264.292941] ? do_sys_open+0x2bf/0x520 [ 264.296823] ksys_ioctl+0x9b/0xc0 [ 264.300283] __x64_sys_ioctl+0x6f/0xb0 [ 264.304161] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 264.308728] do_syscall_64+0xf9/0x620 [ 264.312531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.317721] RIP: 0033:0x7fbfc0e6dea7 [ 264.321427] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 264.340326] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.348031] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 264.355296] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 264.362562] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 264.369816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 264.377072] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:18:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 264.445829] erofs: read_super, device -> /dev/loop0 [ 264.455264] erofs: options -> [ 264.461700] erofs: read_super, device -> /dev/loop1 [ 264.463435] erofs: read_super, device -> /dev/loop3 [ 264.466808] erofs: options -> fault_injection=0x0000000000000001, [ 264.483835] erofs: options -> fault_injection=0x0000000000000001, [ 264.490020] erofs: root inode @ nid 36 [ 264.499416] erofs: read_super, device -> /dev/loop5 [ 264.504482] erofs: FAULT_INJECTION was not selected [ 264.509635] erofs: options -> fault_injection=0x0000000000000001, [ 264.511010] erofs: cannot find valid erofs superblock [ 264.516113] erofs: root inode @ nid 36 [ 264.529419] erofs: FAULT_INJECTION was not selected [ 264.532281] erofs: bogus i_mode (0) @ nid 36 [ 264.534438] erofs: root inode @ nid 36 17:18:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000", 0x18, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 264.534767] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. [ 264.553314] erofs: bogus i_mode (0) @ nid 36 17:18:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 264.648462] erofs: read_super, device -> /dev/loop4 [ 264.653499] erofs: options -> fault_injection=0x0000000000000001, [ 264.660818] erofs: read_super, device -> /dev/loop2 [ 264.665834] erofs: options -> fault_injection=0x0000000000000001, 17:18:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 17:18:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 17) [ 264.713415] erofs: read_super, device -> /dev/loop3 [ 264.714023] erofs: FAULT_INJECTION was not selected [ 264.727382] erofs: unmounted for /dev/loop5 [ 264.732332] erofs: FAULT_INJECTION was not selected [ 264.740788] erofs: root inode @ nid 36 [ 264.746257] erofs: options -> fault_injection=0x0000000000000001, [ 264.747065] erofs: root inode @ nid 36 [ 264.754702] erofs: FAULT_INJECTION was not selected [ 264.762492] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 264.765420] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. [ 264.777165] erofs: root inode @ nid 36 [ 264.799266] erofs: bogus i_mode (0) @ nid 36 [ 264.804068] FAULT_INJECTION: forcing a failure. 17:18:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 264.804068] name failslab, interval 1, probability 0, space 0, times 0 [ 264.818286] erofs: unmounted for /dev/loop4 [ 264.819573] CPU: 1 PID: 18752 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 264.830490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.839827] Call Trace: [ 264.842411] dump_stack+0x1fc/0x2ef [ 264.846045] should_fail.cold+0xa/0xf [ 264.849842] ? setup_fault_attr+0x200/0x200 [ 264.854161] ? lock_acquire+0x170/0x3c0 [ 264.858144] __should_failslab+0x115/0x180 [ 264.862374] should_failslab+0x5/0x10 [ 264.866168] kmem_cache_alloc+0x277/0x370 [ 264.870312] __kernfs_new_node+0xd2/0x680 [ 264.874456] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 264.879209] ? __mutex_unlock_slowpath+0xea/0x610 [ 264.884041] ? wait_for_completion_io+0x10/0x10 [ 264.888700] ? kernfs_next_descendant_post+0x19c/0x290 [ 264.893973] kernfs_new_node+0x92/0x120 [ 264.897941] __kernfs_create_file+0x51/0x340 [ 264.902358] sysfs_add_file_mode_ns+0x226/0x540 [ 264.907046] internal_create_group+0x355/0xb20 [ 264.911631] ? sysfs_remove_link_from_group+0x70/0x70 [ 264.916815] ? lock_downgrade+0x720/0x720 [ 264.920975] lo_ioctl+0xf7c/0x20e0 [ 264.924518] ? loop_set_status64+0x110/0x110 [ 264.928922] blkdev_ioctl+0x5cb/0x1a80 [ 264.932804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.938157] ? blkpg_ioctl+0x9d0/0x9d0 [ 264.942041] ? mark_held_locks+0xf0/0xf0 [ 264.946095] ? mark_held_locks+0xf0/0xf0 [ 264.950148] ? debug_check_no_obj_freed+0x201/0x490 [ 264.955183] ? lock_downgrade+0x720/0x720 [ 264.959338] block_ioctl+0xe9/0x130 [ 264.962962] ? blkdev_fallocate+0x3f0/0x3f0 [ 264.967283] do_vfs_ioctl+0xcdb/0x12e0 [ 264.971169] ? lock_downgrade+0x720/0x720 [ 264.975311] ? check_preemption_disabled+0x41/0x280 [ 264.980319] ? ioctl_preallocate+0x200/0x200 [ 264.984726] ? __fget+0x356/0x510 [ 264.988172] ? do_dup2+0x450/0x450 [ 264.991701] ? do_sys_open+0x2bf/0x520 [ 264.995580] ksys_ioctl+0x9b/0xc0 [ 264.999028] __x64_sys_ioctl+0x6f/0xb0 [ 265.002903] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 265.007474] do_syscall_64+0xf9/0x620 [ 265.011268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.016444] RIP: 0033:0x7fbfc0e6dea7 [ 265.020147] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 265.039043] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.046745] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 265.054009] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:18:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 265.061291] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 265.068549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 265.075812] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 265.101955] erofs: read_super, device -> /dev/loop1 [ 265.107333] erofs: options -> fault_injection=0x0000000000000001, [ 265.124437] erofs: unmounted for /dev/loop2 [ 265.129015] erofs: blksize 1 isn't supported on this platform [ 265.171866] erofs: read_super, device -> /dev/loop0 [ 265.177012] erofs: options -> [ 265.180947] erofs: root inode @ nid 36 [ 265.185120] erofs: bogus i_mode (0) @ nid 36 17:18:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000", 0x18, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 17:18:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 18) 17:18:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 265.436800] erofs: read_super, device -> /dev/loop2 [ 265.445964] erofs: options -> fault_injection=0x0000000000000001, [ 265.453582] FAULT_INJECTION: forcing a failure. [ 265.453582] name failslab, interval 1, probability 0, space 0, times 0 [ 265.460051] erofs: FAULT_INJECTION was not selected [ 265.465076] CPU: 0 PID: 18787 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 265.473122] erofs: root inode @ nid 36 [ 265.477697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.477702] Call Trace: [ 265.477724] dump_stack+0x1fc/0x2ef [ 265.477743] should_fail.cold+0xa/0xf [ 265.477761] ? setup_fault_attr+0x200/0x200 [ 265.477775] ? lock_acquire+0x170/0x3c0 [ 265.477795] __should_failslab+0x115/0x180 [ 265.477810] should_failslab+0x5/0x10 [ 265.477823] kmem_cache_alloc+0x277/0x370 [ 265.477842] __kernfs_new_node+0xd2/0x680 [ 265.477858] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 265.477876] ? __mutex_unlock_slowpath+0xea/0x610 [ 265.477893] ? wait_for_completion_io+0x10/0x10 [ 265.477907] ? kernfs_next_descendant_post+0x19c/0x290 [ 265.477928] kernfs_new_node+0x92/0x120 [ 265.477949] __kernfs_create_file+0x51/0x340 [ 265.477969] sysfs_add_file_mode_ns+0x226/0x540 [ 265.477996] internal_create_group+0x355/0xb20 [ 265.478016] ? sysfs_remove_link_from_group+0x70/0x70 [ 265.478030] ? lock_downgrade+0x720/0x720 [ 265.478057] lo_ioctl+0xf7c/0x20e0 [ 265.478076] ? loop_set_status64+0x110/0x110 [ 265.478093] blkdev_ioctl+0x5cb/0x1a80 [ 265.478109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.478122] ? blkpg_ioctl+0x9d0/0x9d0 [ 265.478138] ? mark_held_locks+0xf0/0xf0 [ 265.478153] ? mark_held_locks+0xf0/0xf0 [ 265.478171] ? debug_check_no_obj_freed+0x201/0x490 [ 265.478191] ? lock_downgrade+0x720/0x720 [ 265.478207] block_ioctl+0xe9/0x130 [ 265.478219] ? blkdev_fallocate+0x3f0/0x3f0 [ 265.478234] do_vfs_ioctl+0xcdb/0x12e0 [ 265.478250] ? lock_downgrade+0x720/0x720 [ 265.478265] ? check_preemption_disabled+0x41/0x280 17:18:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 265.478279] ? ioctl_preallocate+0x200/0x200 [ 265.478298] ? __fget+0x356/0x510 [ 265.478315] ? do_dup2+0x450/0x450 [ 265.478329] ? do_sys_open+0x2bf/0x520 [ 265.478351] ksys_ioctl+0x9b/0xc0 [ 265.478368] __x64_sys_ioctl+0x6f/0xb0 [ 265.478382] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 265.478396] do_syscall_64+0xf9/0x620 [ 265.478415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.478426] RIP: 0033:0x7fbfc0e6dea7 [ 265.478439] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 265.478447] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.478461] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 265.478469] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 265.478477] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 265.478484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 265.478492] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 265.482529] erofs: read_super, device -> /dev/loop4 [ 265.526311] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. [ 265.529760] erofs: options -> fault_injection=0x0000000000000001, [ 265.557922] erofs: read_super, device -> /dev/loop1 [ 265.563633] erofs: read_super, device -> /dev/loop3 [ 265.566803] erofs: options -> fault_injection=0x0000000000000001, [ 265.576251] erofs: read_super, device -> /dev/loop0 [ 265.599651] erofs: cannot find valid erofs superblock [ 265.613860] erofs: FAULT_INJECTION was not selected [ 265.649302] erofs: unmounted for /dev/loop2 [ 265.673687] erofs: options -> fault_injection=0x0000000000000001, [ 265.733420] erofs: options -> [ 265.739396] erofs: FAULT_INJECTION was not selected [ 265.746218] erofs: root inode @ nid 36 [ 265.751191] erofs: root inode @ nid 36 [ 265.751238] erofs: bogus i_mode (0) @ nid 36 [ 265.751329] erofs: root inode @ nid 36 [ 265.794169] erofs: bogus i_mode (0) @ nid 36 [ 265.803114] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:18:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000", 0x18, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 19) 17:18:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e803000000000000", 0x20, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, 0x0) [ 265.958324] erofs: unmounted for /dev/loop4 [ 266.040772] FAULT_INJECTION: forcing a failure. [ 266.040772] name failslab, interval 1, probability 0, space 0, times 0 [ 266.052460] CPU: 0 PID: 18816 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 266.060357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.069706] Call Trace: [ 266.072281] dump_stack+0x1fc/0x2ef [ 266.075895] should_fail.cold+0xa/0xf [ 266.079710] ? setup_fault_attr+0x200/0x200 [ 266.084024] ? lock_acquire+0x170/0x3c0 [ 266.088000] __should_failslab+0x115/0x180 [ 266.092244] should_failslab+0x5/0x10 [ 266.096029] kmem_cache_alloc+0x277/0x370 [ 266.100176] __kernfs_new_node+0xd2/0x680 [ 266.104324] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 266.109078] ? __mutex_unlock_slowpath+0xea/0x610 [ 266.113911] ? wait_for_completion_io+0x10/0x10 [ 266.118578] ? kernfs_next_descendant_post+0x19c/0x290 [ 266.123852] kernfs_new_node+0x92/0x120 [ 266.127829] __kernfs_create_file+0x51/0x340 [ 266.132232] sysfs_add_file_mode_ns+0x226/0x540 [ 266.136905] internal_create_group+0x355/0xb20 [ 266.141478] ? sysfs_remove_link_from_group+0x70/0x70 [ 266.146650] ? lock_downgrade+0x720/0x720 [ 266.150810] lo_ioctl+0xf7c/0x20e0 [ 266.154344] ? loop_set_status64+0x110/0x110 [ 266.158746] blkdev_ioctl+0x5cb/0x1a80 [ 266.162625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.167981] ? blkpg_ioctl+0x9d0/0x9d0 [ 266.171862] ? mark_held_locks+0xf0/0xf0 [ 266.175905] ? mark_held_locks+0xf0/0xf0 [ 266.179969] ? debug_check_no_obj_freed+0x201/0x490 [ 266.184977] ? lock_downgrade+0x720/0x720 [ 266.189121] block_ioctl+0xe9/0x130 [ 266.192734] ? blkdev_fallocate+0x3f0/0x3f0 [ 266.197048] do_vfs_ioctl+0xcdb/0x12e0 [ 266.200927] ? lock_downgrade+0x720/0x720 [ 266.205058] ? check_preemption_disabled+0x41/0x280 [ 266.210066] ? ioctl_preallocate+0x200/0x200 [ 266.214475] ? __fget+0x356/0x510 [ 266.217930] ? do_dup2+0x450/0x450 [ 266.221461] ? do_sys_open+0x2bf/0x520 [ 266.225333] ksys_ioctl+0x9b/0xc0 [ 266.228782] __x64_sys_ioctl+0x6f/0xb0 [ 266.232681] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 266.237245] do_syscall_64+0xf9/0x620 [ 266.241042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.246225] RIP: 0033:0x7fbfc0e6dea7 [ 266.249933] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 266.268834] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.276536] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 266.283785] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.291036] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 266.298292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 266.305552] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 266.367743] erofs: read_super, device -> /dev/loop0 [ 266.373844] erofs: options -> [ 266.379896] erofs: root inode @ nid 36 [ 266.383516] erofs: read_super, device -> /dev/loop1 [ 266.384058] erofs: bogus i_mode (0) @ nid 36 [ 266.389191] erofs: read_super, device -> /dev/loop3 [ 266.410997] erofs: options -> fault_injection=0x0000000000000001, [ 266.421092] erofs: options -> fault_injection=0x0000000000000001, [ 266.430470] erofs: FAULT_INJECTION was not selected [ 266.441654] erofs: root inode @ nid 36 [ 266.445810] erofs: bogus i_mode (0) @ nid 36 [ 266.450546] erofs: cannot find valid erofs superblock 17:18:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 20) 17:18:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, 0x0) 17:18:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000e8030000", 0x1c, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 266.469359] erofs: read_super, device -> /dev/loop5 [ 266.474608] erofs: options -> [ 266.482677] erofs: root inode @ nid 36 [ 266.486824] erofs: mounted on /dev/loop5 with opts: . 17:18:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 266.538464] erofs: read_super, device -> /dev/loop4 [ 266.552756] erofs: options -> fault_injection=0x0000000000000001, [ 266.569193] erofs: FAULT_INJECTION was not selected [ 266.574306] erofs: root inode @ nid 36 [ 266.579264] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:18:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 266.602556] FAULT_INJECTION: forcing a failure. [ 266.602556] name failslab, interval 1, probability 0, space 0, times 0 [ 266.613909] erofs: unmounted for /dev/loop5 [ 266.613931] CPU: 1 PID: 18842 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 266.626104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.635444] Call Trace: [ 266.638017] dump_stack+0x1fc/0x2ef [ 266.641626] should_fail.cold+0xa/0xf [ 266.645415] ? setup_fault_attr+0x200/0x200 [ 266.649725] ? lock_acquire+0x170/0x3c0 [ 266.653684] ? dev_uevent_filter+0xd0/0xd0 [ 266.657901] __should_failslab+0x115/0x180 [ 266.662119] should_failslab+0x5/0x10 [ 266.665903] kmem_cache_alloc_trace+0x284/0x380 [ 266.670559] ? dev_uevent_filter+0xd0/0xd0 [ 266.674779] kobject_uevent_env+0x236/0x1480 [ 266.679178] lo_ioctl+0xff9/0x20e0 [ 266.682700] ? loop_set_status64+0x110/0x110 [ 266.687089] blkdev_ioctl+0x5cb/0x1a80 [ 266.690957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.696301] ? blkpg_ioctl+0x9d0/0x9d0 [ 266.700181] ? mark_held_locks+0xf0/0xf0 [ 266.704234] ? mark_held_locks+0xf0/0xf0 [ 266.708291] ? debug_check_no_obj_freed+0x201/0x490 [ 266.713295] ? lock_downgrade+0x720/0x720 [ 266.717429] block_ioctl+0xe9/0x130 [ 266.721039] ? blkdev_fallocate+0x3f0/0x3f0 [ 266.725343] do_vfs_ioctl+0xcdb/0x12e0 [ 266.729215] ? lock_downgrade+0x720/0x720 [ 266.733360] ? check_preemption_disabled+0x41/0x280 [ 266.738369] ? ioctl_preallocate+0x200/0x200 [ 266.742761] ? __fget+0x356/0x510 [ 266.746196] ? do_dup2+0x450/0x450 [ 266.749722] ? do_sys_open+0x2bf/0x520 [ 266.753623] ksys_ioctl+0x9b/0xc0 [ 266.757065] __x64_sys_ioctl+0x6f/0xb0 [ 266.760945] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 266.765518] do_syscall_64+0xf9/0x620 [ 266.769305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.774474] RIP: 0033:0x7fbfc0e6dea7 [ 266.778177] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:18:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 266.797067] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.804865] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 266.812127] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.819390] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 266.826651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 266.833911] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 266.884740] erofs: unmounted for /dev/loop4 [ 266.929684] erofs: read_super, device -> /dev/loop0 [ 266.934739] erofs: options -> [ 266.938960] erofs: root inode @ nid 36 [ 266.943027] erofs: bogus i_mode (0) @ nid 36 [ 266.972206] erofs: read_super, device -> /dev/loop1 [ 266.979279] erofs: options -> fault_injection=0x0000000000000001, [ 266.986113] erofs: cannot find valid erofs superblock 17:18:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, 0x0) [ 267.032458] erofs: read_super, device -> /dev/loop3 [ 267.037950] erofs: options -> fault_injection=0x0000000000000001, [ 267.044638] erofs: FAULT_INJECTION was not selected [ 267.053322] erofs: root inode @ nid 36 [ 267.058003] erofs: bogus i_mode (0) @ nid 36 17:18:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 21) 17:18:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1", 0x2, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000", 0x18, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 267.188326] erofs: read_super, device -> /dev/loop5 [ 267.193372] erofs: options -> [ 267.196949] erofs: read_super, device -> /dev/loop4 [ 267.208523] erofs: options -> fault_injection=0x0000000000000001, [ 267.223537] erofs: root inode @ nid 36 [ 267.234374] erofs: FAULT_INJECTION was not selected [ 267.244174] erofs: mounted on /dev/loop5 with opts: . [ 267.262736] erofs: root inode @ nid 36 [ 267.281174] FAULT_INJECTION: forcing a failure. 17:18:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 267.281174] name failslab, interval 1, probability 0, space 0, times 0 [ 267.292908] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 267.297287] CPU: 1 PID: 18881 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 267.308927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.318271] Call Trace: [ 267.320864] dump_stack+0x1fc/0x2ef [ 267.324491] should_fail.cold+0xa/0xf [ 267.328287] ? setup_fault_attr+0x200/0x200 [ 267.332645] ? lock_acquire+0x170/0x3c0 [ 267.336608] __should_failslab+0x115/0x180 [ 267.340832] should_failslab+0x5/0x10 [ 267.344618] kmem_cache_alloc_node+0x245/0x3b0 [ 267.349198] __alloc_skb+0x71/0x560 [ 267.352815] alloc_uevent_skb+0x7b/0x210 [ 267.356863] kobject_uevent_env+0xa90/0x1480 [ 267.361261] lo_ioctl+0xff9/0x20e0 [ 267.364785] ? loop_set_status64+0x110/0x110 [ 267.369180] blkdev_ioctl+0x5cb/0x1a80 [ 267.373059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.378409] ? blkpg_ioctl+0x9d0/0x9d0 [ 267.382294] ? mark_held_locks+0xf0/0xf0 [ 267.386359] ? mark_held_locks+0xf0/0xf0 [ 267.390405] ? debug_check_no_obj_freed+0x201/0x490 [ 267.395414] ? lock_downgrade+0x720/0x720 [ 267.399548] block_ioctl+0xe9/0x130 [ 267.403314] ? blkdev_fallocate+0x3f0/0x3f0 [ 267.407643] do_vfs_ioctl+0xcdb/0x12e0 [ 267.411523] ? lock_downgrade+0x720/0x720 [ 267.415654] ? check_preemption_disabled+0x41/0x280 [ 267.420652] ? ioctl_preallocate+0x200/0x200 [ 267.425042] ? __fget+0x356/0x510 [ 267.428481] ? do_dup2+0x450/0x450 [ 267.432014] ? do_sys_open+0x2bf/0x520 [ 267.435896] ksys_ioctl+0x9b/0xc0 [ 267.439350] __x64_sys_ioctl+0x6f/0xb0 [ 267.443231] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 267.447805] do_syscall_64+0xf9/0x620 [ 267.451591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.456761] RIP: 0033:0x7fbfc0e6dea7 [ 267.460460] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 267.479343] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.487034] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 267.494291] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.501557] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 267.508808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 267.516058] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 267.524507] erofs: unmounted for /dev/loop5 17:18:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[]) 17:18:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 267.596008] erofs: unmounted for /dev/loop4 [ 267.618225] erofs: read_super, device -> /dev/loop0 [ 267.623381] erofs: options -> [ 267.623599] erofs: read_super, device -> /dev/loop3 [ 267.633253] erofs: root inode @ nid 36 [ 267.633376] erofs: read_super, device -> /dev/loop1 [ 267.642412] erofs: bogus i_mode (0) @ nid 36 [ 267.642499] erofs: options -> fault_injection=0x0000000000000001, [ 267.650102] erofs: options -> fault_injection=0x0000000000000001, [ 267.653765] erofs: FAULT_INJECTION was not selected [ 267.660989] erofs: cannot find valid erofs superblock [ 267.669761] erofs: root inode @ nid 36 [ 267.669994] erofs: bogus i_mode (0) @ nid 36 17:18:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024000000000000000000", 0x18, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 22) 17:18:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1", 0x2, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[]) [ 267.872030] erofs: read_super, device -> /dev/loop2 [ 267.877070] erofs: options -> [ 267.884760] erofs: root inode @ nid 36 [ 267.894526] erofs: mounted on /dev/loop2 with opts: . [ 267.934782] erofs: unmounted for /dev/loop2 [ 267.937693] erofs: read_super, device -> /dev/loop3 [ 267.947643] erofs: options -> fault_injection=0x0000000000000001, [ 267.966011] erofs: FAULT_INJECTION was not selected [ 267.971289] erofs: root inode @ nid 36 [ 267.975563] erofs: bogus i_mode (0) @ nid 36 [ 268.021004] erofs: read_super, device -> /dev/loop5 [ 268.022754] erofs: read_super, device -> /dev/loop4 [ 268.026141] erofs: options -> [ 268.027074] erofs: root inode @ nid 36 [ 268.037706] erofs: options -> fault_injection=0x0000000000000001, [ 268.043644] erofs: mounted on /dev/loop5 with opts: . [ 268.045535] FAULT_INJECTION: forcing a failure. [ 268.045535] name failslab, interval 1, probability 0, space 0, times 0 [ 268.061734] erofs: cannot find valid erofs superblock [ 268.066954] CPU: 1 PID: 18920 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 268.074829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.084175] Call Trace: [ 268.086751] dump_stack+0x1fc/0x2ef [ 268.090369] should_fail.cold+0xa/0xf [ 268.094176] ? setup_fault_attr+0x200/0x200 [ 268.098495] ? lock_acquire+0x170/0x3c0 [ 268.102461] __should_failslab+0x115/0x180 [ 268.106697] should_failslab+0x5/0x10 [ 268.110496] kmem_cache_alloc+0x277/0x370 [ 268.114635] skb_clone+0x151/0x3d0 [ 268.118172] netlink_broadcast_filtered+0x8e5/0xbc0 [ 268.123194] netlink_broadcast+0x35/0x40 [ 268.127244] kobject_uevent_env+0xa56/0x1480 [ 268.131644] lo_ioctl+0xff9/0x20e0 [ 268.135178] ? loop_set_status64+0x110/0x110 [ 268.139575] blkdev_ioctl+0x5cb/0x1a80 [ 268.143446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.148798] ? blkpg_ioctl+0x9d0/0x9d0 [ 268.152676] ? mark_held_locks+0xf0/0xf0 [ 268.156857] ? mark_held_locks+0xf0/0xf0 [ 268.160912] ? debug_check_no_obj_freed+0x201/0x490 [ 268.165934] ? lock_downgrade+0x720/0x720 [ 268.170076] block_ioctl+0xe9/0x130 [ 268.173692] ? blkdev_fallocate+0x3f0/0x3f0 [ 268.178005] do_vfs_ioctl+0xcdb/0x12e0 [ 268.181895] ? lock_downgrade+0x720/0x720 [ 268.186047] ? check_preemption_disabled+0x41/0x280 [ 268.191055] ? ioctl_preallocate+0x200/0x200 [ 268.195454] ? __fget+0x356/0x510 [ 268.198899] ? do_dup2+0x450/0x450 [ 268.202425] ? do_sys_open+0x2bf/0x520 [ 268.206300] ksys_ioctl+0x9b/0xc0 [ 268.209755] __x64_sys_ioctl+0x6f/0xb0 [ 268.213642] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 268.218237] do_syscall_64+0xf9/0x620 [ 268.222038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.227222] RIP: 0033:0x7fbfc0e6dea7 [ 268.230924] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 268.249810] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.257502] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 268.264766] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.272032] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 268.279285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 268.286534] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 268.297713] erofs: read_super, device -> /dev/loop1 [ 268.302749] erofs: options -> fault_injection=0x0000000000000001, [ 268.311764] erofs: cannot find valid erofs superblock [ 268.317177] erofs: read_super, device -> /dev/loop0 17:18:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00240000000000", 0x14, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:18:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 268.322330] erofs: options -> [ 268.332001] erofs: root inode @ nid 36 [ 268.337070] erofs: bogus i_mode (0) @ nid 36 [ 268.348269] erofs: read_super, device -> /dev/loop2 [ 268.353578] erofs: options -> [ 268.358094] erofs: unmounted for /dev/loop5 [ 268.364893] erofs: root inode @ nid 36 17:18:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 23) [ 268.405028] erofs: mounted on /dev/loop2 with opts: . 17:18:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1", 0x2, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 268.492639] FAULT_INJECTION: forcing a failure. [ 268.492639] name failslab, interval 1, probability 0, space 0, times 0 [ 268.506541] CPU: 0 PID: 18947 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 268.514436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.523880] Call Trace: [ 268.526459] dump_stack+0x1fc/0x2ef [ 268.530076] should_fail.cold+0xa/0xf [ 268.533865] ? setup_fault_attr+0x200/0x200 [ 268.538186] ? lock_acquire+0x170/0x3c0 [ 268.542164] __should_failslab+0x115/0x180 [ 268.546396] should_failslab+0x5/0x10 [ 268.550212] kmem_cache_alloc+0x277/0x370 [ 268.554382] skb_clone+0x151/0x3d0 [ 268.557935] netlink_broadcast_filtered+0x8e5/0xbc0 [ 268.562953] netlink_broadcast+0x35/0x40 [ 268.567004] kobject_uevent_env+0xa56/0x1480 [ 268.571426] lo_ioctl+0xff9/0x20e0 [ 268.574960] ? loop_set_status64+0x110/0x110 [ 268.579366] blkdev_ioctl+0x5cb/0x1a80 [ 268.583249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.588597] ? blkpg_ioctl+0x9d0/0x9d0 [ 268.592469] ? mark_held_locks+0xf0/0xf0 [ 268.596512] ? mark_held_locks+0xf0/0xf0 [ 268.600571] ? debug_check_no_obj_freed+0x201/0x490 [ 268.605581] ? lock_downgrade+0x720/0x720 [ 268.609715] block_ioctl+0xe9/0x130 [ 268.613325] ? blkdev_fallocate+0x3f0/0x3f0 [ 268.617641] do_vfs_ioctl+0xcdb/0x12e0 [ 268.621533] ? lock_downgrade+0x720/0x720 [ 268.625672] ? check_preemption_disabled+0x41/0x280 [ 268.630683] ? ioctl_preallocate+0x200/0x200 [ 268.635107] ? __fget+0x356/0x510 [ 268.638570] ? do_dup2+0x450/0x450 [ 268.642114] ? do_sys_open+0x2bf/0x520 [ 268.645997] ksys_ioctl+0x9b/0xc0 [ 268.649435] __x64_sys_ioctl+0x6f/0xb0 [ 268.653318] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 268.657908] do_syscall_64+0xf9/0x620 [ 268.661719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.666901] RIP: 0033:0x7fbfc0e6dea7 [ 268.670599] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 268.689492] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.697183] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 268.704700] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.711962] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 268.719235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 268.726496] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 268.745904] erofs: read_super, device -> /dev/loop3 [ 268.751706] erofs: options -> fault_injection=0x0000000000000001, [ 268.761587] erofs: read_super, device -> /dev/loop5 [ 268.766622] erofs: options -> [ 268.767193] erofs: read_super, device -> /dev/loop0 [ 268.777923] erofs: root inode @ nid 36 [ 268.786304] erofs: options -> [ 268.786610] erofs: read_super, device -> /dev/loop4 17:18:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[]) [ 268.795629] erofs: read_super, device -> /dev/loop1 [ 268.798343] erofs: root inode @ nid 36 [ 268.805120] erofs: options -> fault_injection=0x0000000000000001, [ 268.809234] erofs: bogus i_mode (0) @ nid 36 [ 268.815867] erofs: FAULT_INJECTION was not selected [ 268.821131] erofs: unmounted for /dev/loop2 [ 268.827157] erofs: mounted on /dev/loop5 with opts: . [ 268.832735] erofs: options -> fault_injection=0x0000000000000001, [ 268.839948] erofs: root inode @ nid 36 17:18:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5", 0x3, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 268.844106] erofs: cannot find valid erofs superblock [ 268.844303] erofs: cannot find valid erofs superblock [ 268.878590] erofs: bogus i_mode (0) @ nid 36 17:18:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 24) 17:18:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 268.895452] erofs: unmounted for /dev/loop5 17:18:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5", 0x3, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 269.008960] FAULT_INJECTION: forcing a failure. [ 269.008960] name failslab, interval 1, probability 0, space 0, times 0 [ 269.020286] CPU: 0 PID: 18973 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 269.028165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.037523] Call Trace: [ 269.040100] dump_stack+0x1fc/0x2ef [ 269.043718] should_fail.cold+0xa/0xf [ 269.047516] ? setup_fault_attr+0x200/0x200 [ 269.051833] ? lock_acquire+0x170/0x3c0 [ 269.055795] __should_failslab+0x115/0x180 [ 269.060025] should_failslab+0x5/0x10 [ 269.063822] kmem_cache_alloc_trace+0x284/0x380 [ 269.068635] ? wait_for_completion_io+0x10/0x10 [ 269.073304] ? kobj_ns_initial+0x90/0x90 [ 269.077368] call_usermodehelper_setup+0x84/0x300 [ 269.082256] kobject_uevent_env+0xe83/0x1480 [ 269.086665] lo_ioctl+0xff9/0x20e0 [ 269.090217] ? loop_set_status64+0x110/0x110 [ 269.094623] blkdev_ioctl+0x5cb/0x1a80 [ 269.098496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.103850] ? blkpg_ioctl+0x9d0/0x9d0 [ 269.107922] ? mark_held_locks+0xf0/0xf0 [ 269.111975] ? mark_held_locks+0xf0/0xf0 [ 269.116023] ? debug_check_no_obj_freed+0x201/0x490 [ 269.121032] ? lock_downgrade+0x720/0x720 [ 269.125162] block_ioctl+0xe9/0x130 [ 269.128776] ? blkdev_fallocate+0x3f0/0x3f0 [ 269.133089] do_vfs_ioctl+0xcdb/0x12e0 [ 269.136959] ? lock_downgrade+0x720/0x720 [ 269.141091] ? check_preemption_disabled+0x41/0x280 [ 269.146102] ? ioctl_preallocate+0x200/0x200 [ 269.150517] ? __fget+0x356/0x510 [ 269.153965] ? do_dup2+0x450/0x450 [ 269.157489] ? do_sys_open+0x2bf/0x520 [ 269.161361] ksys_ioctl+0x9b/0xc0 [ 269.164799] __x64_sys_ioctl+0x6f/0xb0 [ 269.168678] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 269.173251] do_syscall_64+0xf9/0x620 [ 269.177063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.182234] RIP: 0033:0x7fbfc0e6dea7 [ 269.185932] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 269.204819] RSP: 002b:00007fbfbf7e2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.212519] RAX: ffffffffffffffda RBX: 00007fbfc0eb7a20 RCX: 00007fbfc0e6dea7 [ 269.219777] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 269.227031] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 269.234290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 269.241545] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 269.298031] erofs: read_super, device -> /dev/loop5 [ 269.301581] erofs: read_super, device -> /dev/loop0 [ 269.306444] erofs: options -> [ 269.308933] erofs: read_super, device -> /dev/loop2 [ 269.313226] erofs: root inode @ nid 36 [ 269.327462] erofs: options -> [ 269.331372] erofs: mounted on /dev/loop5 with opts: . [ 269.334483] erofs: root inode @ nid 36 [ 269.343979] erofs: options -> 17:18:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 269.356183] erofs: read_super, device -> /dev/loop1 [ 269.359398] erofs: root inode @ nid 36 [ 269.375137] erofs: bogus i_mode (0) @ nid 36 [ 269.376426] erofs: options -> fault_injection=0x0000000000000001, [ 269.385994] erofs: unmounted for /dev/loop5 [ 269.388440] erofs: cannot find valid erofs superblock [ 269.391982] erofs: mounted on /dev/loop2 with opts: . 17:18:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 25) 17:18:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 269.518375] erofs: read_super, device -> /dev/loop4 [ 269.523646] erofs: options -> fault_injection=0x0000000000000001, [ 269.538193] erofs: cannot find valid erofs superblock [ 269.555136] erofs: read_super, device -> /dev/loop3 17:18:53 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5", 0x3, 0x400}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 269.583111] erofs: unmounted for /dev/loop2 [ 269.591761] erofs: options -> fault_injection=0x0000000000000001, [ 269.611289] erofs: FAULT_INJECTION was not selected [ 269.624282] erofs: root inode @ nid 36 [ 269.641570] erofs: read_super, device -> /dev/loop5 [ 269.644264] erofs: bogus i_mode (0) @ nid 36 [ 269.671743] FAULT_INJECTION: forcing a failure. [ 269.671743] name failslab, interval 1, probability 0, space 0, times 0 [ 269.685341] erofs: options -> [ 269.691141] erofs: read_super, device -> /dev/loop1 [ 269.702515] erofs: root inode @ nid 36 [ 269.713249] erofs: mounted on /dev/loop5 with opts: . [ 269.715159] erofs: options -> fault_injection=0x0000000000000001, [ 269.723959] CPU: 0 PID: 19011 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 269.728622] erofs: cannot find valid erofs superblock [ 269.732796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.732803] Call Trace: [ 269.732825] dump_stack+0x1fc/0x2ef [ 269.732847] should_fail.cold+0xa/0xf [ 269.757325] ? setup_fault_attr+0x200/0x200 [ 269.761673] ? lock_acquire+0x170/0x3c0 [ 269.765653] __should_failslab+0x115/0x180 [ 269.769873] should_failslab+0x5/0x10 [ 269.773664] kmem_cache_alloc+0x277/0x370 [ 269.777825] getname_flags+0xce/0x590 [ 269.781619] do_mkdirat+0x8d/0x2d0 [ 269.785150] ? __ia32_sys_mknod+0x120/0x120 [ 269.789459] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.794809] ? trace_hardirqs_off_caller+0x6e/0x210 [ 269.799811] ? do_syscall_64+0x21/0x620 [ 269.803809] do_syscall_64+0xf9/0x620 [ 269.807604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.812775] RIP: 0033:0x7fbfc0e6d1f7 [ 269.816471] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:18:53 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 269.835363] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 269.843067] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 269.850329] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 269.857589] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 269.864851] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 269.872103] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 17:18:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b2"]) 17:18:53 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 26) [ 269.920425] erofs: read_super, device -> /dev/loop4 [ 269.929333] erofs: unmounted for /dev/loop5 [ 269.940310] erofs: options -> fault_injection=0x0000000000000001, [ 269.953635] erofs: read_super, device -> /dev/loop2 [ 269.962216] erofs: options -> [ 269.965885] erofs: root inode @ nid 36 [ 269.971911] erofs: blksize 1 isn't supported on this platform [ 269.996635] erofs: mounted on /dev/loop2 with opts: . [ 270.029750] erofs: read_super, device -> /dev/loop1 [ 270.034801] erofs: options -> fault_injection=0x0000000000000001, [ 270.060690] erofs: cannot find valid erofs superblock [ 270.084436] FAULT_INJECTION: forcing a failure. [ 270.084436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.096274] CPU: 0 PID: 19040 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 270.104151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.113502] Call Trace: [ 270.116089] dump_stack+0x1fc/0x2ef [ 270.119712] should_fail.cold+0xa/0xf [ 270.123538] ? setup_fault_attr+0x200/0x200 [ 270.127851] ? wake_up_q+0x93/0xe0 [ 270.131379] ? __mutex_unlock_slowpath+0x2be/0x610 [ 270.136306] __alloc_pages_nodemask+0x239/0x2890 [ 270.141054] ? __lock_acquire+0x6de/0x3ff0 [ 270.145276] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 270.150128] ? blkdev_ioctl+0x11a/0x1a80 [ 270.154189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.159541] ? blkpg_ioctl+0x9d0/0x9d0 [ 270.163415] ? debug_check_no_obj_freed+0x201/0x490 [ 270.168419] ? lock_downgrade+0x720/0x720 [ 270.172649] cache_grow_begin+0xa4/0x8a0 [ 270.176692] ? setup_fault_attr+0x200/0x200 [ 270.180995] ? lock_acquire+0x170/0x3c0 [ 270.184955] cache_alloc_refill+0x273/0x340 [ 270.189288] kmem_cache_alloc+0x346/0x370 [ 270.193421] getname_flags+0xce/0x590 [ 270.197218] do_mkdirat+0x8d/0x2d0 [ 270.200748] ? __ia32_sys_mknod+0x120/0x120 [ 270.205052] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.210399] ? trace_hardirqs_off_caller+0x6e/0x210 [ 270.215405] ? do_syscall_64+0x21/0x620 [ 270.219362] do_syscall_64+0xf9/0x620 [ 270.223159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.228330] RIP: 0033:0x7fbfc0e6d1f7 [ 270.232025] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 270.250908] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 270.258600] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 270.265875] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 270.273126] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 17:18:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 270.280376] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 270.287635] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 270.310248] erofs: read_super, device -> /dev/loop5 [ 270.315294] erofs: options -> fault_injection=0x0000000000000001, 17:18:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 270.342004] erofs: read_super, device -> /dev/loop3 [ 270.359509] erofs: FAULT_INJECTION was not selected [ 270.365709] erofs: options -> fault_injection=0x0000000000000001, [ 270.387525] erofs: unmounted for /dev/loop2 [ 270.390126] erofs: root inode @ nid 36 [ 270.402095] erofs: blksize 1 isn't supported on this platform [ 270.409607] erofs: mounted on /dev/loop5 with opts: fault_injection=0x0000000000000001. 17:18:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 270.463300] erofs: read_super, device -> /dev/loop0 [ 270.471607] erofs: options -> [ 270.475056] erofs: root inode @ nid 36 [ 270.484673] erofs: unmounted for /dev/loop5 [ 270.488142] erofs: bogus i_mode (0) @ nid 36 [ 270.504374] erofs: read_super, device -> /dev/loop2 17:18:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 270.513224] erofs: read_super, device -> /dev/loop1 [ 270.523828] erofs: options -> fault_injection=0x0000000000000001, [ 270.528245] erofs: options -> [ 270.533380] erofs: cannot find valid erofs superblock [ 270.538041] erofs: root inode @ nid 36 [ 270.542868] erofs: mounted on /dev/loop2 with opts: . 17:18:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 270.588157] erofs: read_super, device -> /dev/loop4 [ 270.593209] erofs: options -> fault_injection=0x0000000000000001, 17:18:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 270.628789] erofs: blksize 1 isn't supported on this platform [ 270.645408] erofs: unmounted for /dev/loop2 17:18:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 27) [ 270.691477] erofs: read_super, device -> /dev/loop5 [ 270.696793] erofs: options -> [ 270.704979] erofs: root inode @ nid 36 [ 270.718494] erofs: mounted on /dev/loop5 with opts: . 17:18:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:18:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 270.763444] erofs: read_super, device -> /dev/loop3 [ 270.795121] erofs: options -> fault_injection=0x0000000000000001, [ 270.804454] erofs: unmounted for /dev/loop5 [ 270.822260] erofs: blksize 1 isn't supported on this platform [ 270.845741] FAULT_INJECTION: forcing a failure. [ 270.845741] name failslab, interval 1, probability 0, space 0, times 0 [ 270.859717] CPU: 1 PID: 19082 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 270.867625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.876974] Call Trace: [ 270.879557] dump_stack+0x1fc/0x2ef [ 270.883173] should_fail.cold+0xa/0xf [ 270.886960] ? setup_fault_attr+0x200/0x200 [ 270.891264] ? lock_acquire+0x170/0x3c0 [ 270.895238] __should_failslab+0x115/0x180 [ 270.899472] should_failslab+0x5/0x10 [ 270.903268] kmem_cache_alloc+0x277/0x370 [ 270.907413] __d_alloc+0x2b/0xa10 [ 270.910852] d_alloc+0x4a/0x230 [ 270.914116] __lookup_hash+0xc8/0x180 [ 270.917900] filename_create+0x186/0x490 [ 270.921942] ? kern_path_mountpoint+0x40/0x40 [ 270.926535] ? strncpy_from_user+0x2a2/0x350 [ 270.931020] ? getname_flags+0x25b/0x590 [ 270.935069] do_mkdirat+0xa0/0x2d0 [ 270.938597] ? __ia32_sys_mknod+0x120/0x120 [ 270.942911] ? trace_hardirqs_off_caller+0x6e/0x210 [ 270.947916] ? do_syscall_64+0x21/0x620 [ 270.951874] do_syscall_64+0xf9/0x620 [ 270.955666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.960840] RIP: 0033:0x7fbfc0e6d1f7 [ 270.964537] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 270.983433] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 270.991126] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 270.998377] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 271.005638] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 271.012902] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 271.020156] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 271.038842] erofs: read_super, device -> /dev/loop2 [ 271.044172] erofs: options -> [ 271.049034] erofs: read_super, device -> /dev/loop1 [ 271.054341] erofs: root inode @ nid 36 [ 271.060005] erofs: options -> fault_injection=0x0000000000000001, [ 271.065904] erofs: mounted on /dev/loop2 with opts: . [ 271.066847] erofs: cannot find valid erofs superblock [ 271.075065] erofs: read_super, device -> /dev/loop4 [ 271.085282] erofs: options -> fault_injection=0x0000000000000001, [ 271.092367] erofs: blksize 1 isn't supported on this platform 17:18:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 28) 17:18:55 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b2"]) 17:18:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 271.170524] erofs: unmounted for /dev/loop2 [ 271.178528] erofs: read_super, device -> /dev/loop5 [ 271.183672] erofs: options -> [ 271.188214] erofs: root inode @ nid 36 [ 271.204653] erofs: mounted on /dev/loop5 with opts: . 17:18:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:18:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 271.250928] FAULT_INJECTION: forcing a failure. [ 271.250928] name failslab, interval 1, probability 0, space 0, times 0 [ 271.262249] erofs: unmounted for /dev/loop5 [ 271.266809] CPU: 1 PID: 19110 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 271.271909] erofs: read_super, device -> /dev/loop2 [ 271.274696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.289044] Call Trace: [ 271.291642] dump_stack+0x1fc/0x2ef [ 271.295273] should_fail.cold+0xa/0xf [ 271.299071] ? setup_fault_attr+0x200/0x200 [ 271.303388] __should_failslab+0x115/0x180 [ 271.307614] should_failslab+0x5/0x10 [ 271.311402] kmem_cache_alloc+0x277/0x370 [ 271.315543] ? ext4_sync_fs+0x8d0/0x8d0 [ 271.319512] ext4_alloc_inode+0x1a/0x630 [ 271.323567] ? ext4_sync_fs+0x8d0/0x8d0 [ 271.327531] alloc_inode+0x5d/0x180 [ 271.331143] new_inode+0x1d/0xf0 [ 271.334502] __ext4_new_inode+0x400/0x5a20 [ 271.338729] ? putname+0xe1/0x120 [ 271.342167] ? do_mkdirat+0xa0/0x2d0 [ 271.345878] ? ext4_free_inode+0x1780/0x1780 [ 271.350271] ? debug_check_no_obj_freed+0x201/0x490 [ 271.355275] ? __dquot_initialize+0x298/0xb70 [ 271.359764] ? lock_acquire+0x170/0x3c0 [ 271.363726] ? dquot_initialize_needed+0x290/0x290 [ 271.368648] ? trace_hardirqs_off+0x64/0x200 [ 271.373050] ? common_perm+0x4be/0x800 [ 271.376928] ext4_mkdir+0x396/0xe10 [ 271.380545] ? putname+0xe1/0x120 [ 271.383994] ? ext4_init_dot_dotdot+0x600/0x600 [ 271.388655] ? generic_permission+0x116/0x4d0 [ 271.393137] ? security_inode_permission+0xc5/0xf0 [ 271.398054] ? inode_permission.part.0+0x10c/0x450 [ 271.402985] vfs_mkdir+0x508/0x7a0 [ 271.406514] do_mkdirat+0x262/0x2d0 [ 271.410130] ? __ia32_sys_mknod+0x120/0x120 [ 271.414446] ? trace_hardirqs_off_caller+0x6e/0x210 [ 271.419451] ? do_syscall_64+0x21/0x620 [ 271.423413] do_syscall_64+0xf9/0x620 [ 271.427203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.432378] RIP: 0033:0x7fbfc0e6d1f7 [ 271.436081] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 271.454969] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 271.462661] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 271.469916] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 271.477174] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 271.484431] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 271.491685] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 271.515631] erofs: options -> fault_injection=0x0000000000000001, [ 271.535408] erofs: FAULT_INJECTION was not selected [ 271.542316] erofs: read_super, device -> /dev/loop1 [ 271.551862] erofs: options -> fault_injection=0x0000000000000001, [ 271.552580] erofs: root inode @ nid 36 17:18:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 29) [ 271.560631] erofs: blksize 1 isn't supported on this platform [ 271.572946] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. 17:18:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b2"]) 17:18:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 271.608725] erofs: unmounted for /dev/loop2 [ 271.628524] erofs: read_super, device -> /dev/loop4 [ 271.630314] erofs: read_super, device -> /dev/loop3 [ 271.633566] erofs: options -> fault_injection=0x0000000000000001, [ 271.647837] erofs: blksize 1 isn't supported on this platform [ 271.653905] erofs: options -> fault_injection=0x0000000000000001, [ 271.661228] erofs: blksize 1 isn't supported on this platform [ 271.768643] erofs: read_super, device -> /dev/loop5 [ 271.774315] erofs: options -> [ 271.782975] erofs: root inode @ nid 36 [ 271.785203] FAULT_INJECTION: forcing a failure. [ 271.785203] name failslab, interval 1, probability 0, space 0, times 0 [ 271.788058] erofs: mounted on /dev/loop5 with opts: . [ 271.798396] CPU: 0 PID: 19139 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 271.798404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.798409] Call Trace: [ 271.798430] dump_stack+0x1fc/0x2ef [ 271.798450] should_fail.cold+0xa/0xf [ 271.798467] ? setup_fault_attr+0x200/0x200 [ 271.835155] ? __es_tree_search.isra.0+0x1af/0x210 [ 271.840083] __should_failslab+0x115/0x180 [ 271.844313] should_failslab+0x5/0x10 [ 271.848118] kmem_cache_alloc+0x3f/0x370 [ 271.852185] __es_insert_extent+0x39b/0x13b0 [ 271.856588] ? lock_acquire+0x170/0x3c0 [ 271.860554] ? ext4_es_insert_extent+0x17e/0x5e0 [ 271.865311] ext4_es_insert_extent+0x22e/0x5e0 [ 271.869887] ? lock_downgrade+0x720/0x720 [ 271.874028] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 271.879823] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 271.884843] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 271.890639] ext4_ext_map_blocks+0x2129/0x7390 [ 271.895217] ? __lock_acquire+0x6de/0x3ff0 [ 271.899449] ? __lock_acquire+0x6de/0x3ff0 [ 271.903686] ? mark_held_locks+0xf0/0xf0 [ 271.907737] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 271.913113] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 271.918379] ? mark_held_locks+0xf0/0xf0 [ 271.922433] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 271.927376] ? ext4_es_lookup_extent+0x375/0xb60 [ 271.932135] ? check_preemption_disabled+0x41/0x280 [ 271.937151] ? lock_acquire+0x170/0x3c0 [ 271.941121] ? ext4_map_blocks+0x33e/0x1a50 [ 271.945446] ext4_map_blocks+0xd88/0x1a50 [ 271.949602] ? check_preemption_disabled+0x41/0x280 [ 271.954615] ? ext4_issue_zeroout+0x160/0x160 [ 271.959102] ? __brelse+0x84/0xa0 [ 271.962546] ? __ext4_new_inode+0x2eb/0x5a20 [ 271.966952] ext4_getblk+0xad/0x4f0 [ 271.970574] ? ext4_iomap_begin+0xe00/0xe00 [ 271.974885] ? ext4_free_inode+0x1780/0x1780 [ 271.979281] ? debug_check_no_obj_freed+0x201/0x490 [ 271.984284] ? __dquot_initialize+0x298/0xb70 [ 271.988767] ext4_bread+0x7c/0x210 [ 271.992302] ? ext4_getblk+0x4f0/0x4f0 [ 271.996179] ? dquot_initialize_needed+0x290/0x290 [ 272.001099] ? trace_hardirqs_off+0x64/0x200 [ 272.005505] ext4_append+0x155/0x370 [ 272.009210] ext4_mkdir+0x5bd/0xe10 [ 272.012850] ? ext4_init_dot_dotdot+0x600/0x600 [ 272.017528] ? generic_permission+0x116/0x4d0 [ 272.022040] ? inode_permission.part.0+0x10c/0x450 [ 272.026971] vfs_mkdir+0x508/0x7a0 [ 272.030511] do_mkdirat+0x262/0x2d0 [ 272.034134] ? __ia32_sys_mknod+0x120/0x120 [ 272.038451] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.043461] ? do_syscall_64+0x21/0x620 [ 272.047428] do_syscall_64+0xf9/0x620 [ 272.051222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.056396] RIP: 0033:0x7fbfc0e6d1f7 [ 272.060100] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.078993] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 272.086700] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 272.093963] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 272.101222] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 272.108488] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 17:18:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 272.115744] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 272.135493] erofs: read_super, device -> /dev/loop0 [ 272.141986] erofs: options -> [ 272.146618] erofs: root inode @ nid 36 [ 272.156913] erofs: bogus i_mode (0) @ nid 36 17:18:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 30) [ 272.179721] erofs: read_super, device -> /dev/loop2 [ 272.184759] erofs: options -> fault_injection=0x0000000000000001, 17:18:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 17:18:56 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00000000']) [ 272.225554] erofs: FAULT_INJECTION was not selected [ 272.245883] erofs: unmounted for /dev/loop5 [ 272.246493] erofs: root inode @ nid 36 [ 272.255396] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000001. 17:18:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 272.385133] erofs: read_super, device -> /dev/loop4 17:18:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 272.420055] erofs: options -> fault_injection=0x0000000000000001, [ 272.438077] erofs: blksize 1 isn't supported on this platform [ 272.449249] FAULT_INJECTION: forcing a failure. [ 272.449249] name failslab, interval 1, probability 0, space 0, times 0 [ 272.460691] CPU: 0 PID: 19164 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 272.468577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.477945] Call Trace: [ 272.480546] dump_stack+0x1fc/0x2ef [ 272.484191] should_fail.cold+0xa/0xf [ 272.488003] ? setup_fault_attr+0x200/0x200 [ 272.492338] ? __es_tree_search.isra.0+0x1af/0x210 [ 272.497270] __should_failslab+0x115/0x180 [ 272.501515] should_failslab+0x5/0x10 [ 272.505319] kmem_cache_alloc+0x3f/0x370 [ 272.509389] __es_insert_extent+0x39b/0x13b0 [ 272.513804] ? lock_acquire+0x170/0x3c0 [ 272.517783] ? ext4_es_insert_extent+0x17e/0x5e0 [ 272.522552] ext4_es_insert_extent+0x22e/0x5e0 [ 272.527143] ? lock_downgrade+0x720/0x720 [ 272.531295] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 272.537103] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 272.542124] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 272.547930] ext4_ext_map_blocks+0x2129/0x7390 [ 272.552524] ? __lock_acquire+0x6de/0x3ff0 [ 272.556774] ? __lock_acquire+0x6de/0x3ff0 [ 272.561021] ? mark_held_locks+0xf0/0xf0 [ 272.565090] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 272.570462] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 272.575662] ? mark_held_locks+0xf0/0xf0 [ 272.579732] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 272.584587] ? ext4_es_lookup_extent+0x375/0xb60 [ 272.589357] ? check_preemption_disabled+0x41/0x280 [ 272.594381] ? lock_acquire+0x170/0x3c0 [ 272.598358] ? ext4_map_blocks+0x33e/0x1a50 [ 272.602696] ext4_map_blocks+0xd88/0x1a50 [ 272.606855] ? check_preemption_disabled+0x41/0x280 [ 272.611879] ? ext4_issue_zeroout+0x160/0x160 [ 272.616386] ? __brelse+0x84/0xa0 [ 272.619844] ? __ext4_new_inode+0x2eb/0x5a20 [ 272.624266] ext4_getblk+0xad/0x4f0 [ 272.627905] ? ext4_iomap_begin+0xe00/0xe00 [ 272.632238] ? ext4_free_inode+0x1780/0x1780 [ 272.636648] ? debug_check_no_obj_freed+0x201/0x490 [ 272.641668] ? __dquot_initialize+0x298/0xb70 [ 272.646169] ext4_bread+0x7c/0x210 [ 272.649716] ? ext4_getblk+0x4f0/0x4f0 [ 272.653610] ? dquot_initialize_needed+0x290/0x290 [ 272.658549] ? trace_hardirqs_off+0x64/0x200 [ 272.662966] ext4_append+0x155/0x370 [ 272.666777] ext4_mkdir+0x5bd/0xe10 [ 272.670414] ? ext4_init_dot_dotdot+0x600/0x600 [ 272.675086] ? generic_permission+0x116/0x4d0 [ 272.679574] ? inode_permission.part.0+0x10c/0x450 [ 272.684511] vfs_mkdir+0x508/0x7a0 [ 272.688048] do_mkdirat+0x262/0x2d0 [ 272.691668] ? __ia32_sys_mknod+0x120/0x120 [ 272.695987] ? trace_hardirqs_off_caller+0x6e/0x210 [ 272.700993] ? do_syscall_64+0x21/0x620 [ 272.704957] do_syscall_64+0xf9/0x620 [ 272.708756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.713939] RIP: 0033:0x7fbfc0e6d1f7 [ 272.717647] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.736563] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 272.744262] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 272.751523] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 272.758786] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 272.766042] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 272.773301] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 272.784820] erofs: unmounted for /dev/loop2 [ 272.800701] erofs: read_super, device -> /dev/loop3 [ 272.805739] erofs: options -> fault_injection=0x0000000000000001, [ 272.810530] erofs: read_super, device -> /dev/loop0 [ 272.814523] erofs: read_super, device -> /dev/loop5 [ 272.817822] erofs: options -> [ 272.826165] erofs: root inode @ nid 36 [ 272.830676] erofs: bogus i_mode (0) @ nid 36 [ 272.835250] erofs: FAULT_INJECTION was not selected [ 272.835981] erofs: options -> fault_injection=0x00000000 [ 272.840613] erofs: root inode @ nid 0 [ 272.854251] erofs: bogus i_mode (0) @ nid 0 17:18:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 17:18:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 272.874237] erofs: FAULT_INJECTION was not selected [ 272.885737] erofs: root inode @ nid 36 [ 272.895194] erofs: mounted on /dev/loop5 with opts: fault_injection=0x00000000. 17:18:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 31) 17:18:57 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00000000']) 17:18:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 273.024569] erofs: read_super, device -> /dev/loop2 [ 273.030519] erofs: options -> [ 273.034067] erofs: root inode @ nid 36 [ 273.039125] erofs: mounted on /dev/loop2 with opts: . [ 273.040791] erofs: unmounted for /dev/loop5 [ 273.075732] erofs: unmounted for /dev/loop2 [ 273.083726] erofs: read_super, device -> /dev/loop4 [ 273.093434] FAULT_INJECTION: forcing a failure. [ 273.093434] name failslab, interval 1, probability 0, space 0, times 0 [ 273.106152] erofs: options -> fault_injection=0x0000000000000001, [ 273.113971] CPU: 0 PID: 19200 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 273.121871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.130432] erofs: blksize 1 isn't supported on this platform [ 273.131220] Call Trace: [ 273.139722] dump_stack+0x1fc/0x2ef [ 273.143365] should_fail.cold+0xa/0xf [ 273.147170] ? setup_fault_attr+0x200/0x200 [ 273.151511] ? lock_downgrade+0x720/0x720 [ 273.155669] __should_failslab+0x115/0x180 [ 273.159899] should_failslab+0x5/0x10 [ 273.163680] __kmalloc+0x2ab/0x3c0 [ 273.167212] ? ext4_find_extent+0x9bb/0xc70 [ 273.171528] ext4_find_extent+0x9bb/0xc70 [ 273.175667] ext4_ext_map_blocks+0x1c0/0x7390 [ 273.180271] ? __lock_acquire+0x6de/0x3ff0 [ 273.184529] ? mark_held_locks+0xf0/0xf0 [ 273.188587] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 273.193946] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 273.199140] ? mark_held_locks+0xf0/0xf0 [ 273.203186] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 273.208030] ? ext4_es_lookup_extent+0x375/0xb60 [ 273.212781] ? ext4_map_blocks+0x59f/0x1a50 [ 273.217101] ? lock_acquire+0x170/0x3c0 [ 273.221065] ? ext4_map_blocks+0x740/0x1a50 [ 273.225375] ext4_map_blocks+0x7a2/0x1a50 [ 273.229526] ? check_preemption_disabled+0x41/0x280 [ 273.234536] ? ext4_issue_zeroout+0x160/0x160 [ 273.239060] ? __brelse+0x84/0xa0 [ 273.242500] ? __ext4_new_inode+0x2eb/0x5a20 [ 273.246894] ext4_getblk+0xad/0x4f0 [ 273.250521] ? ext4_iomap_begin+0xe00/0xe00 [ 273.254836] ? ext4_free_inode+0x1780/0x1780 [ 273.259231] ? debug_check_no_obj_freed+0x201/0x490 [ 273.264243] ? __dquot_initialize+0x298/0xb70 [ 273.268740] ext4_bread+0x7c/0x210 [ 273.272277] ? ext4_getblk+0x4f0/0x4f0 [ 273.276177] ? dquot_initialize_needed+0x290/0x290 [ 273.281095] ? trace_hardirqs_off+0x64/0x200 [ 273.285494] ext4_append+0x155/0x370 [ 273.289208] ext4_mkdir+0x5bd/0xe10 [ 273.292831] ? ext4_init_dot_dotdot+0x600/0x600 [ 273.297504] ? generic_permission+0x116/0x4d0 [ 273.301994] ? inode_permission.part.0+0x10c/0x450 [ 273.306910] vfs_mkdir+0x508/0x7a0 [ 273.310443] do_mkdirat+0x262/0x2d0 [ 273.314064] ? __ia32_sys_mknod+0x120/0x120 [ 273.318406] ? trace_hardirqs_off_caller+0x6e/0x210 [ 273.323412] ? do_syscall_64+0x21/0x620 [ 273.327381] do_syscall_64+0xf9/0x620 [ 273.331176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.336347] RIP: 0033:0x7fbfc0e6d1f7 [ 273.340047] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 273.358936] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 273.366631] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 273.373890] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 273.381164] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 273.388424] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 273.395684] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 17:18:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 273.559660] erofs: read_super, device -> /dev/loop3 [ 273.564735] erofs: options -> fault_injection=0x0000000000000001, [ 273.572557] erofs: FAULT_INJECTION was not selected [ 273.578168] erofs: root inode @ nid 0 [ 273.582144] erofs: bogus i_mode (0) @ nid 0 [ 273.598192] erofs: read_super, device -> /dev/loop5 17:18:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 32) [ 273.612936] erofs: options -> fault_injection=0x00000000 [ 273.651778] erofs: FAULT_INJECTION was not selected 17:18:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 273.664330] erofs: root inode @ nid 36 [ 273.679952] erofs: mounted on /dev/loop5 with opts: fault_injection=0x00000000. [ 273.680274] FAULT_INJECTION: forcing a failure. [ 273.680274] name failslab, interval 1, probability 0, space 0, times 0 [ 273.693961] erofs: read_super, device -> /dev/loop1 [ 273.699717] CPU: 1 PID: 19229 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 273.705124] erofs: options -> [ 273.711823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.711829] Call Trace: [ 273.711852] dump_stack+0x1fc/0x2ef [ 273.711872] should_fail.cold+0xa/0xf [ 273.711890] ? setup_fault_attr+0x200/0x200 [ 273.711903] ? lock_downgrade+0x720/0x720 [ 273.711919] ? check_preemption_disabled+0x41/0x280 [ 273.711939] __should_failslab+0x115/0x180 [ 273.711956] should_failslab+0x5/0x10 [ 273.711969] kmem_cache_alloc+0x277/0x370 [ 273.711986] ext4_mb_new_blocks+0x60a/0x4370 [ 273.712008] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 273.712021] ? ext4_cache_extents+0x68/0x2d0 [ 273.712033] ? ext4_find_extent+0x9bb/0xc70 [ 273.712049] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 273.712060] ? ext4_ext_search_right+0x2c7/0xb60 [ 273.712076] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 273.712093] ext4_ext_map_blocks+0x2aa2/0x7390 [ 273.739691] erofs: blksize 1 isn't supported on this platform [ 273.743036] ? __lock_acquire+0x6de/0x3ff0 [ 273.743061] ? mark_held_locks+0xf0/0xf0 [ 273.743078] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 273.817602] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 273.822775] ? mark_held_locks+0xf0/0xf0 [ 273.826836] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 273.831680] ? ext4_es_lookup_extent+0x375/0xb60 [ 273.836424] ? ext4_map_blocks+0x59f/0x1a50 [ 273.840741] ext4_map_blocks+0x7a2/0x1a50 [ 273.844880] ? check_preemption_disabled+0x41/0x280 [ 273.849879] ? ext4_issue_zeroout+0x160/0x160 [ 273.854358] ? __brelse+0x84/0xa0 [ 273.857809] ? __ext4_new_inode+0x2eb/0x5a20 [ 273.862228] ext4_getblk+0xad/0x4f0 [ 273.865853] ? ext4_iomap_begin+0xe00/0xe00 [ 273.870157] ? ext4_free_inode+0x1780/0x1780 [ 273.874555] ? debug_check_no_obj_freed+0x201/0x490 [ 273.879576] ? __dquot_initialize+0x298/0xb70 [ 273.884073] ext4_bread+0x7c/0x210 [ 273.887602] ? ext4_getblk+0x4f0/0x4f0 [ 273.891479] ? dquot_initialize_needed+0x290/0x290 [ 273.896399] ? trace_hardirqs_off+0x64/0x200 [ 273.900792] ext4_append+0x155/0x370 [ 273.904492] ext4_mkdir+0x5bd/0xe10 [ 273.908105] ? ext4_init_dot_dotdot+0x600/0x600 [ 273.912776] ? generic_permission+0x116/0x4d0 [ 273.917267] ? inode_permission.part.0+0x10c/0x450 [ 273.922198] vfs_mkdir+0x508/0x7a0 [ 273.925729] do_mkdirat+0x262/0x2d0 [ 273.929353] ? __ia32_sys_mknod+0x120/0x120 [ 273.933677] ? trace_hardirqs_off_caller+0x6e/0x210 [ 273.938693] ? do_syscall_64+0x21/0x620 [ 273.942665] do_syscall_64+0xf9/0x620 [ 273.946467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.951643] RIP: 0033:0x7fbfc0e6d1f7 [ 273.955338] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 273.974227] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 273.981918] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6d1f7 [ 273.989176] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 273.996614] RBP: 00007fbfbf7e31d0 R08: 0000000000000000 R09: 00007fbfbf7e31d0 [ 274.003876] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 17:18:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 274.011133] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 17:18:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 33) [ 274.056381] erofs: unmounted for /dev/loop5 [ 274.070013] erofs: read_super, device -> /dev/loop4 [ 274.075049] erofs: options -> fault_injection=0x0000000000000001, [ 274.081653] erofs: read_super, device -> /dev/loop2 [ 274.101314] erofs: options -> 17:18:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 274.107794] erofs: root inode @ nid 36 [ 274.111776] erofs: mounted on /dev/loop2 with opts: . [ 274.121024] erofs: FAULT_INJECTION was not selected [ 274.126189] erofs: root inode @ nid 0 [ 274.132699] erofs: bogus i_mode (0) @ nid 0 17:18:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 274.167971] erofs: read_super, device -> /dev/loop3 [ 274.181968] erofs: options -> fault_injection=0x0000000000000001, [ 274.190801] FAULT_INJECTION: forcing a failure. [ 274.190801] name failslab, interval 1, probability 0, space 0, times 0 [ 274.194381] erofs: FAULT_INJECTION was not selected [ 274.202248] CPU: 1 PID: 19249 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 274.213195] erofs: unmounted for /dev/loop2 [ 274.215064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.228696] Call Trace: [ 274.231798] dump_stack+0x1fc/0x2ef [ 274.235419] should_fail.cold+0xa/0xf [ 274.239210] ? setup_fault_attr+0x200/0x200 [ 274.243519] ? lock_acquire+0x170/0x3c0 [ 274.247485] __should_failslab+0x115/0x180 [ 274.251709] should_failslab+0x5/0x10 [ 274.255495] __kmalloc_track_caller+0x2a6/0x3c0 [ 274.260153] ? strndup_user+0x70/0x120 [ 274.264029] memdup_user+0x22/0xb0 [ 274.267560] strndup_user+0x70/0x120 [ 274.271262] ksys_mount+0x34/0x130 [ 274.274790] __x64_sys_mount+0xba/0x150 [ 274.278841] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 274.283498] do_syscall_64+0xf9/0x620 [ 274.287287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.292470] RIP: 0033:0x7fbfc0e6f61a [ 274.296179] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 274.315066] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 274.322759] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6f61a [ 274.330017] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbfbf7e2fe0 [ 274.337271] RBP: 00007fbfbf7e3020 R08: 00007fbfbf7e3020 R09: 0000000020000000 [ 274.344526] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 274.351786] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 274.361578] erofs: root inode @ nid 0 [ 274.365699] erofs: bogus i_mode (0) @ nid 0 17:18:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 34) 17:18:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:18:58 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 274.447508] erofs: read_super, device -> /dev/loop1 [ 274.454059] erofs: read_super, device -> /dev/loop5 [ 274.459197] erofs: options -> [ 274.462604] erofs: blksize 1 isn't supported on this platform [ 274.470874] erofs: options -> [ 274.475243] erofs: root inode @ nid 36 [ 274.481188] erofs: mounted on /dev/loop5 with opts: . [ 274.529834] erofs: unmounted for /dev/loop5 [ 274.573703] erofs: read_super, device -> /dev/loop2 [ 274.579070] erofs: options -> [ 274.588905] FAULT_INJECTION: forcing a failure. [ 274.588905] name failslab, interval 1, probability 0, space 0, times 0 [ 274.604665] erofs: root inode @ nid 36 [ 274.613638] erofs: mounted on /dev/loop2 with opts: . 17:18:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 1) [ 274.624698] CPU: 1 PID: 19273 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 274.632609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.641966] Call Trace: [ 274.644565] dump_stack+0x1fc/0x2ef [ 274.648203] should_fail.cold+0xa/0xf [ 274.652017] ? setup_fault_attr+0x200/0x200 [ 274.656352] ? lock_acquire+0x170/0x3c0 [ 274.660345] __should_failslab+0x115/0x180 [ 274.661337] FAULT_INJECTION: forcing a failure. [ 274.661337] name failslab, interval 1, probability 0, space 0, times 0 [ 274.664591] should_failslab+0x5/0x10 [ 274.664607] __kmalloc_track_caller+0x2a6/0x3c0 [ 274.664630] ? strndup_user+0x70/0x120 [ 274.688207] memdup_user+0x22/0xb0 [ 274.691741] strndup_user+0x70/0x120 [ 274.695446] ksys_mount+0x34/0x130 [ 274.698978] __x64_sys_mount+0xba/0x150 [ 274.702945] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 274.707516] do_syscall_64+0xf9/0x620 [ 274.711313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.716503] RIP: 0033:0x7fbfc0e6f61a [ 274.720216] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 274.739114] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 274.746819] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6f61a [ 274.754082] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbfbf7e2fe0 [ 274.761343] RBP: 00007fbfbf7e3020 R08: 00007fbfbf7e3020 R09: 0000000020000000 [ 274.768606] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 274.775862] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 274.783141] CPU: 0 PID: 19292 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 274.791029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.800382] Call Trace: [ 274.802982] dump_stack+0x1fc/0x2ef [ 274.806630] should_fail.cold+0xa/0xf [ 274.810436] ? setup_fault_attr+0x200/0x200 [ 274.814768] ? lock_acquire+0x170/0x3c0 [ 274.818761] __should_failslab+0x115/0x180 [ 274.823003] should_failslab+0x5/0x10 [ 274.826807] __kmalloc+0x2ab/0x3c0 [ 274.828254] erofs: read_super, device -> /dev/loop4 [ 274.830346] ? __se_sys_memfd_create+0xf8/0x440 [ 274.830369] __se_sys_memfd_create+0xf8/0x440 [ 274.835584] erofs: read_super, device -> /dev/loop3 [ 274.840045] ? memfd_file_seals_ptr+0x150/0x150 [ 274.840061] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.840077] ? trace_hardirqs_off_caller+0x6e/0x210 [ 274.840090] ? do_syscall_64+0x21/0x620 [ 274.840110] do_syscall_64+0xf9/0x620 [ 274.852007] erofs: options -> fault_injection=0x0000000000000001, [ 274.854247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.854261] RIP: 0033:0x7fc7db8270e9 [ 274.854274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 274.854286] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 274.873563] erofs: options -> fault_injection=0x0000000000000001, 17:18:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00000000']) 17:18:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 2) [ 274.878581] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc7db8270e9 [ 274.878590] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc7db8801ee [ 274.878598] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fc7da19c1d0 [ 274.878606] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 274.878615] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 274.889062] erofs: FAULT_INJECTION was not selected [ 274.935925] erofs: unmounted for /dev/loop2 [ 274.949774] erofs: root inode @ nid 0 [ 274.956191] erofs: read_super, device -> /dev/loop5 17:18:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 35) [ 274.996281] erofs: FAULT_INJECTION was not selected [ 275.007893] erofs: root inode @ nid 36 [ 275.018003] erofs: bogus i_mode (0) @ nid 0 [ 275.022806] FAULT_INJECTION: forcing a failure. [ 275.022806] name failslab, interval 1, probability 0, space 0, times 0 [ 275.047465] erofs: bogus i_mode (0) @ nid 36 [ 275.056200] erofs: options -> [ 275.057440] CPU: 0 PID: 19299 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 275.067287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.076643] Call Trace: [ 275.079238] dump_stack+0x1fc/0x2ef [ 275.082916] should_fail.cold+0xa/0xf [ 275.086148] erofs: root inode @ nid 36 [ 275.086724] ? setup_fault_attr+0x200/0x200 [ 275.094906] ? lock_acquire+0x170/0x3c0 [ 275.098896] __should_failslab+0x115/0x180 [ 275.103142] should_failslab+0x5/0x10 [ 275.106947] kmem_cache_alloc+0x277/0x370 [ 275.111104] ? shmem_destroy_callback+0xb0/0xb0 [ 275.115777] shmem_alloc_inode+0x18/0x40 [ 275.116935] erofs: mounted on /dev/loop5 with opts: . [ 275.119835] ? shmem_destroy_callback+0xb0/0xb0 [ 275.119849] alloc_inode+0x5d/0x180 [ 275.119861] new_inode+0x1d/0xf0 [ 275.119877] shmem_get_inode+0x96/0x8d0 [ 275.119899] __shmem_file_setup.part.0+0x7a/0x2b0 [ 275.119918] shmem_file_setup+0x61/0x90 [ 275.119932] __se_sys_memfd_create+0x26b/0x440 [ 275.119947] ? memfd_file_seals_ptr+0x150/0x150 [ 275.119962] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.119978] ? trace_hardirqs_off_caller+0x6e/0x210 [ 275.119994] ? do_syscall_64+0x21/0x620 [ 275.173296] do_syscall_64+0xf9/0x620 [ 275.177107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.182299] RIP: 0033:0x7fc7db8270e9 [ 275.186015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 275.204920] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 275.212635] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc7db8270e9 [ 275.219906] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc7db8801ee [ 275.227189] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fc7da19c1d0 [ 275.234463] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 17:18:59 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:18:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 3) [ 275.241736] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 275.252458] erofs: unmounted for /dev/loop5 [ 275.379259] FAULT_INJECTION: forcing a failure. [ 275.379259] name failslab, interval 1, probability 0, space 0, times 0 [ 275.392373] CPU: 0 PID: 19302 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 275.400277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.409628] Call Trace: [ 275.412225] dump_stack+0x1fc/0x2ef [ 275.415865] should_fail.cold+0xa/0xf [ 275.419676] ? setup_fault_attr+0x200/0x200 [ 275.424003] ? lock_acquire+0x170/0x3c0 [ 275.427989] __should_failslab+0x115/0x180 [ 275.432229] should_failslab+0x5/0x10 [ 275.436035] kmem_cache_alloc_trace+0x284/0x380 [ 275.440705] ? _copy_from_user+0xd2/0x130 [ 275.444859] copy_mount_options+0x59/0x380 [ 275.449192] ksys_mount+0x9b/0x130 [ 275.452737] __x64_sys_mount+0xba/0x150 [ 275.456716] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 275.461304] do_syscall_64+0xf9/0x620 [ 275.465114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.470309] RIP: 0033:0x7fbfc0e6f61a 17:18:59 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 275.474021] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 275.484709] FAULT_INJECTION: forcing a failure. [ 275.484709] name failslab, interval 1, probability 0, space 0, times 0 [ 275.492916] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 275.492931] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6f61a [ 275.492940] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbfbf7e2fe0 [ 275.492950] RBP: 00007fbfbf7e3020 R08: 00007fbfbf7e3020 R09: 0000000020000000 [ 275.492958] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 275.492966] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 275.533611] erofs: read_super, device -> /dev/loop4 [ 275.535412] CPU: 1 PID: 19319 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 275.549652] erofs: options -> fault_injection=0x0000000000000001, [ 275.549821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.555103] erofs: FAULT_INJECTION was not selected [ 275.562676] Call Trace: [ 275.562697] dump_stack+0x1fc/0x2ef [ 275.562718] should_fail.cold+0xa/0xf [ 275.562737] ? setup_fault_attr+0x200/0x200 [ 275.562752] ? lock_acquire+0x170/0x3c0 [ 275.562771] __should_failslab+0x115/0x180 [ 275.562788] should_failslab+0x5/0x10 [ 275.562800] kmem_cache_alloc+0x277/0x370 [ 275.562817] __d_alloc+0x2b/0xa10 [ 275.575565] erofs: root inode @ nid 0 [ 275.578374] d_alloc_pseudo+0x19/0x70 [ 275.578392] alloc_file_pseudo+0xc6/0x250 [ 275.578409] ? alloc_file+0x4d0/0x4d0 [ 275.578425] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 275.578440] ? shmem_get_inode+0x44c/0x8d0 [ 275.578460] __shmem_file_setup.part.0+0x102/0x2b0 [ 275.578477] shmem_file_setup+0x61/0x90 [ 275.578492] __se_sys_memfd_create+0x26b/0x440 [ 275.587281] erofs: bogus i_mode (0) @ nid 0 [ 275.589671] ? memfd_file_seals_ptr+0x150/0x150 [ 275.589689] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.589707] ? trace_hardirqs_off_caller+0x6e/0x210 [ 275.589738] ? do_syscall_64+0x21/0x620 [ 275.589753] do_syscall_64+0xf9/0x620 [ 275.589769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.688335] RIP: 0033:0x7fc7db8270e9 [ 275.692039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 275.710927] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 275.718631] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc7db8270e9 [ 275.725891] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc7db8801ee [ 275.733146] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fc7da19c1d0 [ 275.740404] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 275.747671] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 275.770380] erofs: read_super, device -> /dev/loop2 [ 275.775412] erofs: options -> fault_injection=0x00000000 17:18:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 4) 17:18:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 275.790099] erofs: read_super, device -> /dev/loop3 [ 275.795334] erofs: options -> fault_injection=0x0000000000000001, [ 275.801408] erofs: FAULT_INJECTION was not selected [ 275.809435] erofs: FAULT_INJECTION was not selected [ 275.812675] erofs: root inode @ nid 36 [ 275.821070] erofs: read_super, device -> /dev/loop5 [ 275.821893] erofs: root inode @ nid 36 [ 275.831581] erofs: bogus i_mode (0) @ nid 36 17:18:59 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:18:59 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 36) [ 275.871396] erofs: options -> [ 275.878337] erofs: mounted on /dev/loop2 with opts: fault_injection=0x00000000. [ 275.886516] FAULT_INJECTION: forcing a failure. [ 275.886516] name failslab, interval 1, probability 0, space 0, times 0 [ 275.889494] erofs: root inode @ nid 36 [ 275.898505] CPU: 1 PID: 19332 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 275.909631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.913724] erofs: mounted on /dev/loop5 with opts: . [ 275.918976] Call Trace: [ 275.918998] dump_stack+0x1fc/0x2ef [ 275.919016] should_fail.cold+0xa/0xf [ 275.919034] ? setup_fault_attr+0x200/0x200 [ 275.919047] ? lock_acquire+0x170/0x3c0 [ 275.919068] __should_failslab+0x115/0x180 [ 275.919085] should_failslab+0x5/0x10 [ 275.919097] kmem_cache_alloc+0x277/0x370 [ 275.919114] __alloc_file+0x21/0x340 [ 275.919131] alloc_empty_file+0x6d/0x170 [ 275.919146] alloc_file+0x5e/0x4d0 [ 275.919165] alloc_file_pseudo+0x165/0x250 [ 275.919183] ? alloc_file+0x4d0/0x4d0 [ 275.919198] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 275.919215] ? shmem_get_inode+0x44c/0x8d0 [ 275.919236] __shmem_file_setup.part.0+0x102/0x2b0 [ 275.919256] shmem_file_setup+0x61/0x90 [ 275.919271] __se_sys_memfd_create+0x26b/0x440 [ 275.919285] ? memfd_file_seals_ptr+0x150/0x150 [ 275.919303] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.007492] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.012490] ? do_syscall_64+0x21/0x620 [ 276.016446] do_syscall_64+0xf9/0x620 [ 276.020236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.025408] RIP: 0033:0x7fc7db8270e9 [ 276.029104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 276.048002] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 276.055697] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc7db8270e9 [ 276.062952] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc7db8801ee [ 276.070202] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fc7da19c1d0 [ 276.077457] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 276.084715] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:19:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) 17:19:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 5) [ 276.153940] erofs: unmounted for /dev/loop2 [ 276.164276] erofs: unmounted for /dev/loop5 [ 276.215474] FAULT_INJECTION: forcing a failure. [ 276.215474] name failslab, interval 1, probability 0, space 0, times 0 [ 276.242693] CPU: 0 PID: 19346 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 276.250603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.259959] Call Trace: [ 276.262559] dump_stack+0x1fc/0x2ef [ 276.266287] should_fail.cold+0xa/0xf [ 276.270099] ? setup_fault_attr+0x200/0x200 [ 276.274513] ? lock_acquire+0x170/0x3c0 [ 276.278486] __should_failslab+0x115/0x180 [ 276.282706] should_failslab+0x5/0x10 [ 276.286485] kmem_cache_alloc_trace+0x284/0x380 [ 276.289853] FAULT_INJECTION: forcing a failure. [ 276.289853] name failslab, interval 1, probability 0, space 0, times 0 [ 276.291154] apparmor_file_alloc_security+0x394/0xad0 [ 276.304963] erofs: read_super, device -> /dev/loop2 [ 276.307500] ? apparmor_file_receive+0x160/0x160 [ 276.307517] ? __alloc_file+0x21/0x340 [ 276.307537] security_file_alloc+0x40/0x90 [ 276.307552] __alloc_file+0xd8/0x340 [ 276.307568] alloc_empty_file+0x6d/0x170 [ 276.307585] alloc_file+0x5e/0x4d0 [ 276.307605] alloc_file_pseudo+0x165/0x250 [ 276.307622] ? alloc_file+0x4d0/0x4d0 [ 276.307635] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 276.307654] ? shmem_get_inode+0x44c/0x8d0 [ 276.315513] erofs: read_super, device -> /dev/loop4 [ 276.317401] __shmem_file_setup.part.0+0x102/0x2b0 [ 276.317421] shmem_file_setup+0x61/0x90 [ 276.317435] __se_sys_memfd_create+0x26b/0x440 [ 276.317451] ? memfd_file_seals_ptr+0x150/0x150 [ 276.349571] erofs: read_super, device -> /dev/loop5 [ 276.350548] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.350567] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.350580] ? do_syscall_64+0x21/0x620 [ 276.350597] do_syscall_64+0xf9/0x620 [ 276.354896] erofs: options -> fault_injecti [ 276.359827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.359841] RIP: 0033:0x7fc7db8270e9 17:19:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) [ 276.359856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 276.359862] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 276.359874] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc7db8270e9 [ 276.359882] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc7db8801ee [ 276.359889] RBP: 0000000000000002 R08: 0000000000001000 R09: 00007fc7da19c1d0 [ 276.359897] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 276.359905] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 276.366841] erofs: read_super, device -> /dev/loop3 [ 276.433591] erofs: Unrecognized mount option "fault_injecti" or missing value [ 276.462104] erofs: options -> [ 276.470500] CPU: 0 PID: 19341 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 276.475368] erofs: options -> fault_injection=0x0000000000000001, [ 276.477820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.477826] Call Trace: [ 276.477848] dump_stack+0x1fc/0x2ef [ 276.477868] should_fail.cold+0xa/0xf [ 276.477886] ? setup_fault_attr+0x200/0x200 [ 276.477903] ? lock_acquire+0x170/0x3c0 [ 276.477923] __should_failslab+0x115/0x180 [ 276.477942] should_failslab+0x5/0x10 [ 276.477957] kmem_cache_alloc_trace+0x284/0x380 [ 276.477971] ? _copy_from_user+0xd2/0x130 [ 276.477988] copy_mount_options+0x59/0x380 [ 276.478007] ksys_mount+0x9b/0x130 [ 276.478024] __x64_sys_mount+0xba/0x150 [ 276.478039] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 276.478053] do_syscall_64+0xf9/0x620 [ 276.478071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.478081] RIP: 0033:0x7fbfc0e6f61a [ 276.478095] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 276.478101] RSP: 002b:00007fbfbf7e2f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.561724] erofs: FAULT_INJECTION was not selected 17:19:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 6) [ 276.563698] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fbfc0e6f61a [ 276.563708] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbfbf7e2fe0 [ 276.563717] RBP: 00007fbfbf7e3020 R08: 00007fbfbf7e3020 R09: 0000000020000000 [ 276.563725] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 276.563734] R13: 0000000020000100 R14: 00007fbfbf7e2fe0 R15: 0000000020000180 [ 276.581287] erofs: root inode @ nid 36 [ 276.703549] erofs: read_super, device -> /dev/loop5 [ 276.709084] FAULT_INJECTION: forcing a failure. [ 276.709084] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 276.726877] erofs: options -> fault_injecti [ 276.738396] erofs: Unrecognized mount option "fault_injecti" or missing value [ 276.750296] CPU: 0 PID: 19365 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 276.758192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.767546] Call Trace: [ 276.770141] dump_stack+0x1fc/0x2ef [ 276.773783] should_fail.cold+0xa/0xf [ 276.777590] ? lock_acquire+0x170/0x3c0 [ 276.781570] ? setup_fault_attr+0x200/0x200 [ 276.785907] __alloc_pages_nodemask+0x239/0x2890 [ 276.790671] ? __lock_acquire+0x6de/0x3ff0 [ 276.794909] ? static_obj+0x50/0x50 [ 276.798548] ? __lock_acquire+0x6de/0x3ff0 [ 276.802788] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 276.807634] ? __lock_acquire+0x6de/0x3ff0 [ 276.811880] ? mark_held_locks+0xf0/0xf0 [ 276.815948] ? unwind_next_frame+0xeee/0x1400 [ 276.820446] ? mark_held_locks+0xf0/0xf0 [ 276.824512] ? deref_stack_reg+0x134/0x1d0 [ 276.828745] ? get_reg+0x176/0x1f0 [ 276.832294] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 276.838188] alloc_pages_vma+0xf2/0x780 [ 276.842179] shmem_alloc_page+0x11c/0x1f0 [ 276.846332] ? shmem_swapin+0x220/0x220 [ 276.850330] ? percpu_counter_add_batch+0x126/0x180 [ 276.855352] ? __vm_enough_memory+0x316/0x650 [ 276.859857] shmem_alloc_and_acct_page+0x15a/0x850 [ 276.864805] shmem_getpage_gfp+0x4e9/0x37f0 [ 276.869146] ? shmem_alloc_and_acct_page+0x850/0x850 [ 276.874263] ? mark_held_locks+0xa6/0xf0 [ 276.878325] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 276.883519] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 276.888722] shmem_write_begin+0xff/0x1e0 [ 276.892879] generic_perform_write+0x1f8/0x4d0 [ 276.897477] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 276.902157] ? current_time+0x1c0/0x1c0 [ 276.906137] ? lock_acquire+0x170/0x3c0 [ 276.910121] __generic_file_write_iter+0x24b/0x610 [ 276.915075] generic_file_write_iter+0x3f8/0x730 [ 276.919838] __vfs_write+0x51b/0x770 [ 276.923557] ? kernel_read+0x110/0x110 [ 276.927459] ? check_preemption_disabled+0x41/0x280 [ 276.932486] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 276.937510] vfs_write+0x1f3/0x540 [ 276.941060] __x64_sys_pwrite64+0x1f7/0x250 [ 276.945385] ? ksys_pwrite64+0x1a0/0x1a0 [ 276.949452] ? trace_hardirqs_off_caller+0x6e/0x210 [ 276.950684] erofs: root inode @ nid 36 [ 276.954465] ? do_syscall_64+0x21/0x620 [ 276.954513] do_syscall_64+0xf9/0x620 [ 276.966129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.971323] RIP: 0033:0x7fc7db7da0b7 [ 276.975040] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 276.994895] RSP: 002b:00007fc7da19bf00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 277.002610] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db7da0b7 [ 277.009885] RDX: 0000000000000004 RSI: 0000000020010000 RDI: 0000000000000004 [ 277.017157] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 277.024430] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 277.031687] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 17:19:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) 17:19:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 277.061130] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 277.066671] erofs: mounted on /dev/loop2 with opts: . 17:19:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 277.105592] erofs: unmounted for /dev/loop4 [ 277.110475] erofs: options -> fault_injection=0x0000000000000001, [ 277.121037] erofs: FAULT_INJECTION was not selected [ 277.129424] erofs: root inode @ nid 36 [ 277.130131] erofs: unmounted for /dev/loop2 [ 277.133438] erofs: bogus i_mode (0) @ nid 36 17:19:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 277.266387] erofs: read_super, device -> /dev/loop5 [ 277.272696] erofs: options -> fault_injecti [ 277.279841] erofs: Unrecognized mount option "fault_injecti" or missing value [ 277.295353] erofs: read_super, device -> /dev/loop1 [ 277.301453] erofs: read_super, device -> /dev/loop0 [ 277.308628] erofs: options -> [ 277.316774] erofs: options -> [ 277.330153] erofs: cannot find valid erofs superblock [ 277.333498] erofs: root inode @ nid 36 [ 277.346677] erofs: bogus i_mode (0) @ nid 36 17:19:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00']) 17:19:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 7) [ 277.552987] erofs: read_super, device -> /dev/loop4 [ 277.559083] erofs: read_super, device -> /dev/loop3 [ 277.564113] erofs: options -> fault_injection=0x0000000000000001, [ 277.576917] erofs: options -> fault_injection=0x0000000000000001, [ 277.581280] erofs: read_super, device -> /dev/loop2 [ 277.606153] erofs: FAULT_INJECTION was not selected [ 277.611956] erofs: options -> [ 277.616407] erofs: cannot find valid erofs superblock [ 277.624816] erofs: root inode @ nid 36 [ 277.630297] erofs: root inode @ nid 36 [ 277.631518] erofs: mounted on /dev/loop2 with opts: . [ 277.641777] FAULT_INJECTION: forcing a failure. [ 277.641777] name failslab, interval 1, probability 0, space 0, times 0 [ 277.647736] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 277.654863] CPU: 0 PID: 19404 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 277.669043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.678390] Call Trace: [ 277.680974] dump_stack+0x1fc/0x2ef [ 277.684588] should_fail.cold+0xa/0xf [ 277.688389] ? setup_fault_attr+0x200/0x200 [ 277.692703] ? lock_acquire+0x170/0x3c0 [ 277.696669] __should_failslab+0x115/0x180 [ 277.700895] should_failslab+0x5/0x10 [ 277.704675] kmem_cache_alloc+0x277/0x370 [ 277.708818] getname_flags+0xce/0x590 [ 277.712638] do_sys_open+0x26c/0x520 [ 277.716340] ? filp_open+0x70/0x70 [ 277.719885] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.725239] ? trace_hardirqs_off_caller+0x6e/0x210 [ 277.730247] ? do_syscall_64+0x21/0x620 [ 277.734223] do_syscall_64+0xf9/0x620 [ 277.738022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.743200] RIP: 0033:0x7fc7db7da004 [ 277.746900] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 277.765794] RSP: 002b:00007fc7da19beb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 277.773494] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db7da004 [ 277.780754] RDX: 0000000000000002 RSI: 00007fc7da19bfe0 RDI: 00000000ffffff9c [ 277.788012] RBP: 00007fc7da19bfe0 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 277.795280] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 17:19:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 8) [ 277.802547] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 17:19:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:19:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:19:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 277.855858] erofs: read_super, device -> /dev/loop0 [ 277.856603] erofs: read_super, device -> /dev/loop5 [ 277.881982] erofs: options -> [ 277.889328] erofs: root inode @ nid 36 [ 277.899936] erofs: bogus i_mode (0) @ nid 36 [ 277.904429] erofs: options -> fault_injection=0x00 [ 277.906026] erofs: unmounted for /dev/loop2 [ 277.914300] erofs: unmounted for /dev/loop4 [ 277.918091] erofs: FAULT_INJECTION was not selected [ 277.928363] FAULT_INJECTION: forcing a failure. [ 277.928363] name failslab, interval 1, probability 0, space 0, times 0 [ 277.941871] erofs: root inode @ nid 36 [ 277.941901] CPU: 0 PID: 19415 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 277.951535] erofs: mounted on /dev/loop5 with opts: fault_injection=0x00. [ 277.953630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.953636] Call Trace: [ 277.953656] dump_stack+0x1fc/0x2ef [ 277.953674] should_fail.cold+0xa/0xf [ 277.979884] ? setup_fault_attr+0x200/0x200 [ 277.984273] ? lock_acquire+0x170/0x3c0 [ 277.988237] __should_failslab+0x115/0x180 [ 277.992462] should_failslab+0x5/0x10 [ 277.996242] kmem_cache_alloc+0x277/0x370 [ 278.000371] __alloc_file+0x21/0x340 [ 278.004065] alloc_empty_file+0x6d/0x170 [ 278.008111] path_openat+0xe9/0x2df0 [ 278.011804] ? __lock_acquire+0x6de/0x3ff0 [ 278.016026] ? path_lookupat+0x8d0/0x8d0 [ 278.020070] ? mark_held_locks+0xf0/0xf0 [ 278.024111] ? mark_held_locks+0xf0/0xf0 [ 278.028158] do_filp_open+0x18c/0x3f0 [ 278.031941] ? may_open_dev+0xf0/0xf0 [ 278.035720] ? __alloc_fd+0x28d/0x570 [ 278.039508] ? lock_downgrade+0x720/0x720 [ 278.043636] ? lock_acquire+0x170/0x3c0 [ 278.047592] ? __alloc_fd+0x34/0x570 [ 278.051288] ? do_raw_spin_unlock+0x171/0x230 [ 278.055771] ? _raw_spin_unlock+0x29/0x40 [ 278.059905] ? __alloc_fd+0x28d/0x570 [ 278.063688] do_sys_open+0x3b3/0x520 [ 278.067385] ? filp_open+0x70/0x70 [ 278.070949] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.076306] ? trace_hardirqs_off_caller+0x6e/0x210 [ 278.081304] ? do_syscall_64+0x21/0x620 [ 278.085258] do_syscall_64+0xf9/0x620 [ 278.089044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.094309] RIP: 0033:0x7fc7db7da004 [ 278.098004] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 278.116892] RSP: 002b:00007fc7da19beb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 278.124589] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db7da004 [ 278.131841] RDX: 0000000000000002 RSI: 00007fc7da19bfe0 RDI: 00000000ffffff9c [ 278.139091] RBP: 00007fc7da19bfe0 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 278.146339] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 278.153592] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 17:19:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 9) 17:19:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00']) [ 278.222618] erofs: read_super, device -> /dev/loop3 [ 278.236583] erofs: options -> fault_injection=0x0000000000000001, [ 278.250826] erofs: cannot find valid erofs superblock [ 278.258101] erofs: unmounted for /dev/loop5 [ 278.266568] erofs: read_super, device -> /dev/loop4 17:19:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 278.292431] erofs: options -> fault_injection=0x0000000000000001, [ 278.302389] FAULT_INJECTION: forcing a failure. [ 278.302389] name failslab, interval 1, probability 0, space 0, times 0 [ 278.305498] erofs: FAULT_INJECTION was not selected [ 278.314361] CPU: 0 PID: 19431 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 278.325209] erofs: root inode @ nid 0 [ 278.326547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.326553] Call Trace: [ 278.326581] dump_stack+0x1fc/0x2ef [ 278.332245] erofs: bogus i_mode (0) @ nid 0 [ 278.339703] should_fail.cold+0xa/0xf [ 278.339721] ? setup_fault_attr+0x200/0x200 [ 278.339736] ? lock_acquire+0x170/0x3c0 [ 278.339755] __should_failslab+0x115/0x180 [ 278.339771] should_failslab+0x5/0x10 [ 278.339785] kmem_cache_alloc+0x277/0x370 [ 278.339803] __alloc_file+0x21/0x340 [ 278.339819] alloc_empty_file+0x6d/0x170 [ 278.339834] path_openat+0xe9/0x2df0 [ 278.339850] ? __lock_acquire+0x6de/0x3ff0 [ 278.390167] ? path_lookupat+0x8d0/0x8d0 [ 278.394222] ? mark_held_locks+0xf0/0xf0 [ 278.398278] do_filp_open+0x18c/0x3f0 [ 278.402063] ? may_open_dev+0xf0/0xf0 [ 278.405854] ? __alloc_fd+0x28d/0x570 [ 278.409645] ? lock_downgrade+0x720/0x720 [ 278.413778] ? lock_acquire+0x170/0x3c0 [ 278.417735] ? __alloc_fd+0x34/0x570 [ 278.421438] ? do_raw_spin_unlock+0x171/0x230 [ 278.425921] ? _raw_spin_unlock+0x29/0x40 [ 278.430055] ? __alloc_fd+0x28d/0x570 [ 278.433844] do_sys_open+0x3b3/0x520 [ 278.437545] ? filp_open+0x70/0x70 [ 278.441078] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.446459] ? trace_hardirqs_off_caller+0x6e/0x210 [ 278.451460] ? do_syscall_64+0x21/0x620 [ 278.455423] do_syscall_64+0xf9/0x620 [ 278.459214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.464387] RIP: 0033:0x7fc7db7da004 [ 278.468091] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 17:19:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 10) [ 278.486974] RSP: 002b:00007fc7da19beb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 278.494668] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db7da004 [ 278.501920] RDX: 0000000000000002 RSI: 00007fc7da19bfe0 RDI: 00000000ffffff9c [ 278.509171] RBP: 00007fc7da19bfe0 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 278.516425] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 278.523675] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 17:19:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 278.607565] erofs: read_super, device -> /dev/loop2 [ 278.612878] erofs: read_super, device -> /dev/loop0 [ 278.618187] erofs: read_super, device -> /dev/loop5 [ 278.643421] erofs: options -> fault_injection=0x00 [ 278.650466] erofs: options -> [ 278.653842] erofs: options -> [ 278.672766] FAULT_INJECTION: forcing a failure. [ 278.672766] name failslab, interval 1, probability 0, space 0, times 0 [ 278.674622] erofs: root inode @ nid 36 [ 278.690425] erofs: root inode @ nid 36 [ 278.697947] erofs: FAULT_INJECTION was not selected [ 278.702410] CPU: 0 PID: 19447 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 278.710280] erofs: mounted on /dev/loop2 with opts: . [ 278.711019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.725532] Call Trace: [ 278.728131] dump_stack+0x1fc/0x2ef [ 278.729011] erofs: root inode @ nid 36 [ 278.731763] should_fail.cold+0xa/0xf [ 278.731783] ? setup_fault_attr+0x200/0x200 [ 278.731800] ? lock_acquire+0x170/0x3c0 [ 278.731823] __should_failslab+0x115/0x180 [ 278.749313] erofs: mounted on /dev/loop5 with opts: fault_injection=0x00. [ 278.752047] should_failslab+0x5/0x10 [ 278.752068] kmem_cache_alloc_trace+0x284/0x380 [ 278.752089] apparmor_file_alloc_security+0x394/0xad0 17:19:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) [ 278.752106] ? apparmor_file_receive+0x160/0x160 [ 278.774602] erofs: bogus i_mode (0) @ nid 36 [ 278.777362] ? __alloc_file+0x21/0x340 [ 278.777385] security_file_alloc+0x40/0x90 [ 278.777400] __alloc_file+0xd8/0x340 [ 278.777415] alloc_empty_file+0x6d/0x170 [ 278.777433] path_openat+0xe9/0x2df0 [ 278.777448] ? __lock_acquire+0x6de/0x3ff0 [ 278.777468] ? path_lookupat+0x8d0/0x8d0 [ 278.809613] ? mark_held_locks+0xf0/0xf0 [ 278.813672] do_filp_open+0x18c/0x3f0 [ 278.817457] ? may_open_dev+0xf0/0xf0 [ 278.821237] ? __alloc_fd+0x28d/0x570 [ 278.825025] ? lock_downgrade+0x720/0x720 [ 278.829152] ? lock_acquire+0x170/0x3c0 [ 278.833113] ? __alloc_fd+0x34/0x570 [ 278.836822] ? do_raw_spin_unlock+0x171/0x230 [ 278.841308] ? _raw_spin_unlock+0x29/0x40 [ 278.845436] ? __alloc_fd+0x28d/0x570 [ 278.849221] do_sys_open+0x3b3/0x520 [ 278.852915] ? filp_open+0x70/0x70 [ 278.856438] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.861803] ? trace_hardirqs_off_caller+0x6e/0x210 [ 278.866819] ? do_syscall_64+0x21/0x620 [ 278.870798] do_syscall_64+0xf9/0x620 [ 278.874602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.879779] RIP: 0033:0x7fc7db7da004 [ 278.883473] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 278.902357] RSP: 002b:00007fc7da19beb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 278.910049] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db7da004 17:19:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 11) [ 278.917310] RDX: 0000000000000002 RSI: 00007fc7da19bfe0 RDI: 00000000ffffff9c [ 278.924568] RBP: 00007fc7da19bfe0 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 278.931824] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 278.939084] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 278.948897] erofs: unmounted for /dev/loop2 17:19:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 278.984935] erofs: read_super, device -> /dev/loop4 [ 279.001406] erofs: options -> fault_injection=0x0000000000000001, [ 279.014639] erofs: unmounted for /dev/loop5 [ 279.017530] erofs: FAULT_INJECTION was not selected [ 279.024047] erofs: root inode @ nid 0 [ 279.032785] erofs: read_super, device -> /dev/loop3 [ 279.042665] erofs: options -> fault_injection=0x0000000000000001, [ 279.049437] erofs: bogus i_mode (0) @ nid 0 [ 279.054476] erofs: cannot find valid erofs superblock [ 279.070025] FAULT_INJECTION: forcing a failure. [ 279.070025] name failslab, interval 1, probability 0, space 0, times 0 [ 279.081608] CPU: 1 PID: 19460 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 279.089493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.098835] Call Trace: [ 279.101417] dump_stack+0x1fc/0x2ef [ 279.105041] should_fail.cold+0xa/0xf [ 279.108824] ? setup_fault_attr+0x200/0x200 [ 279.113128] ? lock_acquire+0x170/0x3c0 [ 279.117086] __should_failslab+0x115/0x180 [ 279.121308] should_failslab+0x5/0x10 [ 279.125088] kmem_cache_alloc_trace+0x284/0x380 [ 279.129741] ? loop_info64_to_compat+0x5e0/0x5e0 [ 279.134477] __kthread_create_on_node+0xd2/0x410 [ 279.139213] ? kthread_parkme+0xa0/0xa0 [ 279.143180] ? lock_acquire+0x170/0x3c0 [ 279.147143] ? lo_ioctl+0x1bb/0x20e0 [ 279.150855] ? __mutex_lock+0x368/0x1190 [ 279.154905] ? lock_downgrade+0x720/0x720 [ 279.159031] ? check_preemption_disabled+0x41/0x280 [ 279.164040] ? loop_info64_to_compat+0x5e0/0x5e0 [ 279.168785] kthread_create_on_node+0xbb/0xf0 [ 279.173262] ? __kthread_create_on_node+0x410/0x410 [ 279.178266] ? __fget+0x356/0x510 [ 279.181712] ? do_dup2+0x450/0x450 [ 279.185233] ? __lockdep_init_map+0x100/0x5a0 [ 279.189708] ? __lockdep_init_map+0x100/0x5a0 [ 279.194188] lo_ioctl+0xae5/0x20e0 [ 279.197726] ? loop_set_status64+0x110/0x110 [ 279.202127] blkdev_ioctl+0x5cb/0x1a80 [ 279.205998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.211345] ? blkpg_ioctl+0x9d0/0x9d0 [ 279.215218] ? mark_held_locks+0xf0/0xf0 [ 279.219266] ? mark_held_locks+0xf0/0xf0 [ 279.223314] ? debug_check_no_obj_freed+0x201/0x490 [ 279.228319] ? lock_downgrade+0x720/0x720 [ 279.232449] block_ioctl+0xe9/0x130 [ 279.236054] ? blkdev_fallocate+0x3f0/0x3f0 [ 279.240355] do_vfs_ioctl+0xcdb/0x12e0 [ 279.244231] ? lock_downgrade+0x720/0x720 [ 279.248452] ? check_preemption_disabled+0x41/0x280 [ 279.253458] ? ioctl_preallocate+0x200/0x200 [ 279.257851] ? __fget+0x356/0x510 [ 279.261282] ? do_dup2+0x450/0x450 [ 279.264813] ? do_sys_open+0x2bf/0x520 [ 279.268690] ksys_ioctl+0x9b/0xc0 [ 279.272125] __x64_sys_ioctl+0x6f/0xb0 [ 279.275992] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 279.280558] do_syscall_64+0xf9/0x620 [ 279.284343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.289511] RIP: 0033:0x7fc7db826ea7 [ 279.293208] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 279.312091] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.319873] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 279.327135] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 279.334387] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 279.341641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 279.348907] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 17:19:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 12) 17:19:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:19:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 279.450144] erofs: read_super, device -> /dev/loop0 [ 279.455184] erofs: options -> [ 279.487899] erofs: root inode @ nid 36 [ 279.496614] erofs: read_super, device -> /dev/loop2 [ 279.509266] erofs: bogus i_mode (0) @ nid 36 [ 279.514961] erofs: options -> fault_injecti [ 279.522982] FAULT_INJECTION: forcing a failure. [ 279.522982] name failslab, interval 1, probability 0, space 0, times 0 [ 279.524313] erofs: Unrecognized mount option "fault_injecti" or missing value [ 279.543675] CPU: 1 PID: 19481 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 279.551575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.560923] Call Trace: [ 279.563499] dump_stack+0x1fc/0x2ef [ 279.567123] should_fail.cold+0xa/0xf [ 279.570913] ? setup_fault_attr+0x200/0x200 [ 279.575215] ? lock_acquire+0x170/0x3c0 [ 279.579173] __should_failslab+0x115/0x180 [ 279.583394] should_failslab+0x5/0x10 [ 279.587189] kmem_cache_alloc+0x277/0x370 [ 279.591409] __kernfs_new_node+0xd2/0x680 [ 279.595544] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 279.600288] ? __cpu_to_node+0x7b/0xa0 [ 279.604182] ? account_entity_enqueue+0x2e5/0x440 [ 279.609018] ? mark_held_locks+0xf0/0xf0 [ 279.613062] ? enqueue_entity+0xf86/0x3850 [ 279.617281] ? set_user_nice.part.0+0x3b9/0xab0 [ 279.621932] kernfs_create_dir_ns+0x9e/0x230 [ 279.626321] internal_create_group+0x1c1/0xb20 [ 279.630887] ? sysfs_remove_link_from_group+0x70/0x70 [ 279.636056] ? lock_downgrade+0x720/0x720 [ 279.640317] lo_ioctl+0xf7c/0x20e0 [ 279.643849] ? loop_set_status64+0x110/0x110 [ 279.648243] blkdev_ioctl+0x5cb/0x1a80 [ 279.652116] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.657466] ? blkpg_ioctl+0x9d0/0x9d0 [ 279.661348] ? mark_held_locks+0xf0/0xf0 [ 279.665402] ? mark_held_locks+0xf0/0xf0 [ 279.669459] ? debug_check_no_obj_freed+0x201/0x490 [ 279.674460] ? lock_downgrade+0x720/0x720 [ 279.678591] block_ioctl+0xe9/0x130 [ 279.682203] ? blkdev_fallocate+0x3f0/0x3f0 [ 279.686507] do_vfs_ioctl+0xcdb/0x12e0 [ 279.690379] ? lock_downgrade+0x720/0x720 [ 279.694508] ? check_preemption_disabled+0x41/0x280 [ 279.699507] ? ioctl_preallocate+0x200/0x200 [ 279.703902] ? __fget+0x356/0x510 [ 279.707338] ? do_dup2+0x450/0x450 [ 279.710862] ? do_sys_open+0x2bf/0x520 [ 279.714740] ksys_ioctl+0x9b/0xc0 [ 279.718173] __x64_sys_ioctl+0x6f/0xb0 [ 279.722040] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 279.726602] do_syscall_64+0xf9/0x620 [ 279.730389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.735560] RIP: 0033:0x7fc7db826ea7 [ 279.739256] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 279.758137] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.765824] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 279.773077] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 279.780338] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 279.787587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 279.794837] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 17:19:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 279.853118] erofs: read_super, device -> /dev/loop1 [ 279.855322] erofs: read_super, device -> /dev/loop5 [ 279.864011] erofs: options -> [ 279.873516] erofs: read_super, device -> /dev/loop4 [ 279.878951] erofs: read_super, device -> /dev/loop3 [ 279.882569] erofs: options -> fault_injectio [ 279.888086] erofs: options -> fault_injection=0x0000000000000001, [ 279.896713] erofs: options -> fault_injection=0x0000000000000001, [ 279.904400] erofs: blksize 1 isn't supported on this platform [ 279.905158] erofs: Unrecognized mount option "fault_injectio" or missing value [ 279.918570] erofs: FAULT_INJECTION was not selected [ 279.924099] erofs: FAULT_INJECTION was not selected [ 279.930365] erofs: root inode @ nid 36 17:19:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) 17:19:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 13) [ 279.960109] erofs: root inode @ nid 0 [ 279.969138] erofs: bogus i_mode (0) @ nid 36 [ 279.976555] erofs: bogus i_mode (0) @ nid 0 [ 280.008237] FAULT_INJECTION: forcing a failure. [ 280.008237] name failslab, interval 1, probability 0, space 0, times 0 [ 280.020273] CPU: 1 PID: 19503 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 280.028160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.037521] Call Trace: [ 280.040109] dump_stack+0x1fc/0x2ef [ 280.043721] should_fail.cold+0xa/0xf [ 280.047507] ? setup_fault_attr+0x200/0x200 [ 280.051811] ? lock_acquire+0x170/0x3c0 [ 280.055773] __should_failslab+0x115/0x180 [ 280.060007] should_failslab+0x5/0x10 [ 280.063883] kmem_cache_alloc+0x277/0x370 [ 280.068014] __kernfs_new_node+0xd2/0x680 [ 280.072155] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 280.076901] ? kernfs_activate+0x2c/0x1d0 [ 280.081042] ? lock_downgrade+0x720/0x720 [ 280.085195] ? kernfs_add_one+0x51/0x4c0 [ 280.089236] ? mutex_trylock+0x1a0/0x1a0 [ 280.093292] ? __mutex_unlock_slowpath+0xea/0x610 [ 280.098121] kernfs_new_node+0x92/0x120 [ 280.102089] __kernfs_create_file+0x51/0x340 [ 280.106597] sysfs_add_file_mode_ns+0x226/0x540 [ 280.111258] internal_create_group+0x355/0xb20 [ 280.115823] ? sysfs_remove_link_from_group+0x70/0x70 [ 280.120996] ? lock_downgrade+0x720/0x720 [ 280.125132] lo_ioctl+0xf7c/0x20e0 [ 280.128656] ? loop_set_status64+0x110/0x110 [ 280.133045] blkdev_ioctl+0x5cb/0x1a80 [ 280.136916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.142259] ? blkpg_ioctl+0x9d0/0x9d0 [ 280.146129] ? mark_held_locks+0xf0/0xf0 [ 280.150183] ? mark_held_locks+0xf0/0xf0 [ 280.154233] ? debug_check_no_obj_freed+0x201/0x490 [ 280.159233] ? lock_downgrade+0x720/0x720 [ 280.163364] block_ioctl+0xe9/0x130 [ 280.166972] ? blkdev_fallocate+0x3f0/0x3f0 [ 280.171274] do_vfs_ioctl+0xcdb/0x12e0 [ 280.175143] ? lock_downgrade+0x720/0x720 [ 280.179275] ? check_preemption_disabled+0x41/0x280 [ 280.184284] ? ioctl_preallocate+0x200/0x200 [ 280.188701] ? __fget+0x356/0x510 [ 280.192152] ? do_dup2+0x450/0x450 [ 280.195674] ? do_sys_open+0x2bf/0x520 [ 280.199546] ksys_ioctl+0x9b/0xc0 [ 280.202980] __x64_sys_ioctl+0x6f/0xb0 [ 280.206849] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 280.211459] do_syscall_64+0xf9/0x620 [ 280.215243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.220412] RIP: 0033:0x7fc7db826ea7 [ 280.224108] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 280.243076] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.250771] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 280.258026] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 280.265273] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 280.272520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 280.279771] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 280.348176] erofs: read_super, device -> /dev/loop0 [ 280.353400] erofs: options -> [ 280.357119] erofs: root inode @ nid 36 [ 280.361466] erofs: bogus i_mode (0) @ nid 36 17:19:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:19:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 280.412534] erofs: read_super, device -> /dev/loop2 [ 280.417381] erofs: read_super, device -> /dev/loop1 [ 280.423004] erofs: options -> [ 280.425664] erofs: options -> fault_injecti [ 280.434117] erofs: blksize 1 isn't supported on this platform [ 280.440262] erofs: Unrecognized mount option "fault_injecti" or missing value 17:19:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 14) 17:19:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) 17:19:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 280.545617] erofs: read_super, device -> /dev/loop4 [ 280.552448] erofs: read_super, device -> /dev/loop5 [ 280.564442] erofs: options -> fault_injectio [ 280.584255] erofs: options -> fault_injection=0x0000000000000001, 17:19:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 280.594093] erofs: Unrecognized mount option "fault_injectio" or missing value [ 280.607989] erofs: cannot find valid erofs superblock [ 280.758707] FAULT_INJECTION: forcing a failure. [ 280.758707] name failslab, interval 1, probability 0, space 0, times 0 [ 280.772957] CPU: 1 PID: 19534 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 280.780827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.790161] Call Trace: [ 280.792741] dump_stack+0x1fc/0x2ef [ 280.796365] should_fail.cold+0xa/0xf [ 280.800163] ? setup_fault_attr+0x200/0x200 [ 280.804472] ? lock_acquire+0x170/0x3c0 [ 280.808433] __should_failslab+0x115/0x180 [ 280.812652] should_failslab+0x5/0x10 [ 280.816433] kmem_cache_alloc+0x277/0x370 [ 280.820577] __kernfs_new_node+0xd2/0x680 [ 280.824712] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 280.829463] ? __mutex_unlock_slowpath+0xea/0x610 [ 280.834292] ? wait_for_completion_io+0x10/0x10 [ 280.838947] ? kernfs_next_descendant_post+0x19c/0x290 [ 280.844207] kernfs_new_node+0x92/0x120 [ 280.848164] __kernfs_create_file+0x51/0x340 [ 280.852574] sysfs_add_file_mode_ns+0x226/0x540 [ 280.857244] internal_create_group+0x355/0xb20 [ 280.861815] ? sysfs_remove_link_from_group+0x70/0x70 [ 280.866987] ? lock_downgrade+0x720/0x720 [ 280.871133] lo_ioctl+0xf7c/0x20e0 [ 280.874657] ? loop_set_status64+0x110/0x110 [ 280.879052] blkdev_ioctl+0x5cb/0x1a80 [ 280.882933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.888286] ? blkpg_ioctl+0x9d0/0x9d0 [ 280.892158] ? mark_held_locks+0xf0/0xf0 [ 280.896204] ? mark_held_locks+0xf0/0xf0 [ 280.900249] ? debug_check_no_obj_freed+0x201/0x490 [ 280.905270] ? lock_downgrade+0x720/0x720 [ 280.909434] block_ioctl+0xe9/0x130 [ 280.913056] ? blkdev_fallocate+0x3f0/0x3f0 [ 280.917367] do_vfs_ioctl+0xcdb/0x12e0 [ 280.921306] ? lock_downgrade+0x720/0x720 [ 280.925438] ? check_preemption_disabled+0x41/0x280 [ 280.930438] ? ioctl_preallocate+0x200/0x200 [ 280.934850] ? __fget+0x356/0x510 [ 280.938318] ? do_dup2+0x450/0x450 [ 280.941868] ? do_sys_open+0x2bf/0x520 [ 280.945741] ksys_ioctl+0x9b/0xc0 [ 280.949195] __x64_sys_ioctl+0x6f/0xb0 [ 280.953067] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 280.957635] do_syscall_64+0xf9/0x620 [ 280.961425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.966607] RIP: 0033:0x7fc7db826ea7 [ 280.970306] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 280.989189] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.996879] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 281.004129] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 281.011382] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 281.018641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 281.025891] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 281.044679] erofs: read_super, device -> /dev/loop1 [ 281.054556] erofs: options -> 17:19:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:19:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 281.067339] erofs: read_super, device -> /dev/loop2 [ 281.080668] erofs: read_super, device -> /dev/loop0 [ 281.085902] erofs: blksize 1 isn't supported on this platform [ 281.090646] erofs: options -> fault_injecti [ 281.100961] erofs: Unrecognized mount option "fault_injecti" or missing value 17:19:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 281.118841] erofs: options -> [ 281.126695] erofs: root inode @ nid 36 [ 281.131269] erofs: bogus i_mode (0) @ nid 36 17:19:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 15) 17:19:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00']) [ 281.276036] erofs: read_super, device -> /dev/loop4 [ 281.311376] erofs: options -> fault_injection=0x0000000000000001, [ 281.355600] erofs: cannot find valid erofs superblock 17:19:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 281.387954] erofs: read_super, device -> /dev/loop0 [ 281.393010] erofs: options -> [ 281.397068] erofs: root inode @ nid 36 [ 281.401516] erofs: bogus i_mode (0) @ nid 36 [ 281.417889] FAULT_INJECTION: forcing a failure. [ 281.417889] name failslab, interval 1, probability 0, space 0, times 0 [ 281.429960] CPU: 0 PID: 19576 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 281.437845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.447191] Call Trace: [ 281.449781] dump_stack+0x1fc/0x2ef [ 281.453410] should_fail.cold+0xa/0xf [ 281.457196] ? setup_fault_attr+0x200/0x200 [ 281.461509] ? lock_acquire+0x170/0x3c0 [ 281.465466] __should_failslab+0x115/0x180 [ 281.469698] should_failslab+0x5/0x10 [ 281.473489] kmem_cache_alloc+0x277/0x370 [ 281.477621] __kernfs_new_node+0xd2/0x680 [ 281.481754] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 281.486502] ? __mutex_unlock_slowpath+0xea/0x610 [ 281.491346] ? wait_for_completion_io+0x10/0x10 [ 281.496010] ? kernfs_next_descendant_post+0x19c/0x290 [ 281.501277] kernfs_new_node+0x92/0x120 [ 281.505244] __kernfs_create_file+0x51/0x340 [ 281.509776] sysfs_add_file_mode_ns+0x226/0x540 [ 281.514454] internal_create_group+0x355/0xb20 [ 281.519024] ? sysfs_remove_link_from_group+0x70/0x70 [ 281.524194] ? lock_downgrade+0x720/0x720 [ 281.528350] lo_ioctl+0xf7c/0x20e0 [ 281.531890] ? loop_set_status64+0x110/0x110 [ 281.536292] blkdev_ioctl+0x5cb/0x1a80 [ 281.540170] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.545599] ? blkpg_ioctl+0x9d0/0x9d0 [ 281.549479] ? mark_held_locks+0xf0/0xf0 [ 281.553645] ? mark_held_locks+0xf0/0xf0 [ 281.557702] ? debug_check_no_obj_freed+0x201/0x490 [ 281.562703] ? lock_downgrade+0x720/0x720 [ 281.566845] block_ioctl+0xe9/0x130 [ 281.570472] ? blkdev_fallocate+0x3f0/0x3f0 [ 281.574785] do_vfs_ioctl+0xcdb/0x12e0 [ 281.578660] ? lock_downgrade+0x720/0x720 [ 281.582797] ? check_preemption_disabled+0x41/0x280 [ 281.587932] ? ioctl_preallocate+0x200/0x200 [ 281.592338] ? __fget+0x356/0x510 [ 281.595952] ? do_dup2+0x450/0x450 [ 281.599484] ? do_sys_open+0x2bf/0x520 [ 281.603365] ksys_ioctl+0x9b/0xc0 [ 281.606831] __x64_sys_ioctl+0x6f/0xb0 [ 281.610725] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 281.615300] do_syscall_64+0xf9/0x620 [ 281.619091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.624258] RIP: 0033:0x7fc7db826ea7 [ 281.627960] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 281.646870] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.654581] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 281.661843] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 281.669101] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 281.676364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 281.683614] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 281.709398] erofs: read_super, device -> /dev/loop5 [ 281.713441] erofs: read_super, device -> /dev/loop1 [ 281.714434] erofs: options -> fault_injectio [ 281.719193] erofs: Unrecognized mount option "fault_injectio" or missing value [ 281.719921] erofs: options -> [ 281.734990] erofs: blksize 1 isn't supported on this platform 17:19:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) 17:19:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 281.808982] erofs: read_super, device -> /dev/loop2 [ 281.814062] erofs: options -> fault_injection=0x00 [ 281.825073] erofs: FAULT_INJECTION was not selected [ 281.830386] erofs: root inode @ nid 36 [ 281.835313] erofs: mounted on /dev/loop2 with opts: fault_injection=0x00. 17:19:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 16) 17:19:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 281.886487] erofs: read_super, device -> /dev/loop3 [ 281.900269] erofs: options -> [ 281.920017] erofs: root inode @ nid 36 [ 281.928014] erofs: unmounted for /dev/loop2 [ 281.941393] erofs: bogus i_mode (0) @ nid 36 [ 281.970229] erofs: read_super, device -> /dev/loop4 [ 281.975586] erofs: options -> fault_injection=0x0000000000000001, [ 281.982629] erofs: cannot find valid erofs superblock [ 282.010842] FAULT_INJECTION: forcing a failure. [ 282.010842] name failslab, interval 1, probability 0, space 0, times 0 [ 282.022535] CPU: 0 PID: 19601 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 282.030409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.039747] Call Trace: [ 282.042325] dump_stack+0x1fc/0x2ef [ 282.045948] should_fail.cold+0xa/0xf [ 282.049736] ? is_bpf_text_address+0xfc/0x1b0 [ 282.054227] ? setup_fault_attr+0x200/0x200 [ 282.058639] ? kernel_text_address+0xbd/0xf0 [ 282.063037] ? __kernel_text_address+0x9/0x30 [ 282.067520] ? unwind_get_return_address+0x51/0x90 [ 282.072445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.077805] __should_failslab+0x115/0x180 [ 282.082044] should_failslab+0x5/0x10 [ 282.085847] kmem_cache_alloc+0x3f/0x370 [ 282.089897] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 282.095514] idr_get_free+0x50e/0xa10 [ 282.099315] idr_alloc_u32+0x1a5/0x320 [ 282.103190] ? __fprop_inc_percpu_max+0x210/0x210 [ 282.108022] ? mark_held_locks+0xf0/0xf0 [ 282.112076] ? node_tag_clear+0xb5/0x1b0 [ 282.116151] ? should_fail+0x142/0x7b0 [ 282.120040] ? fs_reclaim_release+0xd0/0x110 [ 282.124454] idr_alloc_cyclic+0x102/0x230 [ 282.128591] ? idr_alloc+0x130/0x130 [ 282.132290] ? __kernfs_new_node+0xf9/0x680 [ 282.136618] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 282.141624] __kernfs_new_node+0x11a/0x680 [ 282.145845] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 282.150586] ? __mutex_unlock_slowpath+0xea/0x610 [ 282.155427] ? wait_for_completion_io+0x10/0x10 [ 282.160090] ? kernfs_next_descendant_post+0x19c/0x290 [ 282.165372] kernfs_new_node+0x92/0x120 [ 282.169347] __kernfs_create_file+0x51/0x340 [ 282.173741] sysfs_add_file_mode_ns+0x226/0x540 [ 282.178411] internal_create_group+0x355/0xb20 [ 282.182983] ? sysfs_remove_link_from_group+0x70/0x70 [ 282.188153] ? lock_downgrade+0x720/0x720 [ 282.192290] lo_ioctl+0xf7c/0x20e0 [ 282.195817] ? loop_set_status64+0x110/0x110 [ 282.200211] blkdev_ioctl+0x5cb/0x1a80 [ 282.204091] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.209449] ? blkpg_ioctl+0x9d0/0x9d0 [ 282.213319] ? mark_held_locks+0xf0/0xf0 [ 282.217369] ? mark_held_locks+0xf0/0xf0 [ 282.221424] ? debug_check_no_obj_freed+0x201/0x490 [ 282.226435] ? lock_downgrade+0x720/0x720 [ 282.230578] block_ioctl+0xe9/0x130 [ 282.234193] ? blkdev_fallocate+0x3f0/0x3f0 [ 282.238496] do_vfs_ioctl+0xcdb/0x12e0 [ 282.242366] ? lock_downgrade+0x720/0x720 [ 282.246499] ? check_preemption_disabled+0x41/0x280 [ 282.251513] ? ioctl_preallocate+0x200/0x200 [ 282.255921] ? __fget+0x356/0x510 [ 282.259356] ? do_dup2+0x450/0x450 [ 282.262876] ? do_sys_open+0x2bf/0x520 [ 282.266748] ksys_ioctl+0x9b/0xc0 [ 282.270197] __x64_sys_ioctl+0x6f/0xb0 [ 282.274082] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 282.278644] do_syscall_64+0xf9/0x620 [ 282.282451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.287628] RIP: 0033:0x7fc7db826ea7 [ 282.291333] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 282.310231] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 282.317939] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 282.325194] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 282.332454] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 282.339713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 282.346975] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 282.400322] erofs: read_super, device -> /dev/loop5 [ 282.413795] erofs: options -> fault_injection=0 [ 282.421804] erofs: FAULT_INJECTION was not selected [ 282.429120] erofs: root inode @ nid 36 [ 282.434718] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 282.444523] erofs: read_super, device -> /dev/loop0 17:19:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 1) 17:19:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b287f927ba19fb9bfc88e37709bfb6cd7db8796230a110b8c89405ba929e7c660b04c82b76aec284bb9de534b20013f823a99f272c"]) [ 282.444526] erofs: read_super, device -> /dev/loop1 [ 282.444535] erofs: options -> [ 282.449978] erofs: read_super, device -> /dev/loop2 [ 282.470169] erofs: options -> [ 282.475601] erofs: blksize 1 isn't supported on this platform [ 282.496070] erofs: options -> fault_injectio [ 282.502395] erofs: root inode @ nid 36 [ 282.512793] erofs: Unrecognized mount option "fault_injectio" or missing value [ 282.512800] erofs: bogus i_mode (0) @ nid 36 [ 282.529819] FAULT_INJECTION: forcing a failure. [ 282.529819] name failslab, interval 1, probability 0, space 0, times 0 [ 282.541883] CPU: 0 PID: 19621 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 17:19:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 282.549774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.559121] Call Trace: [ 282.561718] dump_stack+0x1fc/0x2ef [ 282.565350] should_fail.cold+0xa/0xf [ 282.569137] ? setup_fault_attr+0x200/0x200 [ 282.573441] ? lock_acquire+0x170/0x3c0 [ 282.577398] __should_failslab+0x115/0x180 [ 282.581616] should_failslab+0x5/0x10 [ 282.585397] __kmalloc+0x2ab/0x3c0 [ 282.588921] ? __se_sys_memfd_create+0xf8/0x440 [ 282.593571] __se_sys_memfd_create+0xf8/0x440 [ 282.598044] ? memfd_file_seals_ptr+0x150/0x150 [ 282.602704] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.608053] ? trace_hardirqs_off_caller+0x6e/0x210 [ 282.613063] ? do_syscall_64+0x21/0x620 [ 282.617027] do_syscall_64+0xf9/0x620 [ 282.620810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.625978] RIP: 0033:0x7fc67b85a0e9 [ 282.629670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:19:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 2) [ 282.649253] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.656941] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc67b85a0e9 [ 282.664196] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc67b8b31ee [ 282.671464] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fc67a1cf1d0 [ 282.678722] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 282.685971] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 282.693758] erofs: unmounted for /dev/loop5 17:19:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 17) 17:19:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 282.731270] erofs: read_super, device -> /dev/loop4 [ 282.736307] erofs: options -> fault_injection=0x0000000000000001, [ 282.749069] erofs: FAULT_INJECTION was not selected [ 282.754171] erofs: root inode @ nid 36 [ 282.758701] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. 17:19:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 282.852470] erofs: unmounted for /dev/loop4 [ 282.859651] FAULT_INJECTION: forcing a failure. [ 282.859651] name failslab, interval 1, probability 0, space 0, times 0 [ 282.875412] CPU: 0 PID: 19638 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 282.883307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.892661] Call Trace: [ 282.895248] dump_stack+0x1fc/0x2ef [ 282.898864] should_fail.cold+0xa/0xf [ 282.902649] ? setup_fault_attr+0x200/0x200 [ 282.906958] ? lock_acquire+0x170/0x3c0 [ 282.910919] __should_failslab+0x115/0x180 [ 282.915136] should_failslab+0x5/0x10 [ 282.918929] kmem_cache_alloc+0x277/0x370 [ 282.923068] ? shmem_destroy_callback+0xb0/0xb0 [ 282.927725] shmem_alloc_inode+0x18/0x40 [ 282.931775] ? shmem_destroy_callback+0xb0/0xb0 [ 282.936422] alloc_inode+0x5d/0x180 [ 282.940027] new_inode+0x1d/0xf0 [ 282.943373] shmem_get_inode+0x96/0x8d0 [ 282.947332] __shmem_file_setup.part.0+0x7a/0x2b0 [ 282.952156] shmem_file_setup+0x61/0x90 [ 282.956113] __se_sys_memfd_create+0x26b/0x440 [ 282.960679] ? memfd_file_seals_ptr+0x150/0x150 [ 282.965339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.970684] ? trace_hardirqs_off_caller+0x6e/0x210 [ 282.975680] ? do_syscall_64+0x21/0x620 [ 282.979634] do_syscall_64+0xf9/0x620 [ 282.983419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.988593] RIP: 0033:0x7fc67b85a0e9 [ 282.992286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 283.011167] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.018867] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc67b85a0e9 [ 283.026152] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc67b8b31ee [ 283.033417] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fc67a1cf1d0 [ 283.040680] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 283.047939] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 3) [ 283.073820] FAULT_INJECTION: forcing a failure. [ 283.073820] name failslab, interval 1, probability 0, space 0, times 0 [ 283.088020] CPU: 1 PID: 19639 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 283.095914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.105249] Call Trace: [ 283.107840] dump_stack+0x1fc/0x2ef [ 283.111460] should_fail.cold+0xa/0xf [ 283.115240] ? setup_fault_attr+0x200/0x200 [ 283.119540] ? lock_acquire+0x170/0x3c0 [ 283.123498] __should_failslab+0x115/0x180 [ 283.127723] should_failslab+0x5/0x10 [ 283.131512] kmem_cache_alloc+0x277/0x370 [ 283.135640] __kernfs_new_node+0xd2/0x680 [ 283.139768] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 283.144509] ? __mutex_unlock_slowpath+0xea/0x610 [ 283.149342] ? wait_for_completion_io+0x10/0x10 [ 283.153997] ? kernfs_next_descendant_post+0x19c/0x290 [ 283.159254] kernfs_new_node+0x92/0x120 [ 283.163207] __kernfs_create_file+0x51/0x340 [ 283.167607] sysfs_add_file_mode_ns+0x226/0x540 [ 283.172264] internal_create_group+0x355/0xb20 [ 283.176826] ? sysfs_remove_link_from_group+0x70/0x70 [ 283.181993] ? lock_downgrade+0x720/0x720 [ 283.186124] lo_ioctl+0xf7c/0x20e0 [ 283.189662] ? loop_set_status64+0x110/0x110 [ 283.194060] blkdev_ioctl+0x5cb/0x1a80 [ 283.197930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.203271] ? blkpg_ioctl+0x9d0/0x9d0 [ 283.207145] ? mark_held_locks+0xf0/0xf0 [ 283.211197] ? mark_held_locks+0xf0/0xf0 [ 283.215240] ? debug_check_no_obj_freed+0x201/0x490 [ 283.220238] ? lock_downgrade+0x720/0x720 [ 283.224361] block_ioctl+0xe9/0x130 [ 283.227975] ? blkdev_fallocate+0x3f0/0x3f0 [ 283.232284] do_vfs_ioctl+0xcdb/0x12e0 [ 283.236152] ? lock_downgrade+0x720/0x720 [ 283.240279] ? check_preemption_disabled+0x41/0x280 [ 283.245270] ? ioctl_preallocate+0x200/0x200 [ 283.249673] ? __fget+0x356/0x510 [ 283.253113] ? do_dup2+0x450/0x450 [ 283.256633] ? do_sys_open+0x2bf/0x520 [ 283.260500] ksys_ioctl+0x9b/0xc0 [ 283.263930] __x64_sys_ioctl+0x6f/0xb0 [ 283.267806] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 283.272374] do_syscall_64+0xf9/0x620 [ 283.276158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.281325] RIP: 0033:0x7fc7db826ea7 [ 283.285016] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 283.303900] RSP: 002b:00007fc7da19bf28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 283.311590] RAX: ffffffffffffffda RBX: 00007fc7db870a20 RCX: 00007fc7db826ea7 [ 283.318837] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 283.326081] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc7da19c1d0 [ 283.333330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 283.340577] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 283.363865] erofs: read_super, device -> /dev/loop5 [ 283.369040] erofs: options -> fault_injectio [ 283.369173] erofs: read_super, device -> /dev/loop1 [ 283.378960] erofs: read_super, device -> /dev/loop0 [ 283.381067] erofs: Unrecognized mount option "fault_injectio" or missing value [ 283.383977] erofs: options -> [ 283.408421] erofs: options -> [ 283.412000] FAULT_INJECTION: forcing a failure. [ 283.412000] name failslab, interval 1, probability 0, space 0, times 0 [ 283.413786] erofs: blksize 1 isn't supported on this platform [ 283.430029] erofs: root inode @ nid 36 [ 283.434410] erofs: bogus i_mode (0) @ nid 36 [ 283.437539] CPU: 0 PID: 19655 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 283.439239] erofs: read_super, device -> /dev/loop2 [ 283.446683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.446689] Call Trace: [ 283.446709] dump_stack+0x1fc/0x2ef [ 283.446729] should_fail.cold+0xa/0xf [ 283.471029] ? setup_fault_attr+0x200/0x200 [ 283.475361] ? lock_acquire+0x170/0x3c0 [ 283.477222] erofs: options -> fault_injectio [ 283.479340] __should_failslab+0x115/0x180 [ 283.479359] should_failslab+0x5/0x10 [ 283.479374] kmem_cache_alloc+0x277/0x370 [ 283.479392] __d_alloc+0x2b/0xa10 [ 283.479413] d_alloc_pseudo+0x19/0x70 [ 283.479431] alloc_file_pseudo+0xc6/0x250 [ 283.484262] erofs: Unrecognized mount option "fault_injectio" or missing value [ 283.488038] ? alloc_file+0x4d0/0x4d0 [ 283.488054] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 283.488072] ? shmem_get_inode+0x44c/0x8d0 [ 283.488093] __shmem_file_setup.part.0+0x102/0x2b0 [ 283.488113] shmem_file_setup+0x61/0x90 [ 283.488127] __se_sys_memfd_create+0x26b/0x440 [ 283.488140] ? memfd_file_seals_ptr+0x150/0x150 [ 283.488155] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.488175] ? trace_hardirqs_off_caller+0x6e/0x210 [ 283.556748] ? do_syscall_64+0x21/0x620 [ 283.560724] do_syscall_64+0xf9/0x620 [ 283.564527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.569695] RIP: 0033:0x7fc67b85a0e9 [ 283.573391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 283.592270] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.599970] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc67b85a0e9 [ 283.607229] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc67b8b31ee [ 283.614491] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fc67a1cf1d0 17:19:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 4) 17:19:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 283.621739] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 283.628985] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 283.682525] FAULT_INJECTION: forcing a failure. [ 283.682525] name failslab, interval 1, probability 0, space 0, times 0 [ 283.696629] CPU: 0 PID: 19663 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 283.704514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.713853] Call Trace: [ 283.716427] dump_stack+0x1fc/0x2ef [ 283.720040] should_fail.cold+0xa/0xf [ 283.723825] ? setup_fault_attr+0x200/0x200 [ 283.728128] ? lock_acquire+0x170/0x3c0 [ 283.732089] __should_failslab+0x115/0x180 [ 283.736310] should_failslab+0x5/0x10 [ 283.740096] kmem_cache_alloc+0x277/0x370 [ 283.744228] __alloc_file+0x21/0x340 [ 283.747951] alloc_empty_file+0x6d/0x170 [ 283.752005] alloc_file+0x5e/0x4d0 [ 283.755529] alloc_file_pseudo+0x165/0x250 [ 283.759750] ? alloc_file+0x4d0/0x4d0 [ 283.763544] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 283.769245] ? shmem_get_inode+0x44c/0x8d0 [ 283.773467] __shmem_file_setup.part.0+0x102/0x2b0 [ 283.778379] shmem_file_setup+0x61/0x90 [ 283.782365] __se_sys_memfd_create+0x26b/0x440 [ 283.786928] ? memfd_file_seals_ptr+0x150/0x150 [ 283.791582] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.796925] ? trace_hardirqs_off_caller+0x6e/0x210 [ 283.801924] ? do_syscall_64+0x21/0x620 [ 283.805889] do_syscall_64+0xf9/0x620 [ 283.809685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.814857] RIP: 0033:0x7fc67b85a0e9 [ 283.818551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 283.837432] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.845127] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc67b85a0e9 [ 283.852378] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc67b8b31ee [ 283.859631] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fc67a1cf1d0 [ 283.866884] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 283.874138] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 5) 17:19:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 283.930258] FAULT_INJECTION: forcing a failure. [ 283.930258] name failslab, interval 1, probability 0, space 0, times 0 [ 283.963088] CPU: 1 PID: 19669 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 283.970994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.980355] Call Trace: [ 283.982952] dump_stack+0x1fc/0x2ef [ 283.986597] should_fail.cold+0xa/0xf [ 283.990407] ? setup_fault_attr+0x200/0x200 [ 283.994742] ? lock_acquire+0x170/0x3c0 [ 283.998717] __should_failslab+0x115/0x180 [ 284.002946] should_failslab+0x5/0x10 [ 284.006745] kmem_cache_alloc_trace+0x284/0x380 [ 284.011413] apparmor_file_alloc_security+0x394/0xad0 [ 284.016587] ? apparmor_file_receive+0x160/0x160 [ 284.021326] ? __alloc_file+0x21/0x340 [ 284.025210] security_file_alloc+0x40/0x90 [ 284.029432] __alloc_file+0xd8/0x340 [ 284.033131] alloc_empty_file+0x6d/0x170 [ 284.037208] alloc_file+0x5e/0x4d0 [ 284.040748] alloc_file_pseudo+0x165/0x250 [ 284.044979] ? alloc_file+0x4d0/0x4d0 [ 284.048777] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 284.054395] ? shmem_get_inode+0x44c/0x8d0 [ 284.058619] __shmem_file_setup.part.0+0x102/0x2b0 [ 284.063543] shmem_file_setup+0x61/0x90 [ 284.067520] __se_sys_memfd_create+0x26b/0x440 [ 284.072101] ? memfd_file_seals_ptr+0x150/0x150 [ 284.076765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.082125] ? trace_hardirqs_off_caller+0x6e/0x210 [ 284.087129] ? do_syscall_64+0x21/0x620 [ 284.091098] do_syscall_64+0xf9/0x620 [ 284.094896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.100079] RIP: 0033:0x7fc67b85a0e9 [ 284.103776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 284.122666] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:19:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 6) [ 284.130370] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc67b85a0e9 [ 284.137632] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fc67b8b31ee [ 284.144892] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fc67a1cf1d0 [ 284.152144] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 284.159413] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 284.207374] erofs: read_super, device -> /dev/loop2 [ 284.207702] erofs: read_super, device -> /dev/loop0 [ 284.212607] erofs: options -> fault_injectio [ 284.212856] erofs: Unrecognized mount option "fault_injectio" or missing value [ 284.218039] erofs: read_super, device -> /dev/loop1 [ 284.218047] erofs: options -> [ 284.225963] erofs: read_super, device -> /dev/loop5 [ 284.244736] erofs: blksize 1 isn't supported on this platform [ 284.248925] FAULT_INJECTION: forcing a failure. [ 284.248925] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.251791] erofs: options -> [ 284.262606] CPU: 0 PID: 19689 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 284.272317] erofs: options -> fault_injectio [ 284.273608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.273614] Call Trace: [ 284.273635] dump_stack+0x1fc/0x2ef [ 284.273657] should_fail.cold+0xa/0xf [ 284.273672] ? lock_acquire+0x170/0x3c0 [ 284.273694] ? setup_fault_attr+0x200/0x200 [ 284.281452] erofs: Unrecognized mount option "fault_injectio" or missing value [ 284.287434] __alloc_pages_nodemask+0x239/0x2890 [ 284.287453] ? __lock_acquire+0x6de/0x3ff0 [ 284.287472] ? static_obj+0x50/0x50 [ 284.287492] ? __lock_acquire+0x6de/0x3ff0 [ 284.287507] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 284.287522] ? __lock_acquire+0x6de/0x3ff0 [ 284.287542] ? mark_held_locks+0xf0/0xf0 [ 284.342892] ? unwind_next_frame+0xeee/0x1400 [ 284.347374] ? mark_held_locks+0xf0/0xf0 [ 284.351419] ? deref_stack_reg+0x134/0x1d0 [ 284.355638] ? get_reg+0x176/0x1f0 [ 284.359162] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 284.365043] alloc_pages_vma+0xf2/0x780 [ 284.369012] shmem_alloc_page+0x11c/0x1f0 [ 284.373140] ? shmem_swapin+0x220/0x220 [ 284.377112] ? percpu_counter_add_batch+0x126/0x180 [ 284.382120] ? __vm_enough_memory+0x316/0x650 [ 284.386602] shmem_alloc_and_acct_page+0x15a/0x850 [ 284.391526] shmem_getpage_gfp+0x4e9/0x37f0 [ 284.395857] ? shmem_alloc_and_acct_page+0x850/0x850 [ 284.400951] ? mark_held_locks+0xa6/0xf0 [ 284.404995] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 284.410182] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 284.415359] shmem_write_begin+0xff/0x1e0 [ 284.419495] generic_perform_write+0x1f8/0x4d0 [ 284.424065] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 284.428726] ? current_time+0x1c0/0x1c0 [ 284.432695] ? lock_acquire+0x170/0x3c0 [ 284.436667] __generic_file_write_iter+0x24b/0x610 [ 284.441581] generic_file_write_iter+0x3f8/0x730 [ 284.446339] __vfs_write+0x51b/0x770 [ 284.450055] ? kernel_read+0x110/0x110 [ 284.453940] ? check_preemption_disabled+0x41/0x280 [ 284.458962] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 284.463964] vfs_write+0x1f3/0x540 [ 284.467488] __x64_sys_pwrite64+0x1f7/0x250 [ 284.471795] ? ksys_pwrite64+0x1a0/0x1a0 [ 284.475840] ? trace_hardirqs_off_caller+0x6e/0x210 [ 284.480847] ? do_syscall_64+0x21/0x620 [ 284.484817] do_syscall_64+0xf9/0x620 [ 284.488621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.493800] RIP: 0033:0x7fc67b80d0b7 [ 284.497592] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 284.516476] RSP: 002b:00007fc67a1cef00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 284.524171] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b80d0b7 [ 284.531428] RDX: 0000000000000010 RSI: 0000000020010000 RDI: 0000000000000004 [ 284.538687] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 284.545950] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 284.553202] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 17:19:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 284.583519] erofs: root inode @ nid 36 [ 284.588250] erofs: bogus i_mode (0) @ nid 36 17:19:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 284.669927] erofs: read_super, device -> /dev/loop3 [ 284.674968] erofs: options -> [ 284.701703] erofs: cannot find valid erofs superblock 17:19:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 7) 17:19:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 284.845314] erofs: read_super, device -> /dev/loop0 [ 284.850710] erofs: options -> [ 284.854414] erofs: read_super, device -> /dev/loop2 [ 284.861188] erofs: options -> fault_injection=0 [ 284.868609] erofs: root inode @ nid 36 [ 284.874917] erofs: FAULT_INJECTION was not selected [ 284.878550] erofs: bogus i_mode (0) @ nid 36 [ 284.884940] erofs: root inode @ nid 36 [ 284.893403] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 284.893456] erofs: read_super, device -> /dev/loop5 [ 284.901046] FAULT_INJECTION: forcing a failure. [ 284.901046] name failslab, interval 1, probability 0, space 0, times 0 [ 284.916943] erofs: read_super, device -> /dev/loop1 [ 284.922568] erofs: options -> [ 284.926385] erofs: blksize 1 isn't supported on this platform [ 284.927393] erofs: options -> fault_injectio [ 284.932995] CPU: 1 PID: 19723 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 284.933005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.933010] Call Trace: [ 284.933029] dump_stack+0x1fc/0x2ef [ 284.933050] should_fail.cold+0xa/0xf [ 284.933068] ? setup_fault_attr+0x200/0x200 [ 284.933083] ? lock_acquire+0x170/0x3c0 [ 284.933104] __should_failslab+0x115/0x180 [ 284.933120] should_failslab+0x5/0x10 [ 284.933134] kmem_cache_alloc+0x277/0x370 [ 284.933160] getname_flags+0xce/0x590 [ 284.933179] do_sys_open+0x26c/0x520 [ 284.933194] ? filp_open+0x70/0x70 [ 284.933212] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.933231] ? trace_hardirqs_off_caller+0x6e/0x210 [ 284.947465] erofs: Unrecognized mount option "fault_injectio" or missing value [ 284.954853] ? do_syscall_64+0x21/0x620 [ 284.954872] do_syscall_64+0xf9/0x620 [ 284.954896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.026956] RIP: 0033:0x7fc67b80d004 17:19:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 8) 17:19:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 285.030675] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 285.049662] RSP: 002b:00007fc67a1ceeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 285.057364] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b80d004 [ 285.064627] RDX: 0000000000000002 RSI: 00007fc67a1cefe0 RDI: 00000000ffffff9c [ 285.071891] RBP: 00007fc67a1cefe0 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 285.079162] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 285.086428] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 285.125060] erofs: unmounted for /dev/loop2 [ 285.188604] FAULT_INJECTION: forcing a failure. [ 285.188604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 285.200409] CPU: 1 PID: 19733 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 285.208283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.217623] Call Trace: [ 285.220207] dump_stack+0x1fc/0x2ef [ 285.223836] should_fail.cold+0xa/0xf [ 285.227623] ? setup_fault_attr+0x200/0x200 [ 285.231934] ? do_writepages+0x290/0x290 [ 285.235990] ? unlock_page+0x13d/0x230 [ 285.239870] __alloc_pages_nodemask+0x239/0x2890 [ 285.244613] ? lock_downgrade+0x720/0x720 [ 285.248751] ? check_preemption_disabled+0x41/0x280 [ 285.253754] ? __lock_acquire+0x6de/0x3ff0 [ 285.257982] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 285.262808] ? lock_downgrade+0x720/0x720 [ 285.266939] ? lock_acquire+0x170/0x3c0 [ 285.270901] ? up_write+0x18/0x150 [ 285.274426] ? generic_file_write_iter+0x381/0x730 [ 285.279338] ? iov_iter_init+0xb8/0x1d0 [ 285.283296] cache_grow_begin+0xa4/0x8a0 [ 285.287342] ? setup_fault_attr+0x200/0x200 [ 285.291650] ? lock_acquire+0x170/0x3c0 [ 285.295607] cache_alloc_refill+0x273/0x340 [ 285.299923] kmem_cache_alloc+0x346/0x370 [ 285.304056] getname_flags+0xce/0x590 [ 285.307858] do_sys_open+0x26c/0x520 [ 285.311564] ? filp_open+0x70/0x70 [ 285.315089] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.320438] ? trace_hardirqs_off_caller+0x6e/0x210 [ 285.325439] ? do_syscall_64+0x21/0x620 [ 285.329405] do_syscall_64+0xf9/0x620 [ 285.333196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.338368] RIP: 0033:0x7fc67b80d004 [ 285.342074] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 285.360966] RSP: 002b:00007fc67a1ceeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 285.368657] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b80d004 [ 285.375907] RDX: 0000000000000002 RSI: 00007fc67a1cefe0 RDI: 00000000ffffff9c [ 285.383159] RBP: 00007fc67a1cefe0 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 285.390413] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 285.397664] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) [ 285.525789] erofs: read_super, device -> /dev/loop3 [ 285.544776] erofs: options -> [ 285.551106] erofs: read_super, device -> /dev/loop4 [ 285.556130] erofs: options -> [ 285.573758] erofs: root inode @ nid 36 [ 285.587276] erofs: root inode @ nid 36 [ 285.592025] erofs: bogus i_mode (0) @ nid 36 [ 285.599665] erofs: read_super, device -> /dev/loop2 [ 285.605493] erofs: read_super, device -> /dev/loop1 [ 285.610852] erofs: options -> fault_injectio [ 285.615718] erofs: mounted on /dev/loop4 with opts: . 17:19:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 9) 17:19:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 285.622928] erofs: read_super, device -> /dev/loop0 [ 285.625152] erofs: read_super, device -> /dev/loop5 [ 285.633246] erofs: options -> [ 285.635712] erofs: options -> [ 285.637178] erofs: options -> fault_injection= [ 285.645266] erofs: blksize 1 isn't supported on this platform [ 285.650721] erofs: root inode @ nid 36 [ 285.653345] erofs: Unrecognized mount option "fault_injection=" or missing value [ 285.658463] erofs: bogus i_mode (0) @ nid 36 [ 285.663016] erofs: Unrecognized mount option "fault_injectio" or missing value [ 285.700327] erofs: unmounted for /dev/loop4 [ 285.844908] FAULT_INJECTION: forcing a failure. [ 285.844908] name failslab, interval 1, probability 0, space 0, times 0 [ 285.857088] CPU: 1 PID: 19769 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 285.865010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.874364] Call Trace: [ 285.876956] dump_stack+0x1fc/0x2ef [ 285.880590] should_fail.cold+0xa/0xf [ 285.884388] ? setup_fault_attr+0x200/0x200 [ 285.888696] ? lock_acquire+0x170/0x3c0 [ 285.892660] __should_failslab+0x115/0x180 [ 285.896899] should_failslab+0x5/0x10 [ 285.900709] kmem_cache_alloc_trace+0x284/0x380 [ 285.905379] apparmor_file_alloc_security+0x394/0xad0 [ 285.910557] ? apparmor_file_receive+0x160/0x160 [ 285.915297] ? __alloc_file+0x21/0x340 [ 285.919191] security_file_alloc+0x40/0x90 [ 285.923422] __alloc_file+0xd8/0x340 [ 285.927140] alloc_empty_file+0x6d/0x170 [ 285.931190] path_openat+0xe9/0x2df0 [ 285.934903] ? __lock_acquire+0x6de/0x3ff0 [ 285.939153] ? path_lookupat+0x8d0/0x8d0 [ 285.943209] ? mark_held_locks+0xf0/0xf0 [ 285.947261] ? mark_held_locks+0xf0/0xf0 [ 285.951311] do_filp_open+0x18c/0x3f0 [ 285.955096] ? may_open_dev+0xf0/0xf0 [ 285.958895] ? __alloc_fd+0x28d/0x570 [ 285.962696] ? lock_downgrade+0x720/0x720 [ 285.966837] ? lock_acquire+0x170/0x3c0 [ 285.970800] ? __alloc_fd+0x34/0x570 [ 285.974509] ? do_raw_spin_unlock+0x171/0x230 [ 285.979000] ? _raw_spin_unlock+0x29/0x40 [ 285.983159] ? __alloc_fd+0x28d/0x570 [ 285.986960] do_sys_open+0x3b3/0x520 [ 285.990657] ? filp_open+0x70/0x70 [ 285.994184] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.999542] ? trace_hardirqs_off_caller+0x6e/0x210 [ 286.004564] ? do_syscall_64+0x21/0x620 [ 286.008525] do_syscall_64+0xf9/0x620 [ 286.012325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.017510] RIP: 0033:0x7fc67b80d004 [ 286.021225] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 17:19:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 10) [ 286.040142] RSP: 002b:00007fc67a1ceeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 286.047978] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b80d004 [ 286.055234] RDX: 0000000000000002 RSI: 00007fc67a1cefe0 RDI: 00000000ffffff9c [ 286.062503] RBP: 00007fc67a1cefe0 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 286.069868] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 286.077136] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) 17:19:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xde, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 286.185529] FAULT_INJECTION: forcing a failure. [ 286.185529] name failslab, interval 1, probability 0, space 0, times 0 [ 286.210045] erofs: read_super, device -> /dev/loop0 [ 286.223717] erofs: options -> [ 286.229450] CPU: 0 PID: 19778 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 286.237342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.246704] Call Trace: [ 286.249305] dump_stack+0x1fc/0x2ef [ 286.252953] should_fail.cold+0xa/0xf [ 286.256768] ? setup_fault_attr+0x200/0x200 [ 286.261097] ? lock_acquire+0x170/0x3c0 [ 286.265087] __should_failslab+0x115/0x180 [ 286.269331] should_failslab+0x5/0x10 [ 286.273139] kmem_cache_alloc_trace+0x284/0x380 [ 286.273706] erofs: root inode @ nid 36 [ 286.277814] apparmor_file_alloc_security+0x394/0xad0 [ 286.277835] ? apparmor_file_receive+0x160/0x160 [ 286.277852] ? __alloc_file+0x21/0x340 [ 286.277871] security_file_alloc+0x40/0x90 [ 286.277886] __alloc_file+0xd8/0x340 [ 286.277901] alloc_empty_file+0x6d/0x170 [ 286.277918] path_openat+0xe9/0x2df0 [ 286.277936] ? __lock_acquire+0x6de/0x3ff0 [ 286.282320] erofs: bogus i_mode (0) @ nid 36 [ 286.286992] ? path_lookupat+0x8d0/0x8d0 [ 286.287011] ? mark_held_locks+0xf0/0xf0 [ 286.287032] do_filp_open+0x18c/0x3f0 [ 286.287045] ? may_open_dev+0xf0/0xf0 [ 286.287062] ? __alloc_fd+0x28d/0x570 [ 286.339341] ? lock_downgrade+0x720/0x720 [ 286.343476] ? lock_acquire+0x170/0x3c0 [ 286.347451] ? __alloc_fd+0x34/0x570 [ 286.351160] ? do_raw_spin_unlock+0x171/0x230 [ 286.355655] ? _raw_spin_unlock+0x29/0x40 [ 286.359793] ? __alloc_fd+0x28d/0x570 [ 286.363596] do_sys_open+0x3b3/0x520 [ 286.367388] ? filp_open+0x70/0x70 [ 286.370916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.376261] ? trace_hardirqs_off_caller+0x6e/0x210 [ 286.381260] ? do_syscall_64+0x21/0x620 [ 286.385216] do_syscall_64+0xf9/0x620 [ 286.389003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.394175] RIP: 0033:0x7fc67b80d004 [ 286.397902] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 286.416804] RSP: 002b:00007fc67a1ceeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 286.424512] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b80d004 17:19:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 11) [ 286.431772] RDX: 0000000000000002 RSI: 00007fc67a1cefe0 RDI: 00000000ffffff9c [ 286.439031] RBP: 00007fc67a1cefe0 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 286.446290] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 286.453542] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 286.473599] erofs: read_super, device -> /dev/loop5 [ 286.482793] erofs: options -> fault_injection= [ 286.487859] erofs: Unrecognized mount option "fault_injection=" or missing value [ 286.522348] erofs: read_super, device -> /dev/loop4 [ 286.522539] erofs: read_super, device -> /dev/loop1 17:19:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 286.547947] erofs: options -> [ 286.548605] erofs: options -> [ 286.560491] erofs: root inode @ nid 36 [ 286.571259] erofs: mounted on /dev/loop4 with opts: . [ 286.578171] erofs: blksize 1 isn't supported on this platform [ 286.588737] erofs: read_super, device -> /dev/loop2 17:19:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 286.602790] FAULT_INJECTION: forcing a failure. [ 286.602790] name failslab, interval 1, probability 0, space 0, times 0 [ 286.615558] erofs: unmounted for /dev/loop4 [ 286.620001] erofs: options -> fault_injectio [ 286.629156] erofs: Unrecognized mount option "fault_injectio" or missing value [ 286.642575] CPU: 1 PID: 19796 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 286.650449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.659789] Call Trace: [ 286.662373] dump_stack+0x1fc/0x2ef [ 286.665985] should_fail.cold+0xa/0xf [ 286.669769] ? setup_fault_attr+0x200/0x200 [ 286.674094] ? lock_acquire+0x170/0x3c0 [ 286.678071] __should_failslab+0x115/0x180 [ 286.682296] should_failslab+0x5/0x10 [ 286.686081] kmem_cache_alloc_trace+0x284/0x380 [ 286.690741] ? loop_info64_to_compat+0x5e0/0x5e0 [ 286.695482] __kthread_create_on_node+0xd2/0x410 [ 286.700222] ? kthread_parkme+0xa0/0xa0 [ 286.704180] ? lock_acquire+0x170/0x3c0 [ 286.708143] ? lo_ioctl+0x1bb/0x20e0 [ 286.711865] ? __mutex_lock+0x368/0x1190 [ 286.715919] ? lock_downgrade+0x720/0x720 [ 286.720059] ? check_preemption_disabled+0x41/0x280 [ 286.725171] ? loop_info64_to_compat+0x5e0/0x5e0 [ 286.729927] kthread_create_on_node+0xbb/0xf0 [ 286.734424] ? __kthread_create_on_node+0x410/0x410 [ 286.739426] ? __fget+0x356/0x510 [ 286.742879] ? do_dup2+0x450/0x450 [ 286.746536] ? __lockdep_init_map+0x100/0x5a0 [ 286.751041] ? __lockdep_init_map+0x100/0x5a0 [ 286.755548] lo_ioctl+0xae5/0x20e0 [ 286.759087] ? loop_set_status64+0x110/0x110 [ 286.763482] blkdev_ioctl+0x5cb/0x1a80 [ 286.767364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.772718] ? blkpg_ioctl+0x9d0/0x9d0 [ 286.776611] ? mark_held_locks+0xf0/0xf0 [ 286.780679] ? mark_held_locks+0xf0/0xf0 [ 286.784737] ? debug_check_no_obj_freed+0x201/0x490 [ 286.789758] ? lock_downgrade+0x720/0x720 [ 286.793910] block_ioctl+0xe9/0x130 [ 286.797525] ? blkdev_fallocate+0x3f0/0x3f0 [ 286.801833] do_vfs_ioctl+0xcdb/0x12e0 [ 286.805706] ? lock_downgrade+0x720/0x720 [ 286.809865] ? check_preemption_disabled+0x41/0x280 [ 286.814873] ? ioctl_preallocate+0x200/0x200 [ 286.819268] ? __fget+0x356/0x510 [ 286.822709] ? do_dup2+0x450/0x450 [ 286.826232] ? do_sys_open+0x2bf/0x520 [ 286.830108] ksys_ioctl+0x9b/0xc0 [ 286.833565] __x64_sys_ioctl+0x6f/0xb0 [ 286.837444] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 286.842021] do_syscall_64+0xf9/0x620 [ 286.845817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.851099] RIP: 0033:0x7fc67b859ea7 [ 286.854795] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 286.873794] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.881492] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b859ea7 [ 286.888747] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 286.896001] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc67a1cf1d0 17:19:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) [ 286.903259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 286.910519] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 12) 17:19:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 287.043528] erofs: read_super, device -> /dev/loop0 [ 287.052291] erofs: options -> [ 287.074360] erofs: root inode @ nid 36 [ 287.100843] erofs: bogus i_mode (0) @ nid 36 17:19:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1bd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 287.159873] erofs: read_super, device -> /dev/loop4 [ 287.164915] erofs: options -> [ 287.166091] erofs: read_super, device -> /dev/loop2 [ 287.182799] FAULT_INJECTION: forcing a failure. [ 287.182799] name failslab, interval 1, probability 0, space 0, times 0 [ 287.187127] erofs: options -> fault_injectio [ 287.200835] erofs: Unrecognized mount option "fault_injectio" or missing value [ 287.202397] erofs: root inode @ nid 36 [ 287.210070] CPU: 1 PID: 19814 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 287.215184] erofs: mounted on /dev/loop4 with opts: . [ 287.220246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.220251] Call Trace: [ 287.220272] dump_stack+0x1fc/0x2ef [ 287.220291] should_fail.cold+0xa/0xf [ 287.220308] ? setup_fault_attr+0x200/0x200 [ 287.220322] ? lock_acquire+0x170/0x3c0 [ 287.220341] __should_failslab+0x115/0x180 [ 287.220357] should_failslab+0x5/0x10 [ 287.220370] kmem_cache_alloc+0x277/0x370 [ 287.220387] __kernfs_new_node+0xd2/0x680 [ 287.220405] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 287.220419] ? _raw_spin_unlock_irq+0x5a/0x80 [ 287.220431] ? __cpu_to_node+0x7b/0xa0 [ 287.220448] ? mark_held_locks+0xf0/0xf0 [ 287.286535] ? io_schedule_timeout+0x140/0x140 [ 287.291130] ? enqueue_entity+0xf86/0x3850 [ 287.295363] ? set_user_nice.part.0+0x3b9/0xab0 [ 287.300021] kernfs_create_dir_ns+0x9e/0x230 [ 287.304413] internal_create_group+0x1c1/0xb20 [ 287.308997] ? sysfs_remove_link_from_group+0x70/0x70 [ 287.314180] ? lock_downgrade+0x720/0x720 [ 287.318317] lo_ioctl+0xf7c/0x20e0 [ 287.321844] ? loop_set_status64+0x110/0x110 [ 287.326240] blkdev_ioctl+0x5cb/0x1a80 [ 287.330120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.335475] ? blkpg_ioctl+0x9d0/0x9d0 [ 287.339345] ? mark_held_locks+0xf0/0xf0 [ 287.343388] ? mark_held_locks+0xf0/0xf0 [ 287.347446] ? debug_check_no_obj_freed+0x201/0x490 [ 287.352460] ? lock_downgrade+0x720/0x720 [ 287.356602] block_ioctl+0xe9/0x130 [ 287.360305] ? blkdev_fallocate+0x3f0/0x3f0 [ 287.364608] do_vfs_ioctl+0xcdb/0x12e0 [ 287.368489] ? lock_downgrade+0x720/0x720 [ 287.372635] ? check_preemption_disabled+0x41/0x280 [ 287.377633] ? ioctl_preallocate+0x200/0x200 [ 287.382026] ? __fget+0x356/0x510 [ 287.385460] ? do_dup2+0x450/0x450 [ 287.388995] ? do_sys_open+0x2bf/0x520 [ 287.392881] ksys_ioctl+0x9b/0xc0 [ 287.396318] __x64_sys_ioctl+0x6f/0xb0 [ 287.400190] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 287.404763] do_syscall_64+0xf9/0x620 [ 287.408563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.413744] RIP: 0033:0x7fc67b859ea7 [ 287.417449] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 287.436344] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.444039] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b859ea7 [ 287.451289] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 287.458538] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 287.465791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 287.473040] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 287.486947] erofs: read_super, device -> /dev/loop5 17:19:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) 17:19:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 287.506798] erofs: read_super, device -> /dev/loop1 [ 287.507247] erofs: options -> fault_injection= [ 287.511838] erofs: options -> [ 287.526788] erofs: blksize 1 isn't supported on this platform [ 287.549112] erofs: unmounted for /dev/loop4 [ 287.551282] erofs: Unrecognized mount option "fault_injection=" or missing value [ 287.564728] erofs: read_super, device -> /dev/loop3 [ 287.571221] erofs: options -> [ 287.582511] erofs: root inode @ nid 36 [ 287.592073] erofs: bogus i_mode (0) @ nid 36 17:19:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 13) [ 287.727101] erofs: read_super, device -> /dev/loop2 [ 287.732141] erofs: options -> fault_injection= [ 287.743081] erofs: Unrecognized mount option "fault_injection=" or missing value [ 287.751616] erofs: read_super, device -> /dev/loop0 [ 287.766754] erofs: options -> [ 287.772811] erofs: read_super, device -> /dev/loop1 [ 287.778216] erofs: read_super, device -> /dev/loop4 [ 287.783115] erofs: root inode @ nid 36 [ 287.783236] erofs: options -> [ 287.807868] erofs: root inode @ nid 36 [ 287.817777] erofs: mounted on /dev/loop4 with opts: . [ 287.820673] erofs: bogus i_mode (0) @ nid 36 17:19:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) [ 287.834407] erofs: options -> 17:19:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 287.855512] FAULT_INJECTION: forcing a failure. [ 287.855512] name failslab, interval 1, probability 0, space 0, times 0 [ 287.857096] erofs: blksize 1 isn't supported on this platform [ 287.867148] CPU: 0 PID: 19854 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 287.880724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.890080] Call Trace: [ 287.892665] dump_stack+0x1fc/0x2ef [ 287.896281] should_fail.cold+0xa/0xf [ 287.900075] ? setup_fault_attr+0x200/0x200 [ 287.904383] ? lock_acquire+0x170/0x3c0 [ 287.908346] __should_failslab+0x115/0x180 [ 287.912577] should_failslab+0x5/0x10 [ 287.916368] kmem_cache_alloc+0x277/0x370 [ 287.920499] __kernfs_new_node+0xd2/0x680 [ 287.924630] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 287.929366] ? kernfs_activate+0x2c/0x1d0 [ 287.933496] ? lock_downgrade+0x720/0x720 [ 287.937625] ? kernfs_add_one+0x51/0x4c0 [ 287.941667] ? mutex_trylock+0x1a0/0x1a0 [ 287.945739] ? __mutex_unlock_slowpath+0xea/0x610 [ 287.950574] kernfs_new_node+0x92/0x120 [ 287.954548] __kernfs_create_file+0x51/0x340 [ 287.958967] sysfs_add_file_mode_ns+0x226/0x540 [ 287.963627] internal_create_group+0x355/0xb20 [ 287.968192] ? sysfs_remove_link_from_group+0x70/0x70 [ 287.973366] ? lock_downgrade+0x720/0x720 [ 287.977507] lo_ioctl+0xf7c/0x20e0 [ 287.981055] ? loop_set_status64+0x110/0x110 [ 287.985461] blkdev_ioctl+0x5cb/0x1a80 [ 287.989341] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.994686] ? blkpg_ioctl+0x9d0/0x9d0 [ 287.998558] ? mark_held_locks+0xf0/0xf0 [ 288.002601] ? mark_held_locks+0xf0/0xf0 [ 288.006647] ? debug_check_no_obj_freed+0x201/0x490 [ 288.011652] ? lock_downgrade+0x720/0x720 [ 288.015786] block_ioctl+0xe9/0x130 [ 288.019396] ? blkdev_fallocate+0x3f0/0x3f0 [ 288.023698] do_vfs_ioctl+0xcdb/0x12e0 [ 288.027567] ? lock_downgrade+0x720/0x720 [ 288.031819] ? check_preemption_disabled+0x41/0x280 [ 288.036837] ? ioctl_preallocate+0x200/0x200 [ 288.041239] ? __fget+0x356/0x510 [ 288.044676] ? do_dup2+0x450/0x450 [ 288.048199] ? do_sys_open+0x2bf/0x520 [ 288.052070] ksys_ioctl+0x9b/0xc0 [ 288.055509] __x64_sys_ioctl+0x6f/0xb0 [ 288.059379] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 288.063942] do_syscall_64+0xf9/0x620 [ 288.067856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.073046] RIP: 0033:0x7fc67b859ea7 [ 288.076758] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 288.095644] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:19:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 1) [ 288.103345] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b859ea7 [ 288.110614] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 288.117883] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 288.125142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 288.132402] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 288.139834] erofs: unmounted for /dev/loop4 [ 288.147825] erofs: read_super, device -> /dev/loop3 17:19:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 288.193891] erofs: options -> [ 288.203909] erofs: root inode @ nid 36 [ 288.214018] erofs: bogus i_mode (0) @ nid 36 [ 288.221596] FAULT_INJECTION: forcing a failure. [ 288.221596] name failslab, interval 1, probability 0, space 0, times 0 [ 288.233280] CPU: 0 PID: 19863 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 288.241174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.250522] Call Trace: [ 288.253098] dump_stack+0x1fc/0x2ef [ 288.256717] should_fail.cold+0xa/0xf [ 288.260501] ? setup_fault_attr+0x200/0x200 [ 288.264803] ? lock_acquire+0x170/0x3c0 [ 288.268768] __should_failslab+0x115/0x180 [ 288.272986] should_failslab+0x5/0x10 [ 288.276769] __kmalloc+0x2ab/0x3c0 [ 288.280289] ? __se_sys_memfd_create+0xf8/0x440 [ 288.284945] __se_sys_memfd_create+0xf8/0x440 [ 288.289422] ? memfd_file_seals_ptr+0x150/0x150 [ 288.294075] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.299431] ? trace_hardirqs_off_caller+0x6e/0x210 [ 288.304431] ? do_syscall_64+0x21/0x620 [ 288.308389] do_syscall_64+0xf9/0x620 [ 288.312173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.317346] RIP: 0033:0x7f5a40bd30e9 [ 288.321045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:19:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 2) [ 288.339929] RSP: 002b:00007f5a3f547f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 288.347628] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f5a40bd30e9 [ 288.354884] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f5a40c2c1ee [ 288.362137] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f5a3f5481d0 [ 288.369388] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 288.376642] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 14) [ 288.493178] erofs: read_super, device -> /dev/loop2 [ 288.506723] erofs: read_super, device -> /dev/loop0 [ 288.512105] erofs: options -> [ 288.526922] erofs: root inode @ nid 36 [ 288.530748] erofs: read_super, device -> /dev/loop4 [ 288.532007] erofs: options -> fault_injection= [ 288.545166] erofs: bogus i_mode (0) @ nid 36 [ 288.555788] erofs: options -> [ 288.566665] erofs: Unrecognized mount option "fault_injection=" or missing value [ 288.571690] erofs: root inode @ nid 36 [ 288.580832] FAULT_INJECTION: forcing a failure. [ 288.580832] name failslab, interval 1, probability 0, space 0, times 0 [ 288.582021] erofs: mounted on /dev/loop4 with opts: . [ 288.597526] CPU: 1 PID: 19884 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 288.605413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.614761] Call Trace: [ 288.617346] dump_stack+0x1fc/0x2ef [ 288.620980] should_fail.cold+0xa/0xf [ 288.622961] FAULT_INJECTION: forcing a failure. [ 288.622961] name failslab, interval 1, probability 0, space 0, times 0 [ 288.624790] ? setup_fault_attr+0x200/0x200 [ 288.624808] ? lock_acquire+0x170/0x3c0 [ 288.624830] __should_failslab+0x115/0x180 [ 288.624847] should_failslab+0x5/0x10 [ 288.624868] kmem_cache_alloc+0x277/0x370 [ 288.656435] ? shmem_destroy_callback+0xb0/0xb0 [ 288.661106] shmem_alloc_inode+0x18/0x40 [ 288.665164] ? shmem_destroy_callback+0xb0/0xb0 [ 288.669827] alloc_inode+0x5d/0x180 [ 288.673452] new_inode+0x1d/0xf0 [ 288.676818] shmem_get_inode+0x96/0x8d0 [ 288.680802] __shmem_file_setup.part.0+0x7a/0x2b0 [ 288.685648] shmem_file_setup+0x61/0x90 [ 288.689629] __se_sys_memfd_create+0x26b/0x440 [ 288.694202] ? memfd_file_seals_ptr+0x150/0x150 [ 288.698873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.704234] ? trace_hardirqs_off_caller+0x6e/0x210 [ 288.709244] ? do_syscall_64+0x21/0x620 [ 288.713212] do_syscall_64+0xf9/0x620 [ 288.717015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.722200] RIP: 0033:0x7f5a40bd30e9 [ 288.725910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:19:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 3) [ 288.744802] RSP: 002b:00007f5a3f547f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 288.752504] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f5a40bd30e9 [ 288.759767] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f5a40c2c1ee [ 288.767028] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f5a3f5481d0 [ 288.774286] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 288.781546] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 288.805908] CPU: 1 PID: 19883 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 288.813799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.823140] Call Trace: [ 288.825721] dump_stack+0x1fc/0x2ef [ 288.829348] should_fail.cold+0xa/0xf [ 288.833142] ? setup_fault_attr+0x200/0x200 [ 288.837447] ? lock_acquire+0x170/0x3c0 [ 288.841406] __should_failslab+0x115/0x180 [ 288.845622] should_failslab+0x5/0x10 [ 288.849417] kmem_cache_alloc+0x277/0x370 [ 288.853557] __kernfs_new_node+0xd2/0x680 [ 288.857700] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 288.862449] ? __mutex_unlock_slowpath+0xea/0x610 [ 288.867292] ? wait_for_completion_io+0x10/0x10 [ 288.871956] ? kernfs_next_descendant_post+0x19c/0x290 [ 288.877223] kernfs_new_node+0x92/0x120 [ 288.881190] __kernfs_create_file+0x51/0x340 [ 288.885584] sysfs_add_file_mode_ns+0x226/0x540 [ 288.890257] internal_create_group+0x355/0xb20 [ 288.894840] ? sysfs_remove_link_from_group+0x70/0x70 [ 288.900014] ? lock_downgrade+0x720/0x720 [ 288.904150] lo_ioctl+0xf7c/0x20e0 [ 288.907691] ? loop_set_status64+0x110/0x110 [ 288.912101] blkdev_ioctl+0x5cb/0x1a80 [ 288.915979] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.921331] ? blkpg_ioctl+0x9d0/0x9d0 [ 288.925203] ? mark_held_locks+0xf0/0xf0 [ 288.929261] ? mark_held_locks+0xf0/0xf0 [ 288.933336] ? debug_check_no_obj_freed+0x201/0x490 [ 288.938347] ? lock_downgrade+0x720/0x720 [ 288.942480] block_ioctl+0xe9/0x130 [ 288.946086] ? blkdev_fallocate+0x3f0/0x3f0 [ 288.950402] do_vfs_ioctl+0xcdb/0x12e0 [ 288.954284] ? lock_downgrade+0x720/0x720 [ 288.958414] ? check_preemption_disabled+0x41/0x280 [ 288.963412] ? ioctl_preallocate+0x200/0x200 [ 288.967816] ? __fget+0x356/0x510 [ 288.971280] ? do_dup2+0x450/0x450 [ 288.974810] ? do_sys_open+0x2bf/0x520 [ 288.978685] ksys_ioctl+0x9b/0xc0 [ 288.982136] __x64_sys_ioctl+0x6f/0xb0 [ 288.986015] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 288.990590] do_syscall_64+0xf9/0x620 [ 288.994400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.999580] RIP: 0033:0x7fc67b859ea7 [ 289.003277] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 289.022260] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.029964] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b859ea7 [ 289.037228] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 289.044480] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 289.051733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 289.058988] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 289.116845] erofs: read_super, device -> /dev/loop3 [ 289.126779] erofs: read_super, device -> /dev/loop1 [ 289.131820] erofs: options -> [ 289.135064] erofs: blksize 1 isn't supported on this platform [ 289.147491] erofs: unmounted for /dev/loop4 [ 289.159960] erofs: options -> 17:19:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) 17:19:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x27d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 289.169234] erofs: root inode @ nid 36 [ 289.175084] erofs: bogus i_mode (0) @ nid 36 [ 289.184340] FAULT_INJECTION: forcing a failure. [ 289.184340] name failslab, interval 1, probability 0, space 0, times 0 [ 289.196982] CPU: 0 PID: 19895 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 289.204869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.214205] Call Trace: [ 289.216784] dump_stack+0x1fc/0x2ef [ 289.220398] should_fail.cold+0xa/0xf [ 289.224183] ? setup_fault_attr+0x200/0x200 [ 289.228489] ? lock_acquire+0x170/0x3c0 [ 289.232468] __should_failslab+0x115/0x180 [ 289.236699] should_failslab+0x5/0x10 [ 289.240492] kmem_cache_alloc+0x277/0x370 [ 289.244647] __d_alloc+0x2b/0xa10 [ 289.248092] d_alloc_pseudo+0x19/0x70 [ 289.251880] alloc_file_pseudo+0xc6/0x250 [ 289.256011] ? alloc_file+0x4d0/0x4d0 [ 289.259791] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 289.265411] ? shmem_get_inode+0x44c/0x8d0 [ 289.269639] __shmem_file_setup.part.0+0x102/0x2b0 [ 289.274564] shmem_file_setup+0x61/0x90 [ 289.278534] __se_sys_memfd_create+0x26b/0x440 [ 289.283111] ? memfd_file_seals_ptr+0x150/0x150 [ 289.287766] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.293111] ? trace_hardirqs_off_caller+0x6e/0x210 [ 289.298118] ? do_syscall_64+0x21/0x620 [ 289.302097] do_syscall_64+0xf9/0x620 [ 289.305899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.311070] RIP: 0033:0x7f5a40bd30e9 [ 289.314763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 289.333645] RSP: 002b:00007f5a3f547f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 289.341342] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f5a40bd30e9 [ 289.348601] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f5a40c2c1ee [ 289.355859] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f5a3f5481d0 [ 289.363121] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 17:19:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 15) [ 289.370372] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 4) 17:19:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 289.482306] FAULT_INJECTION: forcing a failure. [ 289.482306] name failslab, interval 1, probability 0, space 0, times 0 [ 289.493239] erofs: read_super, device -> /dev/loop2 [ 289.509074] erofs: options -> fault_injection= [ 289.511898] erofs: read_super, device -> /dev/loop4 [ 289.513971] erofs: Unrecognized mount option "fault_injection=" or missing value [ 289.523639] erofs: options -> [ 289.533153] CPU: 1 PID: 19908 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 289.541043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.550403] Call Trace: [ 289.553001] dump_stack+0x1fc/0x2ef [ 289.556639] should_fail.cold+0xa/0xf [ 289.560449] ? setup_fault_attr+0x200/0x200 [ 289.560747] erofs: root inode @ nid 36 [ 289.564773] ? lock_acquire+0x170/0x3c0 [ 289.564794] __should_failslab+0x115/0x180 [ 289.564811] should_failslab+0x5/0x10 [ 289.571610] erofs: mounted on /dev/loop4 with opts: . [ 289.572639] kmem_cache_alloc+0x277/0x370 [ 289.572657] __alloc_file+0x21/0x340 [ 289.572675] alloc_empty_file+0x6d/0x170 [ 289.597720] alloc_file+0x5e/0x4d0 [ 289.601257] alloc_file_pseudo+0x165/0x250 [ 289.605478] ? alloc_file+0x4d0/0x4d0 [ 289.609267] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 289.614879] ? shmem_get_inode+0x44c/0x8d0 [ 289.619102] __shmem_file_setup.part.0+0x102/0x2b0 [ 289.624022] shmem_file_setup+0x61/0x90 [ 289.627993] __se_sys_memfd_create+0x26b/0x440 [ 289.632576] ? memfd_file_seals_ptr+0x150/0x150 [ 289.637241] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.642599] ? trace_hardirqs_off_caller+0x6e/0x210 [ 289.647613] ? do_syscall_64+0x21/0x620 [ 289.651580] do_syscall_64+0xf9/0x620 [ 289.655367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.660540] RIP: 0033:0x7f5a40bd30e9 [ 289.664234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:19:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 5) [ 289.683126] RSP: 002b:00007f5a3f547f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 289.690819] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f5a40bd30e9 [ 289.698079] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f5a40c2c1ee [ 289.705341] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f5a3f5481d0 [ 289.712594] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 289.719848] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 289.749515] FAULT_INJECTION: forcing a failure. [ 289.749515] name failslab, interval 1, probability 0, space 0, times 0 [ 289.761548] CPU: 0 PID: 19916 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 289.769433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.778779] Call Trace: [ 289.781368] dump_stack+0x1fc/0x2ef [ 289.784994] should_fail.cold+0xa/0xf [ 289.788781] ? setup_fault_attr+0x200/0x200 [ 289.793085] ? lock_acquire+0x170/0x3c0 [ 289.797044] __should_failslab+0x115/0x180 [ 289.801269] should_failslab+0x5/0x10 [ 289.805062] kmem_cache_alloc+0x277/0x370 [ 289.809200] __kernfs_new_node+0xd2/0x680 [ 289.813334] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 289.818081] ? __mutex_unlock_slowpath+0xea/0x610 [ 289.822910] ? wait_for_completion_io+0x10/0x10 [ 289.827563] ? kernfs_next_descendant_post+0x19c/0x290 [ 289.832835] kernfs_new_node+0x92/0x120 [ 289.836805] __kernfs_create_file+0x51/0x340 [ 289.841217] sysfs_add_file_mode_ns+0x226/0x540 [ 289.845885] internal_create_group+0x355/0xb20 [ 289.850465] ? sysfs_remove_link_from_group+0x70/0x70 [ 289.855657] ? lock_downgrade+0x720/0x720 [ 289.859796] lo_ioctl+0xf7c/0x20e0 [ 289.863333] ? loop_set_status64+0x110/0x110 [ 289.867742] blkdev_ioctl+0x5cb/0x1a80 [ 289.871622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.876976] ? blkpg_ioctl+0x9d0/0x9d0 [ 289.880849] ? mark_held_locks+0xf0/0xf0 [ 289.884903] ? mark_held_locks+0xf0/0xf0 [ 289.888960] ? debug_check_no_obj_freed+0x201/0x490 [ 289.893985] ? lock_downgrade+0x720/0x720 [ 289.898122] block_ioctl+0xe9/0x130 [ 289.901740] ? blkdev_fallocate+0x3f0/0x3f0 [ 289.906051] do_vfs_ioctl+0xcdb/0x12e0 [ 289.909921] ? lock_downgrade+0x720/0x720 [ 289.914053] ? check_preemption_disabled+0x41/0x280 [ 289.919053] ? ioctl_preallocate+0x200/0x200 [ 289.923448] ? __fget+0x356/0x510 [ 289.926882] ? do_dup2+0x450/0x450 [ 289.930410] ? do_sys_open+0x2bf/0x520 [ 289.934292] ksys_ioctl+0x9b/0xc0 [ 289.937728] __x64_sys_ioctl+0x6f/0xb0 [ 289.941608] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 289.946182] do_syscall_64+0xf9/0x620 [ 289.949978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.955153] RIP: 0033:0x7fc67b859ea7 [ 289.958884] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 289.977768] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.985467] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b859ea7 [ 289.992723] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 289.999980] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 290.007239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 290.014500] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b2"]) [ 290.046367] erofs: read_super, device -> /dev/loop0 [ 290.053021] erofs: options -> [ 290.069924] erofs: read_super, device -> /dev/loop3 [ 290.075332] erofs: options -> [ 290.091519] erofs: read_super, device -> /dev/loop1 [ 290.106698] erofs: root inode @ nid 36 [ 290.109507] erofs: unmounted for /dev/loop4 [ 290.122847] erofs: root inode @ nid 36 [ 290.126365] erofs: options -> [ 290.129069] erofs: bogus i_mode (0) @ nid 36 [ 290.131811] erofs: bogus i_mode (0) @ nid 36 [ 290.173458] erofs: blksize 1 isn't supported on this platform [ 290.182000] FAULT_INJECTION: forcing a failure. [ 290.182000] name failslab, interval 1, probability 0, space 0, times 0 17:19:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) (fail_nth: 16) [ 290.226016] CPU: 0 PID: 19928 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 290.233926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.243281] Call Trace: [ 290.245858] dump_stack+0x1fc/0x2ef [ 290.249477] should_fail.cold+0xa/0xf [ 290.253269] ? setup_fault_attr+0x200/0x200 [ 290.257574] ? lock_acquire+0x170/0x3c0 [ 290.261532] __should_failslab+0x115/0x180 [ 290.265782] should_failslab+0x5/0x10 [ 290.269572] kmem_cache_alloc_trace+0x284/0x380 [ 290.274226] apparmor_file_alloc_security+0x394/0xad0 [ 290.279402] ? apparmor_file_receive+0x160/0x160 [ 290.284152] ? __alloc_file+0x21/0x340 [ 290.288035] security_file_alloc+0x40/0x90 [ 290.292255] __alloc_file+0xd8/0x340 [ 290.295956] alloc_empty_file+0x6d/0x170 [ 290.300001] alloc_file+0x5e/0x4d0 [ 290.303524] alloc_file_pseudo+0x165/0x250 [ 290.307743] ? alloc_file+0x4d0/0x4d0 [ 290.311536] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 290.317154] ? shmem_get_inode+0x44c/0x8d0 [ 290.321372] __shmem_file_setup.part.0+0x102/0x2b0 [ 290.326291] shmem_file_setup+0x61/0x90 [ 290.330260] __se_sys_memfd_create+0x26b/0x440 [ 290.334923] ? memfd_file_seals_ptr+0x150/0x150 [ 290.339580] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.344928] ? trace_hardirqs_off_caller+0x6e/0x210 [ 290.349931] ? do_syscall_64+0x21/0x620 [ 290.353906] do_syscall_64+0xf9/0x620 [ 290.357694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.362865] RIP: 0033:0x7f5a40bd30e9 [ 290.366570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 290.385476] RSP: 002b:00007f5a3f547f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 290.393170] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f5a40bd30e9 [ 290.400419] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f5a40c2c1ee [ 290.407669] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f5a3f5481d0 [ 290.414919] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 17:19:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 1) 17:19:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 6) [ 290.422175] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 290.463620] FAULT_INJECTION: forcing a failure. [ 290.463620] name failslab, interval 1, probability 0, space 0, times 0 [ 290.475006] CPU: 1 PID: 19934 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 290.482882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.492239] Call Trace: [ 290.494837] dump_stack+0x1fc/0x2ef [ 290.498475] should_fail.cold+0xa/0xf [ 290.502285] ? setup_fault_attr+0x200/0x200 [ 290.506622] ? lock_acquire+0x170/0x3c0 [ 290.510607] __should_failslab+0x115/0x180 [ 290.514854] should_failslab+0x5/0x10 [ 290.516718] erofs: read_super, device -> /dev/loop4 [ 290.518655] __kmalloc+0x2ab/0x3c0 [ 290.523655] erofs: options -> fault_injection=0x0000000000000001, [ 290.527182] ? __se_sys_memfd_create+0xf8/0x440 [ 290.527198] __se_sys_memfd_create+0xf8/0x440 [ 290.527212] ? memfd_file_seals_ptr+0x150/0x150 [ 290.527227] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.527243] ? trace_hardirqs_off_caller+0x6e/0x210 [ 290.527257] ? do_syscall_64+0x21/0x620 17:19:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 290.527273] do_syscall_64+0xf9/0x620 [ 290.565384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.570579] RIP: 0033:0x7fb10938b0e9 [ 290.574299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 290.593202] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 290.594477] erofs: FAULT_INJECTION was not selected [ 290.600909] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938b0e9 17:19:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 290.600918] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fb1093e41ee [ 290.600926] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fb107d001d0 [ 290.600934] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 290.600942] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 290.653501] erofs: read_super, device -> /dev/loop0 17:19:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 2) [ 290.675689] FAULT_INJECTION: forcing a failure. [ 290.675689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.680008] erofs: options -> [ 290.688584] CPU: 0 PID: 19948 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 290.698698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.700721] erofs: root inode @ nid 36 [ 290.708050] Call Trace: [ 290.708071] dump_stack+0x1fc/0x2ef [ 290.708090] should_fail.cold+0xa/0xf [ 290.708106] ? lock_acquire+0x170/0x3c0 [ 290.708122] ? setup_fault_attr+0x200/0x200 [ 290.708145] __alloc_pages_nodemask+0x239/0x2890 [ 290.712566] erofs: bogus i_mode (0) @ nid 36 [ 290.714589] ? __lock_acquire+0x6de/0x3ff0 [ 290.714606] ? static_obj+0x50/0x50 [ 290.714626] ? __lock_acquire+0x6de/0x3ff0 [ 290.718571] erofs: root inode @ nid 36 [ 290.722012] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 290.722028] ? __lock_acquire+0x6de/0x3ff0 [ 290.722050] ? mark_held_locks+0xf0/0xf0 [ 290.726105] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 290.730298] ? unwind_next_frame+0xeee/0x1400 [ 290.730313] ? mark_held_locks+0xf0/0xf0 [ 290.730326] ? deref_stack_reg+0x134/0x1d0 [ 290.730339] ? get_reg+0x176/0x1f0 [ 290.730353] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 290.730370] alloc_pages_vma+0xf2/0x780 [ 290.774734] FAULT_INJECTION: forcing a failure. [ 290.774734] name failslab, interval 1, probability 0, space 0, times 0 [ 290.776637] shmem_alloc_page+0x11c/0x1f0 [ 290.776654] ? shmem_swapin+0x220/0x220 [ 290.776692] ? percpu_counter_add_batch+0x126/0x180 [ 290.827004] ? __vm_enough_memory+0x316/0x650 [ 290.831501] shmem_alloc_and_acct_page+0x15a/0x850 [ 290.836429] shmem_getpage_gfp+0x4e9/0x37f0 [ 290.840758] ? shmem_alloc_and_acct_page+0x850/0x850 [ 290.845861] ? mark_held_locks+0xa6/0xf0 [ 290.849916] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 290.855098] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 290.860283] shmem_write_begin+0xff/0x1e0 [ 290.864429] generic_perform_write+0x1f8/0x4d0 [ 290.869010] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 290.873674] ? current_time+0x1c0/0x1c0 [ 290.877648] ? lock_acquire+0x170/0x3c0 [ 290.881627] __generic_file_write_iter+0x24b/0x610 [ 290.886557] generic_file_write_iter+0x3f8/0x730 [ 290.891325] __vfs_write+0x51b/0x770 [ 290.895037] ? kernel_read+0x110/0x110 [ 290.898925] ? check_preemption_disabled+0x41/0x280 [ 290.903938] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 290.908952] vfs_write+0x1f3/0x540 [ 290.912495] __x64_sys_pwrite64+0x1f7/0x250 [ 290.916812] ? ksys_pwrite64+0x1a0/0x1a0 [ 290.920878] ? trace_hardirqs_off_caller+0x6e/0x210 [ 290.925886] ? do_syscall_64+0x21/0x620 [ 290.929853] do_syscall_64+0xf9/0x620 [ 290.933653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.938837] RIP: 0033:0x7f5a40b860b7 [ 290.942545] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 290.961440] RSP: 002b:00007f5a3f547f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 290.969144] RAX: ffffffffffffffda RBX: 00007f5a40c1ca20 RCX: 00007f5a40b860b7 [ 290.976402] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 290.983665] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f5a3f5481d0 [ 290.990925] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 290.998185] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 291.005462] CPU: 1 PID: 19951 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 291.013355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.022712] Call Trace: [ 291.025308] dump_stack+0x1fc/0x2ef [ 291.028952] should_fail.cold+0xa/0xf [ 291.032769] ? setup_fault_attr+0x200/0x200 [ 291.037099] ? lock_acquire+0x170/0x3c0 [ 291.041084] __should_failslab+0x115/0x180 [ 291.045315] should_failslab+0x5/0x10 [ 291.049123] kmem_cache_alloc+0x277/0x370 [ 291.053276] ? shmem_destroy_callback+0xb0/0xb0 [ 291.057939] shmem_alloc_inode+0x18/0x40 [ 291.062004] ? shmem_destroy_callback+0xb0/0xb0 [ 291.066659] alloc_inode+0x5d/0x180 [ 291.070282] new_inode+0x1d/0xf0 [ 291.073644] shmem_get_inode+0x96/0x8d0 [ 291.077608] __shmem_file_setup.part.0+0x7a/0x2b0 [ 291.082437] shmem_file_setup+0x61/0x90 [ 291.086411] __se_sys_memfd_create+0x26b/0x440 [ 291.091001] ? memfd_file_seals_ptr+0x150/0x150 [ 291.095688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.101047] ? trace_hardirqs_off_caller+0x6e/0x210 [ 291.106056] ? do_syscall_64+0x21/0x620 [ 291.110017] do_syscall_64+0xf9/0x620 [ 291.113804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.118976] RIP: 0033:0x7fb10938b0e9 [ 291.122672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 291.141555] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 291.149250] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938b0e9 [ 291.156509] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fb1093e41ee [ 291.163773] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fb107d001d0 17:19:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 3) [ 291.171034] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 291.178305] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 291.218715] FAULT_INJECTION: forcing a failure. [ 291.218715] name failslab, interval 1, probability 0, space 0, times 0 [ 291.230598] CPU: 1 PID: 19947 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 291.238478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.247820] Call Trace: [ 291.250413] dump_stack+0x1fc/0x2ef [ 291.254038] should_fail.cold+0xa/0xf [ 291.257824] ? setup_fault_attr+0x200/0x200 [ 291.262131] ? lock_acquire+0x170/0x3c0 [ 291.266091] __should_failslab+0x115/0x180 [ 291.270323] should_failslab+0x5/0x10 [ 291.274115] kmem_cache_alloc+0x277/0x370 [ 291.278251] __kernfs_new_node+0xd2/0x680 [ 291.282387] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 291.287141] ? __mutex_unlock_slowpath+0xea/0x610 [ 291.291988] ? wait_for_completion_io+0x10/0x10 [ 291.296650] ? kernfs_next_descendant_post+0x19c/0x290 [ 291.301917] kernfs_new_node+0x92/0x120 [ 291.305888] __kernfs_create_file+0x51/0x340 [ 291.310307] sysfs_add_file_mode_ns+0x226/0x540 [ 291.314974] internal_create_group+0x355/0xb20 [ 291.319551] ? sysfs_remove_link_from_group+0x70/0x70 [ 291.324734] ? lock_downgrade+0x720/0x720 [ 291.328886] lo_ioctl+0xf7c/0x20e0 [ 291.332428] ? loop_set_status64+0x110/0x110 [ 291.336822] blkdev_ioctl+0x5cb/0x1a80 [ 291.340708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.346061] ? blkpg_ioctl+0x9d0/0x9d0 [ 291.349946] ? mark_held_locks+0xf0/0xf0 [ 291.354011] ? mark_held_locks+0xf0/0xf0 [ 291.358064] ? debug_check_no_obj_freed+0x201/0x490 [ 291.363065] ? lock_downgrade+0x720/0x720 [ 291.367207] block_ioctl+0xe9/0x130 [ 291.370839] ? blkdev_fallocate+0x3f0/0x3f0 [ 291.375154] do_vfs_ioctl+0xcdb/0x12e0 [ 291.379025] ? lock_downgrade+0x720/0x720 [ 291.383161] ? check_preemption_disabled+0x41/0x280 [ 291.388172] ? ioctl_preallocate+0x200/0x200 [ 291.392590] ? __fget+0x356/0x510 [ 291.396036] ? do_dup2+0x450/0x450 [ 291.399565] ? do_sys_open+0x2bf/0x520 [ 291.403437] ksys_ioctl+0x9b/0xc0 [ 291.406886] __x64_sys_ioctl+0x6f/0xb0 [ 291.410777] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 291.415349] do_syscall_64+0xf9/0x620 [ 291.419134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.424304] RIP: 0033:0x7fc67b859ea7 [ 291.428007] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 291.446909] RSP: 002b:00007fc67a1cef28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.454616] RAX: ffffffffffffffda RBX: 00007fc67b8a3a20 RCX: 00007fc67b859ea7 [ 291.461873] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:19:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x324, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6661756c745f696e6a656374696f6e3d3078303030303030303030303030303030312c001068d6e0a6b4619533fa62b94a4146b2"]) [ 291.469133] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fc67a1cf1d0 [ 291.476426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 291.483684] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 291.521433] erofs: read_super, device -> /dev/loop3 [ 291.525745] erofs: unmounted for /dev/loop4 [ 291.540619] erofs: options -> [ 291.555303] erofs: root inode @ nid 36 [ 291.564693] erofs: bogus i_mode (0) @ nid 36 [ 291.569662] FAULT_INJECTION: forcing a failure. [ 291.569662] name failslab, interval 1, probability 0, space 0, times 0 [ 291.580965] CPU: 1 PID: 19962 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 291.588838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.598190] Call Trace: [ 291.600958] dump_stack+0x1fc/0x2ef [ 291.604603] should_fail.cold+0xa/0xf [ 291.608422] ? setup_fault_attr+0x200/0x200 [ 291.612754] ? lock_acquire+0x170/0x3c0 [ 291.616744] __should_failslab+0x115/0x180 [ 291.620988] should_failslab+0x5/0x10 [ 291.624795] kmem_cache_alloc+0x277/0x370 [ 291.628955] __d_alloc+0x2b/0xa10 [ 291.632417] d_alloc_pseudo+0x19/0x70 [ 291.636225] alloc_file_pseudo+0xc6/0x250 [ 291.640381] ? alloc_file+0x4d0/0x4d0 [ 291.644185] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 291.649817] ? shmem_get_inode+0x44c/0x8d0 [ 291.654068] __shmem_file_setup.part.0+0x102/0x2b0 [ 291.659008] shmem_file_setup+0x61/0x90 [ 291.662992] __se_sys_memfd_create+0x26b/0x440 [ 291.667580] ? memfd_file_seals_ptr+0x150/0x150 [ 291.672256] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.676718] erofs: read_super, device -> /dev/loop1 [ 291.677621] ? trace_hardirqs_off_caller+0x6e/0x210 [ 291.677637] ? do_syscall_64+0x21/0x620 [ 291.677657] do_syscall_64+0xf9/0x620 [ 291.682650] erofs: options -> [ 291.698602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.703783] RIP: 0033:0x7fb10938b0e9 [ 291.707487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 291.726373] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 291.734066] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938b0e9 [ 291.741319] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fb1093e41ee [ 291.748573] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fb107d001d0 [ 291.755829] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 291.763081] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 291.771195] erofs: read_super, device -> /dev/loop0 [ 291.776746] erofs: options -> [ 291.782592] erofs: blksize 1 isn't supported on this platform [ 291.790092] erofs: root inode @ nid 36 [ 291.793352] erofs: read_super, device -> /dev/loop5 [ 291.811578] erofs: options -> fault_injection=0 17:19:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 4) [ 291.833224] erofs: bogus i_mode (0) @ nid 36 [ 291.834048] erofs: FAULT_INJECTION was not selected [ 291.856668] erofs: root inode @ nid 36 [ 291.872964] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x399, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 291.946284] erofs: read_super, device -> /dev/loop4 [ 291.946826] erofs: unmounted for /dev/loop5 [ 291.954572] erofs: read_super, device -> /dev/loop1 [ 291.963929] erofs: options -> fault_injection=0x0000000000000001, [ 291.974082] erofs: options -> [ 291.978200] erofs: blksize 1 isn't supported on this platform [ 291.984883] erofs: FAULT_INJECTION was not selected [ 291.991659] erofs: root inode @ nid 36 [ 291.995746] erofs: mounted on /dev/loop4 with opts: fault_injection=0x0000000000000001. [ 292.017001] FAULT_INJECTION: forcing a failure. [ 292.017001] name failslab, interval 1, probability 0, space 0, times 0 [ 292.028864] CPU: 0 PID: 19989 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 292.036759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.046262] Call Trace: [ 292.048855] dump_stack+0x1fc/0x2ef [ 292.052501] should_fail.cold+0xa/0xf [ 292.056286] ? setup_fault_attr+0x200/0x200 [ 292.060588] ? lock_acquire+0x170/0x3c0 [ 292.064549] __should_failslab+0x115/0x180 [ 292.068868] should_failslab+0x5/0x10 [ 292.072657] kmem_cache_alloc+0x277/0x370 [ 292.076790] __alloc_file+0x21/0x340 [ 292.080487] alloc_empty_file+0x6d/0x170 [ 292.084529] alloc_file+0x5e/0x4d0 [ 292.088056] alloc_file_pseudo+0x165/0x250 [ 292.092275] ? alloc_file+0x4d0/0x4d0 [ 292.096063] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 292.101674] ? shmem_get_inode+0x44c/0x8d0 [ 292.105897] __shmem_file_setup.part.0+0x102/0x2b0 [ 292.110821] shmem_file_setup+0x61/0x90 [ 292.114958] __se_sys_memfd_create+0x26b/0x440 [ 292.119527] ? memfd_file_seals_ptr+0x150/0x150 [ 292.124189] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.129543] ? trace_hardirqs_off_caller+0x6e/0x210 [ 292.134546] ? do_syscall_64+0x21/0x620 [ 292.138503] do_syscall_64+0xf9/0x620 [ 292.142293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.147470] RIP: 0033:0x7fb10938b0e9 [ 292.151169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 292.170061] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 292.177772] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938b0e9 [ 292.185041] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fb1093e41ee [ 292.192292] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fb107d001d0 [ 292.199547] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 292.206808] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 292.234770] erofs: read_super, device -> /dev/loop3 17:19:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:19:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 5) 17:19:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 292.245565] erofs: options -> [ 292.264830] erofs: read_super, device -> /dev/loop0 [ 292.275957] erofs: unmounted for /dev/loop4 [ 292.284154] erofs: root inode @ nid 36 [ 292.289595] erofs: options -> [ 292.296588] erofs: bogus i_mode (0) @ nid 36 [ 292.302424] erofs: root inode @ nid 36 [ 292.314153] erofs: bogus i_mode (0) @ nid 36 [ 292.333979] FAULT_INJECTION: forcing a failure. [ 292.333979] name failslab, interval 1, probability 0, space 0, times 0 [ 292.345895] CPU: 0 PID: 20007 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 292.353784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.363125] Call Trace: [ 292.365704] dump_stack+0x1fc/0x2ef [ 292.369318] should_fail.cold+0xa/0xf [ 292.373102] ? setup_fault_attr+0x200/0x200 [ 292.377407] ? lock_acquire+0x170/0x3c0 [ 292.381371] __should_failslab+0x115/0x180 [ 292.385605] should_failslab+0x5/0x10 [ 292.389475] kmem_cache_alloc_trace+0x284/0x380 [ 292.394137] apparmor_file_alloc_security+0x394/0xad0 [ 292.399319] ? apparmor_file_receive+0x160/0x160 [ 292.404064] ? __alloc_file+0x21/0x340 [ 292.407940] security_file_alloc+0x40/0x90 [ 292.412157] __alloc_file+0xd8/0x340 [ 292.415859] alloc_empty_file+0x6d/0x170 [ 292.419903] alloc_file+0x5e/0x4d0 [ 292.423429] alloc_file_pseudo+0x165/0x250 [ 292.427652] ? alloc_file+0x4d0/0x4d0 [ 292.431437] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 292.437046] ? shmem_get_inode+0x44c/0x8d0 [ 292.441268] __shmem_file_setup.part.0+0x102/0x2b0 [ 292.446186] shmem_file_setup+0x61/0x90 [ 292.450143] __se_sys_memfd_create+0x26b/0x440 [ 292.454706] ? memfd_file_seals_ptr+0x150/0x150 [ 292.459359] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.464711] ? trace_hardirqs_off_caller+0x6e/0x210 [ 292.469718] ? do_syscall_64+0x21/0x620 [ 292.473678] do_syscall_64+0xf9/0x620 [ 292.477463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.482635] RIP: 0033:0x7fb10938b0e9 [ 292.486330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 292.505321] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 292.513024] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938b0e9 [ 292.520279] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007fb1093e41ee [ 292.527532] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007fb107d001d0 [ 292.534784] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 17:19:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 6) [ 292.542036] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x39a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 292.589795] erofs: read_super, device -> /dev/loop1 [ 292.594960] erofs: options -> [ 292.600983] erofs: read_super, device -> /dev/loop5 [ 292.612546] erofs: read_super, device -> /dev/loop4 [ 292.624638] erofs: options -> fault_injection=0 [ 292.631688] erofs: blksize 1 isn't supported on this platform [ 292.633968] erofs: read_super, device -> /dev/loop3 [ 292.637753] erofs: options -> [ 292.652461] erofs: options -> [ 292.664264] erofs: root inode @ nid 36 [ 292.679481] erofs: bogus i_mode (0) @ nid 36 [ 292.680888] erofs: FAULT_INJECTION was not selected [ 292.689539] erofs: read_super, device -> /dev/loop0 [ 292.699729] erofs: root inode @ nid 36 [ 292.703759] FAULT_INJECTION: forcing a failure. [ 292.703759] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.704424] erofs: mounted on /dev/loop4 with opts: . [ 292.725896] erofs: root inode @ nid 36 [ 292.727943] erofs: options -> [ 292.730851] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 292.741354] CPU: 0 PID: 20029 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 292.742139] erofs: root inode @ nid 36 [ 292.749241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.749248] Call Trace: [ 292.749269] dump_stack+0x1fc/0x2ef [ 292.749290] should_fail.cold+0xa/0xf [ 292.749308] ? lock_acquire+0x170/0x3c0 [ 292.749325] ? setup_fault_attr+0x200/0x200 [ 292.749347] __alloc_pages_nodemask+0x239/0x2890 [ 292.749362] ? __lock_acquire+0x6de/0x3ff0 [ 292.749380] ? static_obj+0x50/0x50 [ 292.749401] ? __lock_acquire+0x6de/0x3ff0 [ 292.749416] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 292.749430] ? __lock_acquire+0x6de/0x3ff0 [ 292.749453] ? mark_held_locks+0xf0/0xf0 [ 292.749468] ? unwind_next_frame+0xeee/0x1400 [ 292.749483] ? mark_held_locks+0xf0/0xf0 [ 292.749495] ? deref_stack_reg+0x134/0x1d0 [ 292.749507] ? get_reg+0x176/0x1f0 [ 292.749521] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 292.749536] alloc_pages_vma+0xf2/0x780 [ 292.768236] erofs: bogus i_mode (0) @ nid 36 [ 292.768951] shmem_alloc_page+0x11c/0x1f0 [ 292.768968] ? shmem_swapin+0x220/0x220 [ 292.768999] ? percpu_counter_add_batch+0x126/0x180 [ 292.854292] ? __vm_enough_memory+0x316/0x650 [ 292.858774] shmem_alloc_and_acct_page+0x15a/0x850 [ 292.863690] shmem_getpage_gfp+0x4e9/0x37f0 [ 292.868002] ? shmem_alloc_and_acct_page+0x850/0x850 [ 292.873092] ? mark_held_locks+0xa6/0xf0 [ 292.877149] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 292.882337] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 292.887526] shmem_write_begin+0xff/0x1e0 [ 292.891664] generic_perform_write+0x1f8/0x4d0 [ 292.896237] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 292.900891] ? current_time+0x1c0/0x1c0 [ 292.904853] ? lock_acquire+0x170/0x3c0 [ 292.908814] __generic_file_write_iter+0x24b/0x610 [ 292.913726] generic_file_write_iter+0x3f8/0x730 [ 292.918471] __vfs_write+0x51b/0x770 [ 292.922184] ? kernel_read+0x110/0x110 [ 292.926067] ? check_preemption_disabled+0x41/0x280 [ 292.931070] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 292.936067] vfs_write+0x1f3/0x540 [ 292.939608] __x64_sys_pwrite64+0x1f7/0x250 [ 292.943926] ? ksys_pwrite64+0x1a0/0x1a0 [ 292.948061] ? trace_hardirqs_off_caller+0x6e/0x210 [ 292.953070] ? do_syscall_64+0x21/0x620 [ 292.957038] do_syscall_64+0xf9/0x620 [ 292.960830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.966009] RIP: 0033:0x7fb10933e0b7 [ 292.969705] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 292.988595] RSP: 002b:00007fb107cfff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 292.996291] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10933e0b7 [ 293.003560] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 293.010821] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fb107d001d0 [ 293.018074] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 293.025336] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 17:19:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x39b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 293.086609] erofs: read_super, device -> /dev/loop2 [ 293.091655] erofs: options -> fault_injection=0 [ 293.105311] erofs: cannot find valid erofs superblock [ 293.110644] erofs: unmounted for /dev/loop5 [ 293.137888] erofs: unmounted for /dev/loop4 [ 293.238636] erofs: read_super, device -> /dev/loop3 [ 293.243811] erofs: options -> [ 293.253920] erofs: root inode @ nid 36 [ 293.255875] erofs: read_super, device -> /dev/loop1 [ 293.270356] erofs: read_super, device -> /dev/loop5 [ 293.271601] erofs: read_super, device -> /dev/loop0 [ 293.276544] erofs: options -> fault_injection=0 [ 293.285337] erofs: options -> 17:19:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 7) [ 293.294827] erofs: blksize 1 isn't supported on this platform [ 293.302231] erofs: bogus i_mode (0) @ nid 36 [ 293.308905] erofs: options -> [ 293.314323] erofs: root inode @ nid 36 [ 293.323319] erofs: FAULT_INJECTION was not selected [ 293.324698] erofs: bogus i_mode (0) @ nid 36 [ 293.332081] erofs: root inode @ nid 36 [ 293.334766] FAULT_INJECTION: forcing a failure. [ 293.334766] name failslab, interval 1, probability 0, space 0, times 0 [ 293.337844] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 293.356134] CPU: 0 PID: 20060 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 293.364020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.373369] Call Trace: [ 293.375955] dump_stack+0x1fc/0x2ef [ 293.379576] should_fail.cold+0xa/0xf [ 293.383367] ? setup_fault_attr+0x200/0x200 [ 293.387678] ? lock_acquire+0x170/0x3c0 [ 293.391647] __should_failslab+0x115/0x180 [ 293.395875] should_failslab+0x5/0x10 [ 293.399666] kmem_cache_alloc+0x277/0x370 [ 293.403817] getname_flags+0xce/0x590 [ 293.407609] do_sys_open+0x26c/0x520 [ 293.411313] ? filp_open+0x70/0x70 [ 293.414848] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.420198] ? trace_hardirqs_off_caller+0x6e/0x210 [ 293.425203] ? do_syscall_64+0x21/0x620 [ 293.429168] do_syscall_64+0xf9/0x620 [ 293.432963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.438144] RIP: 0033:0x7fb10933e004 [ 293.441845] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 293.460734] RSP: 002b:00007fb107cffeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 293.468425] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10933e004 [ 293.475679] RDX: 0000000000000002 RSI: 00007fb107cfffe0 RDI: 00000000ffffff9c [ 293.482934] RBP: 00007fb107cfffe0 R08: 0000000000000000 R09: 00007fb107d001d0 17:19:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 8) [ 293.490187] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 293.497443] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x39c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 293.572047] erofs: read_super, device -> /dev/loop4 17:19:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 293.613825] erofs: unmounted for /dev/loop5 [ 293.615653] erofs: options -> [ 293.631058] erofs: root inode @ nid 36 [ 293.637083] erofs: mounted on /dev/loop4 with opts: . [ 293.643769] FAULT_INJECTION: forcing a failure. [ 293.643769] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 293.656004] CPU: 0 PID: 20075 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 293.663870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.673207] Call Trace: [ 293.675782] dump_stack+0x1fc/0x2ef [ 293.679394] should_fail.cold+0xa/0xf [ 293.683179] ? setup_fault_attr+0x200/0x200 [ 293.687487] ? do_writepages+0x290/0x290 [ 293.691534] ? unlock_page+0x13d/0x230 [ 293.695407] __alloc_pages_nodemask+0x239/0x2890 [ 293.700156] ? lock_downgrade+0x720/0x720 [ 293.704295] ? check_preemption_disabled+0x41/0x280 [ 293.709304] ? __lock_acquire+0x6de/0x3ff0 [ 293.713525] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 293.718349] ? lock_downgrade+0x720/0x720 [ 293.722479] ? lock_acquire+0x170/0x3c0 [ 293.726448] ? up_write+0x18/0x150 [ 293.730327] ? generic_file_write_iter+0x381/0x730 [ 293.735238] ? iov_iter_init+0xb8/0x1d0 [ 293.739205] cache_grow_begin+0xa4/0x8a0 [ 293.743273] ? setup_fault_attr+0x200/0x200 [ 293.747595] ? lock_acquire+0x170/0x3c0 [ 293.751564] cache_alloc_refill+0x273/0x340 [ 293.755872] kmem_cache_alloc+0x346/0x370 [ 293.760029] getname_flags+0xce/0x590 [ 293.763822] do_sys_open+0x26c/0x520 [ 293.767529] ? filp_open+0x70/0x70 [ 293.771075] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.776442] ? trace_hardirqs_off_caller+0x6e/0x210 [ 293.781448] ? do_syscall_64+0x21/0x620 [ 293.785409] do_syscall_64+0xf9/0x620 [ 293.789197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.794367] RIP: 0033:0x7fb10933e004 [ 293.798066] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 293.817046] RSP: 002b:00007fb107cffeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 293.824742] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10933e004 [ 293.831994] RDX: 0000000000000002 RSI: 00007fb107cfffe0 RDI: 00000000ffffff9c [ 293.839254] RBP: 00007fb107cfffe0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 293.846519] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 293.853784] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 293.890786] erofs: read_super, device -> /dev/loop1 [ 293.894366] erofs: read_super, device -> /dev/loop0 [ 293.895827] erofs: options -> [ 293.906672] erofs: read_super, device -> /dev/loop3 [ 293.914625] erofs: options -> [ 293.920571] erofs: blksize 1 isn't supported on this platform [ 293.927242] erofs: root inode @ nid 36 [ 293.928731] erofs: read_super, device -> /dev/loop2 [ 293.935339] erofs: bogus i_mode (0) @ nid 36 17:19:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 17:19:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 293.936303] erofs: options -> fault_injection=0 [ 293.943208] erofs: options -> [ 293.956464] erofs: unmounted for /dev/loop4 [ 293.965464] erofs: root inode @ nid 36 [ 293.973357] erofs: bogus i_mode (0) @ nid 36 [ 293.979969] erofs: FAULT_INJECTION was not selected [ 293.985052] erofs: root inode @ nid 36 [ 293.992248] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 294.042632] erofs: read_super, device -> /dev/loop5 17:19:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x39d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 294.067091] erofs: options -> fault_injection=0 [ 294.072840] erofs: FAULT_INJECTION was not selected [ 294.084503] erofs: root inode @ nid 36 [ 294.090197] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 9) [ 294.137879] erofs: read_super, device -> /dev/loop1 [ 294.142928] erofs: options -> [ 294.153096] erofs: blksize 1 isn't supported on this platform [ 294.174771] erofs: unmounted for /dev/loop5 [ 294.184514] erofs: unmounted for /dev/loop2 17:19:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 294.237636] erofs: read_super, device -> /dev/loop4 [ 294.242838] erofs: options -> [ 294.262339] erofs: root inode @ nid 36 [ 294.269067] erofs: mounted on /dev/loop4 with opts: . 17:19:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00000000']) [ 294.284250] erofs: read_super, device -> /dev/loop0 [ 294.292869] erofs: options -> [ 294.303886] erofs: root inode @ nid 36 [ 294.319305] erofs: bogus i_mode (0) @ nid 36 [ 294.328682] erofs: unmounted for /dev/loop4 17:19:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x39e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 294.392303] FAULT_INJECTION: forcing a failure. [ 294.392303] name failslab, interval 1, probability 0, space 0, times 0 [ 294.406084] erofs: read_super, device -> /dev/loop1 [ 294.415644] erofs: options -> [ 294.416983] CPU: 0 PID: 20119 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 294.426484] erofs: blksize 1 isn't supported on this platform [ 294.426738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.441951] Call Trace: [ 294.444551] dump_stack+0x1fc/0x2ef [ 294.448194] should_fail.cold+0xa/0xf [ 294.452010] ? setup_fault_attr+0x200/0x200 [ 294.456341] ? lock_acquire+0x170/0x3c0 [ 294.460328] __should_failslab+0x115/0x180 [ 294.463145] erofs: read_super, device -> /dev/loop3 [ 294.464569] should_failslab+0x5/0x10 [ 294.464585] kmem_cache_alloc_trace+0x284/0x380 [ 294.464605] apparmor_file_alloc_security+0x394/0xad0 [ 294.483240] ? apparmor_file_receive+0x160/0x160 [ 294.485548] erofs: read_super, device -> /dev/loop5 [ 294.488004] ? __alloc_file+0x21/0x340 [ 294.488026] security_file_alloc+0x40/0x90 [ 294.488043] __alloc_file+0xd8/0x340 [ 294.488062] alloc_empty_file+0x6d/0x170 [ 294.508886] path_openat+0xe9/0x2df0 [ 294.512595] ? __lock_acquire+0x6de/0x3ff0 [ 294.516823] ? path_lookupat+0x8d0/0x8d0 [ 294.520873] ? mark_held_locks+0xf0/0xf0 [ 294.524924] ? mark_held_locks+0xf0/0xf0 [ 294.528984] do_filp_open+0x18c/0x3f0 [ 294.532772] ? may_open_dev+0xf0/0xf0 [ 294.536559] ? __alloc_fd+0x28d/0x570 [ 294.540350] ? lock_downgrade+0x720/0x720 [ 294.544486] ? lock_acquire+0x170/0x3c0 [ 294.548450] ? __alloc_fd+0x34/0x570 [ 294.552161] ? do_raw_spin_unlock+0x171/0x230 [ 294.556646] ? _raw_spin_unlock+0x29/0x40 [ 294.560782] ? __alloc_fd+0x28d/0x570 [ 294.564577] do_sys_open+0x3b3/0x520 [ 294.568281] ? filp_open+0x70/0x70 [ 294.571812] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.577164] ? trace_hardirqs_off_caller+0x6e/0x210 [ 294.582167] ? do_syscall_64+0x21/0x620 [ 294.586130] do_syscall_64+0xf9/0x620 [ 294.589924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.595103] RIP: 0033:0x7fb10933e004 [ 294.598806] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 294.617693] RSP: 002b:00007fb107cffeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 294.625386] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10933e004 [ 294.632641] RDX: 0000000000000002 RSI: 00007fb107cfffe0 RDI: 00000000ffffff9c 17:19:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 294.639897] RBP: 00007fb107cfffe0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 294.647148] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 294.654404] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 294.682183] erofs: options -> fault_injection=0 [ 294.687411] erofs: options -> [ 294.689113] erofs: read_super, device -> /dev/loop0 [ 294.694544] erofs: FAULT_INJECTION was not selected [ 294.695610] erofs: options -> [ 294.696032] erofs: read_super, device -> /dev/loop4 [ 294.701200] erofs: root inode @ nid 36 [ 294.711884] erofs: options -> fault_injection=0x00000000 [ 294.718307] erofs: root inode @ nid 36 [ 294.723143] erofs: bogus i_mode (0) @ nid 36 [ 294.728092] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 10) [ 294.743404] erofs: root inode @ nid 36 [ 294.750282] erofs: FAULT_INJECTION was not selected [ 294.756207] erofs: bogus i_mode (0) @ nid 36 [ 294.763375] erofs: root inode @ nid 36 [ 294.768045] erofs: mounted on /dev/loop4 with opts: fault_injection=0x00000000. [ 294.820157] FAULT_INJECTION: forcing a failure. [ 294.820157] name failslab, interval 1, probability 0, space 0, times 0 [ 294.833189] CPU: 1 PID: 20145 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 294.841091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.850444] Call Trace: [ 294.853030] dump_stack+0x1fc/0x2ef [ 294.856657] should_fail.cold+0xa/0xf [ 294.860445] ? setup_fault_attr+0x200/0x200 [ 294.864765] ? lock_acquire+0x170/0x3c0 [ 294.868740] __should_failslab+0x115/0x180 [ 294.872971] should_failslab+0x5/0x10 [ 294.876758] kmem_cache_alloc_trace+0x284/0x380 [ 294.881418] apparmor_file_alloc_security+0x394/0xad0 [ 294.886598] ? apparmor_file_receive+0x160/0x160 [ 294.891343] ? __alloc_file+0x21/0x340 [ 294.895224] security_file_alloc+0x40/0x90 [ 294.899448] __alloc_file+0xd8/0x340 [ 294.903153] alloc_empty_file+0x6d/0x170 [ 294.907225] path_openat+0xe9/0x2df0 [ 294.910930] ? __lock_acquire+0x6de/0x3ff0 [ 294.915165] ? path_lookupat+0x8d0/0x8d0 [ 294.919221] ? mark_held_locks+0xf0/0xf0 [ 294.923279] do_filp_open+0x18c/0x3f0 [ 294.927067] ? may_open_dev+0xf0/0xf0 [ 294.930856] ? __alloc_fd+0x28d/0x570 [ 294.934648] ? lock_downgrade+0x720/0x720 [ 294.938786] ? lock_acquire+0x170/0x3c0 [ 294.942746] ? __alloc_fd+0x34/0x570 [ 294.946448] ? do_raw_spin_unlock+0x171/0x230 [ 294.950934] ? _raw_spin_unlock+0x29/0x40 [ 294.955066] ? __alloc_fd+0x28d/0x570 [ 294.958858] do_sys_open+0x3b3/0x520 [ 294.962559] ? filp_open+0x70/0x70 [ 294.966094] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.971449] ? trace_hardirqs_off_caller+0x6e/0x210 [ 294.976455] ? do_syscall_64+0x21/0x620 [ 294.980419] do_syscall_64+0xf9/0x620 [ 294.984213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.989388] RIP: 0033:0x7fb10933e004 [ 294.993092] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 295.011978] RSP: 002b:00007fb107cffeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 17:19:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00000000']) 17:19:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 295.019674] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10933e004 [ 295.026930] RDX: 0000000000000002 RSI: 00007fb107cfffe0 RDI: 00000000ffffff9c [ 295.034196] RBP: 00007fb107cfffe0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 295.041450] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 295.048788] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 11) [ 295.069784] erofs: unmounted for /dev/loop5 [ 295.074406] erofs: unmounted for /dev/loop4 17:19:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x39f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 295.184673] erofs: read_super, device -> /dev/loop3 [ 295.199968] erofs: options -> [ 295.209802] erofs: read_super, device -> /dev/loop1 [ 295.217117] erofs: options -> [ 295.222357] erofs: read_super, device -> /dev/loop5 [ 295.224847] erofs: root inode @ nid 36 [ 295.235992] erofs: read_super, device -> /dev/loop4 [ 295.241205] erofs: blksize 1 isn't supported on this platform [ 295.245691] erofs: options -> fault_injection=0 [ 295.250730] erofs: bogus i_mode (0) @ nid 36 [ 295.258951] erofs: FAULT_INJECTION was not selected [ 295.267040] erofs: options -> fault_injection=0x00000000 [ 295.275894] erofs: root inode @ nid 36 [ 295.284449] erofs: FAULT_INJECTION was not selected [ 295.291481] erofs: root inode @ nid 36 [ 295.295523] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 295.295646] erofs: mounted on /dev/loop4 with opts: fault_injection=0x00000000. [ 295.328001] FAULT_INJECTION: forcing a failure. [ 295.328001] name failslab, interval 1, probability 0, space 0, times 0 [ 295.339600] CPU: 1 PID: 20169 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 295.347479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.356824] Call Trace: [ 295.359419] dump_stack+0x1fc/0x2ef [ 295.363038] should_fail.cold+0xa/0xf [ 295.366834] ? setup_fault_attr+0x200/0x200 [ 295.371159] ? lock_acquire+0x170/0x3c0 [ 295.375131] __should_failslab+0x115/0x180 [ 295.379365] should_failslab+0x5/0x10 [ 295.383159] kmem_cache_alloc_trace+0x284/0x380 [ 295.387810] ? loop_info64_to_compat+0x5e0/0x5e0 [ 295.392548] __kthread_create_on_node+0xd2/0x410 [ 295.397301] ? kthread_parkme+0xa0/0xa0 [ 295.401266] ? lock_acquire+0x170/0x3c0 [ 295.405221] ? lo_ioctl+0x1bb/0x20e0 [ 295.408926] ? __mutex_lock+0x368/0x1190 [ 295.412968] ? lock_downgrade+0x720/0x720 [ 295.417112] ? check_preemption_disabled+0x41/0x280 [ 295.422120] ? loop_info64_to_compat+0x5e0/0x5e0 [ 295.426868] kthread_create_on_node+0xbb/0xf0 [ 295.431852] ? __kthread_create_on_node+0x410/0x410 [ 295.436871] ? __fget+0x356/0x510 [ 295.440327] ? do_dup2+0x450/0x450 [ 295.443856] ? __lockdep_init_map+0x100/0x5a0 [ 295.448336] ? __lockdep_init_map+0x100/0x5a0 [ 295.452830] lo_ioctl+0xae5/0x20e0 [ 295.456368] ? loop_set_status64+0x110/0x110 [ 295.460770] blkdev_ioctl+0x5cb/0x1a80 [ 295.464643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.469991] ? blkpg_ioctl+0x9d0/0x9d0 [ 295.473861] ? mark_held_locks+0xf0/0xf0 [ 295.477918] ? mark_held_locks+0xf0/0xf0 [ 295.481970] ? debug_check_no_obj_freed+0x201/0x490 [ 295.486980] ? lock_downgrade+0x720/0x720 [ 295.491117] block_ioctl+0xe9/0x130 [ 295.494725] ? blkdev_fallocate+0x3f0/0x3f0 [ 295.499040] do_vfs_ioctl+0xcdb/0x12e0 [ 295.502923] ? lock_downgrade+0x720/0x720 [ 295.507068] ? check_preemption_disabled+0x41/0x280 [ 295.512074] ? ioctl_preallocate+0x200/0x200 [ 295.516490] ? __fget+0x356/0x510 [ 295.519940] ? do_dup2+0x450/0x450 [ 295.523467] ? do_sys_open+0x2bf/0x520 [ 295.527341] ksys_ioctl+0x9b/0xc0 [ 295.530801] __x64_sys_ioctl+0x6f/0xb0 [ 295.534847] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 295.539416] do_syscall_64+0xf9/0x620 [ 295.543204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.548373] RIP: 0033:0x7fb10938aea7 [ 295.552070] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 295.570954] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:19:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 295.578662] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 295.585924] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 295.593178] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 295.600431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 295.607683] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 295.652734] erofs: read_super, device -> /dev/loop0 17:19:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 295.704204] erofs: options -> 17:19:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 12) [ 295.726080] erofs: unmounted for /dev/loop4 [ 295.742065] erofs: unmounted for /dev/loop5 [ 295.743964] erofs: root inode @ nid 36 [ 295.759672] erofs: bogus i_mode (0) @ nid 36 17:19:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 295.849043] erofs: read_super, device -> /dev/loop3 [ 295.854099] erofs: options -> [ 295.858422] erofs: root inode @ nid 36 [ 295.862372] erofs: bogus i_mode (0) @ nid 36 [ 295.885382] erofs: read_super, device -> /dev/loop1 [ 295.890540] erofs: read_super, device -> /dev/loop4 17:19:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 295.901621] erofs: options -> [ 295.907951] erofs: root inode @ nid 36 [ 295.917880] erofs: options -> [ 295.922073] erofs: blksize 1 isn't supported on this platform [ 295.923547] erofs: mounted on /dev/loop4 with opts: . 17:19:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 295.960464] erofs: read_super, device -> /dev/loop0 [ 295.970702] erofs: unmounted for /dev/loop4 [ 295.972651] erofs: options -> [ 295.983225] erofs: root inode @ nid 36 [ 295.989031] erofs: bogus i_mode (0) @ nid 36 [ 295.995537] FAULT_INJECTION: forcing a failure. [ 295.995537] name failslab, interval 1, probability 0, space 0, times 0 [ 296.007916] CPU: 0 PID: 20198 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 296.015811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.025158] Call Trace: [ 296.027741] dump_stack+0x1fc/0x2ef [ 296.031360] should_fail.cold+0xa/0xf [ 296.035148] ? setup_fault_attr+0x200/0x200 [ 296.039458] ? lock_acquire+0x170/0x3c0 [ 296.043435] __should_failslab+0x115/0x180 [ 296.047682] should_failslab+0x5/0x10 [ 296.051475] kmem_cache_alloc+0x277/0x370 [ 296.055614] __kernfs_new_node+0xd2/0x680 [ 296.059761] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 296.064521] ? __cpu_to_node+0x7b/0xa0 [ 296.068403] ? account_entity_enqueue+0x2e5/0x440 [ 296.073239] ? mark_held_locks+0xf0/0xf0 [ 296.077288] ? enqueue_entity+0xf86/0x3850 [ 296.081529] ? set_user_nice.part.0+0x3b9/0xab0 [ 296.086200] kernfs_create_dir_ns+0x9e/0x230 [ 296.090603] internal_create_group+0x1c1/0xb20 [ 296.095178] ? sysfs_remove_link_from_group+0x70/0x70 [ 296.100351] ? lock_downgrade+0x720/0x720 [ 296.104492] lo_ioctl+0xf7c/0x20e0 [ 296.108031] ? loop_set_status64+0x110/0x110 [ 296.112431] blkdev_ioctl+0x5cb/0x1a80 [ 296.116304] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.121655] ? blkpg_ioctl+0x9d0/0x9d0 [ 296.125541] ? mark_held_locks+0xf0/0xf0 [ 296.129591] ? mark_held_locks+0xf0/0xf0 [ 296.133644] ? debug_check_no_obj_freed+0x201/0x490 [ 296.138657] ? lock_downgrade+0x720/0x720 [ 296.142816] block_ioctl+0xe9/0x130 [ 296.146439] ? blkdev_fallocate+0x3f0/0x3f0 [ 296.150764] do_vfs_ioctl+0xcdb/0x12e0 [ 296.154644] ? lock_downgrade+0x720/0x720 [ 296.158775] ? check_preemption_disabled+0x41/0x280 [ 296.163773] ? ioctl_preallocate+0x200/0x200 [ 296.168166] ? __fget+0x356/0x510 [ 296.171602] ? do_dup2+0x450/0x450 [ 296.175128] ? do_sys_open+0x2bf/0x520 [ 296.179008] ksys_ioctl+0x9b/0xc0 [ 296.182453] __x64_sys_ioctl+0x6f/0xb0 [ 296.186331] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 296.190904] do_syscall_64+0xf9/0x620 [ 296.194696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.199869] RIP: 0033:0x7fb10938aea7 [ 296.203572] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 296.222468] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.230161] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 296.237413] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 296.244670] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 296.251922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 296.259174] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 296.322661] erofs: read_super, device -> /dev/loop5 [ 296.322665] erofs: read_super, device -> /dev/loop2 [ 296.322676] erofs: options -> fault_injection=0 [ 296.332092] erofs: options -> fault_injection=0 [ 296.343140] erofs: read_super, device -> /dev/loop3 [ 296.364588] erofs: options -> [ 296.367486] erofs: FAULT_INJECTION was not selected 17:19:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 296.380993] erofs: root inode @ nid 36 [ 296.381097] erofs: root inode @ nid 36 [ 296.385041] erofs: FAULT_INJECTION was not selected [ 296.393244] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 296.401114] erofs: bogus i_mode (0) @ nid 36 [ 296.401439] erofs: root inode @ nid 36 [ 296.410154] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 296.460452] erofs: read_super, device -> /dev/loop4 [ 296.479926] erofs: read_super, device -> /dev/loop1 [ 296.486218] erofs: options -> [ 296.488745] erofs: options -> [ 296.496998] erofs: unmounted for /dev/loop5 [ 296.500694] erofs: blksize 1 isn't supported on this platform 17:19:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 13) [ 296.507516] erofs: unmounted for /dev/loop2 [ 296.514745] erofs: root inode @ nid 36 [ 296.525910] erofs: mounted on /dev/loop4 with opts: . 17:19:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) [ 296.570798] erofs: read_super, device -> /dev/loop0 [ 296.575841] erofs: options -> [ 296.585931] erofs: read_super, device -> /dev/loop3 [ 296.591265] erofs: options -> [ 296.594723] erofs: root inode @ nid 36 [ 296.610584] erofs: root inode @ nid 36 [ 296.614606] erofs: bogus i_mode (0) @ nid 36 [ 296.626034] erofs: unmounted for /dev/loop4 [ 296.630232] erofs: bogus i_mode (0) @ nid 36 [ 296.635821] erofs: read_super, device -> /dev/loop5 [ 296.641176] erofs: options -> fault_injection=0 [ 296.649361] erofs: FAULT_INJECTION was not selected 17:19:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 296.672825] erofs: root inode @ nid 36 [ 296.673375] FAULT_INJECTION: forcing a failure. [ 296.673375] name failslab, interval 1, probability 0, space 0, times 0 [ 296.681458] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 296.693197] CPU: 0 PID: 20244 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 296.703030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.712382] Call Trace: [ 296.714962] dump_stack+0x1fc/0x2ef [ 296.718581] should_fail.cold+0xa/0xf [ 296.722368] ? setup_fault_attr+0x200/0x200 [ 296.726674] ? lock_acquire+0x170/0x3c0 [ 296.730636] __should_failslab+0x115/0x180 [ 296.734855] should_failslab+0x5/0x10 [ 296.738637] kmem_cache_alloc+0x277/0x370 [ 296.742768] __kernfs_new_node+0xd2/0x680 [ 296.746912] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 296.751655] ? kernfs_activate+0x2c/0x1d0 [ 296.755802] ? lock_downgrade+0x720/0x720 [ 296.759937] ? kernfs_add_one+0x51/0x4c0 [ 296.763988] ? mutex_trylock+0x1a0/0x1a0 [ 296.768042] ? __mutex_unlock_slowpath+0xea/0x610 [ 296.772871] kernfs_new_node+0x92/0x120 [ 296.776841] __kernfs_create_file+0x51/0x340 [ 296.781257] sysfs_add_file_mode_ns+0x226/0x540 [ 296.785920] internal_create_group+0x355/0xb20 [ 296.790487] ? sysfs_remove_link_from_group+0x70/0x70 [ 296.795657] ? lock_downgrade+0x720/0x720 [ 296.799792] lo_ioctl+0xf7c/0x20e0 [ 296.803333] ? loop_set_status64+0x110/0x110 [ 296.807726] blkdev_ioctl+0x5cb/0x1a80 [ 296.811602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.816948] ? blkpg_ioctl+0x9d0/0x9d0 [ 296.820817] ? mark_held_locks+0xf0/0xf0 [ 296.824861] ? mark_held_locks+0xf0/0xf0 [ 296.828905] ? debug_check_no_obj_freed+0x201/0x490 [ 296.833922] ? lock_downgrade+0x720/0x720 [ 296.838059] block_ioctl+0xe9/0x130 [ 296.841686] ? blkdev_fallocate+0x3f0/0x3f0 [ 296.846012] do_vfs_ioctl+0xcdb/0x12e0 [ 296.849898] ? lock_downgrade+0x720/0x720 [ 296.854033] ? check_preemption_disabled+0x41/0x280 [ 296.859033] ? ioctl_preallocate+0x200/0x200 [ 296.863428] ? __fget+0x356/0x510 [ 296.866864] ? do_dup2+0x450/0x450 [ 296.870395] ? do_sys_open+0x2bf/0x520 [ 296.874268] ksys_ioctl+0x9b/0xc0 [ 296.877706] __x64_sys_ioctl+0x6f/0xb0 [ 296.881577] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 296.886152] do_syscall_64+0xf9/0x620 [ 296.889943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.895118] RIP: 0033:0x7fb10938aea7 [ 296.898818] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 296.917712] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 296.925407] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 296.932657] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 296.939920] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 296.947183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 296.954435] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 296.997484] erofs: read_super, device -> /dev/loop2 [ 297.002596] erofs: options -> fault_injection=0 [ 297.013358] erofs: FAULT_INJECTION was not selected [ 297.024106] erofs: root inode @ nid 36 [ 297.036111] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 14) [ 297.113980] erofs: unmounted for /dev/loop5 [ 297.114189] erofs: read_super, device -> /dev/loop0 [ 297.128713] erofs: unmounted for /dev/loop2 [ 297.139620] erofs: options -> [ 297.143699] erofs: root inode @ nid 36 [ 297.149629] erofs: bogus i_mode (0) @ nid 36 [ 297.204525] FAULT_INJECTION: forcing a failure. [ 297.204525] name failslab, interval 1, probability 0, space 0, times 0 [ 297.216094] CPU: 1 PID: 20270 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 297.223981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.233483] Call Trace: [ 297.236070] dump_stack+0x1fc/0x2ef [ 297.239689] should_fail.cold+0xa/0xf [ 297.243477] ? setup_fault_attr+0x200/0x200 [ 297.247806] ? lock_acquire+0x170/0x3c0 [ 297.251769] __should_failslab+0x115/0x180 [ 297.255999] should_failslab+0x5/0x10 [ 297.259786] kmem_cache_alloc+0x277/0x370 [ 297.263921] __kernfs_new_node+0xd2/0x680 [ 297.268054] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 297.272796] ? __mutex_unlock_slowpath+0xea/0x610 [ 297.277634] ? wait_for_completion_io+0x10/0x10 [ 297.282299] ? kernfs_next_descendant_post+0x19c/0x290 [ 297.287580] kernfs_new_node+0x92/0x120 [ 297.291553] __kernfs_create_file+0x51/0x340 [ 297.295958] sysfs_add_file_mode_ns+0x226/0x540 [ 297.300615] internal_create_group+0x355/0xb20 [ 297.305193] ? sysfs_remove_link_from_group+0x70/0x70 [ 297.310378] ? lock_downgrade+0x720/0x720 [ 297.314516] lo_ioctl+0xf7c/0x20e0 [ 297.318070] ? loop_set_status64+0x110/0x110 [ 297.322474] blkdev_ioctl+0x5cb/0x1a80 [ 297.326352] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.331734] ? blkpg_ioctl+0x9d0/0x9d0 [ 297.335612] ? mark_held_locks+0xf0/0xf0 [ 297.339932] ? mark_held_locks+0xf0/0xf0 [ 297.343991] ? debug_check_no_obj_freed+0x201/0x490 [ 297.349011] ? lock_downgrade+0x720/0x720 [ 297.353154] block_ioctl+0xe9/0x130 [ 297.356772] ? blkdev_fallocate+0x3f0/0x3f0 [ 297.361098] do_vfs_ioctl+0xcdb/0x12e0 [ 297.364978] ? lock_downgrade+0x720/0x720 [ 297.369112] ? check_preemption_disabled+0x41/0x280 [ 297.374121] ? ioctl_preallocate+0x200/0x200 [ 297.378528] ? __fget+0x356/0x510 [ 297.381971] ? do_dup2+0x450/0x450 [ 297.385503] ? do_sys_open+0x2bf/0x520 [ 297.389401] ksys_ioctl+0x9b/0xc0 [ 297.392840] __x64_sys_ioctl+0x6f/0xb0 [ 297.396721] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 297.401300] do_syscall_64+0xf9/0x620 [ 297.405088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.410260] RIP: 0033:0x7fb10938aea7 [ 297.413955] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 297.432847] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.440557] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 297.447826] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 297.455091] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 297.462351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 297.469613] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 297.485168] erofs: read_super, device -> /dev/loop1 [ 297.487088] erofs: read_super, device -> /dev/loop4 [ 297.495216] erofs: options -> [ 297.495473] erofs: options -> 17:19:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 297.506489] erofs: read_super, device -> /dev/loop3 [ 297.507315] erofs: read_super, device -> /dev/loop2 [ 297.511643] erofs: options -> [ 297.526941] erofs: blksize 1 isn't supported on this platform [ 297.533691] erofs: root inode @ nid 36 [ 297.546535] erofs: bogus i_mode (0) @ nid 36 [ 297.547284] erofs: options -> fault_injection=0 [ 297.583852] erofs: root inode @ nid 36 17:19:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1bd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 297.605451] erofs: FAULT_INJECTION was not selected [ 297.612383] erofs: mounted on /dev/loop4 with opts: . [ 297.630737] erofs: root inode @ nid 36 [ 297.637833] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 297.685877] erofs: read_super, device -> /dev/loop5 17:19:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 15) 17:19:21 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) [ 297.707131] erofs: read_super, device -> /dev/loop0 [ 297.712295] erofs: read_super, device -> /dev/loop3 [ 297.720764] erofs: options -> fault_injection=0 [ 297.738792] erofs: options -> [ 297.745667] erofs: options -> [ 297.749331] erofs: root inode @ nid 36 [ 297.755237] erofs: FAULT_INJECTION was not selected [ 297.757293] erofs: unmounted for /dev/loop2 [ 297.771263] erofs: unmounted for /dev/loop4 [ 297.775436] erofs: root inode @ nid 36 [ 297.780788] erofs: bogus i_mode (0) @ nid 36 [ 297.791006] erofs: root inode @ nid 36 [ 297.797032] erofs: bogus i_mode (0) @ nid 36 [ 297.803283] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 297.907074] FAULT_INJECTION: forcing a failure. [ 297.907074] name failslab, interval 1, probability 0, space 0, times 0 [ 297.918749] CPU: 0 PID: 20299 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 297.926630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.935983] Call Trace: [ 297.938570] dump_stack+0x1fc/0x2ef [ 297.942185] should_fail.cold+0xa/0xf [ 297.945973] ? setup_fault_attr+0x200/0x200 [ 297.950281] ? lock_acquire+0x170/0x3c0 [ 297.954239] __should_failslab+0x115/0x180 [ 297.958471] should_failslab+0x5/0x10 [ 297.962260] kmem_cache_alloc+0x277/0x370 [ 297.966393] __kernfs_new_node+0xd2/0x680 [ 297.970524] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 297.975263] ? __mutex_unlock_slowpath+0xea/0x610 [ 297.980088] ? wait_for_completion_io+0x10/0x10 [ 297.984742] ? kernfs_next_descendant_post+0x19c/0x290 [ 297.990005] kernfs_new_node+0x92/0x120 [ 297.993967] __kernfs_create_file+0x51/0x340 [ 297.998483] sysfs_add_file_mode_ns+0x226/0x540 [ 298.003142] internal_create_group+0x355/0xb20 [ 298.007719] ? sysfs_remove_link_from_group+0x70/0x70 [ 298.012896] ? lock_downgrade+0x720/0x720 [ 298.017033] lo_ioctl+0xf7c/0x20e0 [ 298.020560] ? loop_set_status64+0x110/0x110 [ 298.024954] blkdev_ioctl+0x5cb/0x1a80 [ 298.028837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.034186] ? blkpg_ioctl+0x9d0/0x9d0 [ 298.038070] ? mark_held_locks+0xf0/0xf0 [ 298.042116] ? mark_held_locks+0xf0/0xf0 [ 298.046169] ? debug_check_no_obj_freed+0x201/0x490 [ 298.051182] ? lock_downgrade+0x720/0x720 [ 298.055315] block_ioctl+0xe9/0x130 [ 298.058936] ? blkdev_fallocate+0x3f0/0x3f0 [ 298.063243] do_vfs_ioctl+0xcdb/0x12e0 [ 298.067113] ? lock_downgrade+0x720/0x720 [ 298.071258] ? check_preemption_disabled+0x41/0x280 [ 298.076275] ? ioctl_preallocate+0x200/0x200 [ 298.080677] ? __fget+0x356/0x510 [ 298.084114] ? do_dup2+0x450/0x450 [ 298.087640] ? do_sys_open+0x2bf/0x520 [ 298.091516] ksys_ioctl+0x9b/0xc0 [ 298.094951] __x64_sys_ioctl+0x6f/0xb0 [ 298.098840] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 298.103406] do_syscall_64+0xf9/0x620 [ 298.107203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.112380] RIP: 0033:0x7fb10938aea7 [ 298.116074] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 298.134953] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.142645] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 298.149915] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 298.157166] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 298.164415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 298.171664] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 298.187173] erofs: read_super, device -> /dev/loop1 [ 298.192214] erofs: options -> 17:19:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 298.223226] erofs: blksize 1 isn't supported on this platform [ 298.242626] erofs: read_super, device -> /dev/loop2 [ 298.243651] erofs: read_super, device -> /dev/loop4 [ 298.258585] erofs: unmounted for /dev/loop5 [ 298.259691] erofs: options -> fault_injection=0 [ 298.274554] erofs: options -> fault_injecti [ 298.279790] erofs: FAULT_INJECTION was not selected [ 298.287093] erofs: Unrecognized mount option "fault_injecti" or missing value [ 298.293618] erofs: root inode @ nid 36 [ 298.301131] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:22 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) 17:19:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 16) 17:19:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 298.396241] erofs: read_super, device -> /dev/loop3 [ 298.406195] erofs: read_super, device -> /dev/loop0 [ 298.410805] erofs: options -> [ 298.422383] erofs: root inode @ nid 36 [ 298.425999] erofs: read_super, device -> /dev/loop5 [ 298.430445] erofs: bogus i_mode (0) @ nid 36 [ 298.440873] erofs: unmounted for /dev/loop2 [ 298.446116] erofs: options -> [ 298.450339] erofs: options -> fault_injection=0 [ 298.462272] erofs: root inode @ nid 36 [ 298.467281] erofs: FAULT_INJECTION was not selected [ 298.468694] erofs: bogus i_mode (0) @ nid 36 [ 298.481743] erofs: root inode @ nid 36 [ 298.486113] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 298.526028] erofs: read_super, device -> /dev/loop1 17:19:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 298.553543] erofs: options -> [ 298.562581] erofs: read_super, device -> /dev/loop4 [ 298.581786] erofs: options -> fault_injecti [ 298.582748] erofs: blksize 1 isn't supported on this platform [ 298.601568] erofs: unmounted for /dev/loop5 [ 298.603719] erofs: Unrecognized mount option "fault_injecti" or missing value 17:19:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x25a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 298.644307] FAULT_INJECTION: forcing a failure. [ 298.644307] name failslab, interval 1, probability 0, space 0, times 0 [ 298.663933] CPU: 1 PID: 20346 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 298.671836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.681181] Call Trace: [ 298.683755] dump_stack+0x1fc/0x2ef [ 298.687386] should_fail.cold+0xa/0xf [ 298.691182] ? setup_fault_attr+0x200/0x200 [ 298.695489] ? lock_acquire+0x170/0x3c0 [ 298.699455] __should_failslab+0x115/0x180 [ 298.703684] should_failslab+0x5/0x10 [ 298.707566] kmem_cache_alloc+0x277/0x370 [ 298.711708] __kernfs_new_node+0xd2/0x680 [ 298.715839] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 298.720588] ? __mutex_unlock_slowpath+0xea/0x610 [ 298.725412] ? wait_for_completion_io+0x10/0x10 [ 298.730076] ? kernfs_next_descendant_post+0x19c/0x290 [ 298.735339] kernfs_new_node+0x92/0x120 [ 298.739312] __kernfs_create_file+0x51/0x340 [ 298.743714] sysfs_add_file_mode_ns+0x226/0x540 [ 298.748368] internal_create_group+0x355/0xb20 [ 298.752937] ? sysfs_remove_link_from_group+0x70/0x70 [ 298.758134] ? lock_downgrade+0x720/0x720 [ 298.762284] lo_ioctl+0xf7c/0x20e0 [ 298.765819] ? loop_set_status64+0x110/0x110 [ 298.770213] blkdev_ioctl+0x5cb/0x1a80 [ 298.774086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.779442] ? blkpg_ioctl+0x9d0/0x9d0 [ 298.783324] ? mark_held_locks+0xf0/0xf0 [ 298.787380] ? mark_held_locks+0xf0/0xf0 [ 298.791448] ? debug_check_no_obj_freed+0x201/0x490 [ 298.796474] ? lock_downgrade+0x720/0x720 [ 298.800616] block_ioctl+0xe9/0x130 [ 298.804227] ? blkdev_fallocate+0x3f0/0x3f0 [ 298.808536] do_vfs_ioctl+0xcdb/0x12e0 [ 298.812409] ? lock_downgrade+0x720/0x720 [ 298.816551] ? check_preemption_disabled+0x41/0x280 [ 298.821564] ? ioctl_preallocate+0x200/0x200 [ 298.825965] ? __fget+0x356/0x510 [ 298.829403] ? do_dup2+0x450/0x450 [ 298.832926] ? do_sys_open+0x2bf/0x520 [ 298.836814] ksys_ioctl+0x9b/0xc0 [ 298.840261] __x64_sys_ioctl+0x6f/0xb0 [ 298.844136] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 298.848705] do_syscall_64+0xf9/0x620 [ 298.852495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.857674] RIP: 0033:0x7fb10938aea7 [ 298.861380] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 298.880266] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.887966] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 17:19:22 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injecti']) [ 298.895233] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 298.902492] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 298.909748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 298.917008] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 298.974855] erofs: read_super, device -> /dev/loop3 [ 298.975708] erofs: read_super, device -> /dev/loop2 [ 298.992399] erofs: options -> [ 298.995290] erofs: options -> fault_injection=0 [ 299.003888] erofs: root inode @ nid 36 [ 299.010932] erofs: bogus i_mode (0) @ nid 36 [ 299.011246] erofs: FAULT_INJECTION was not selected [ 299.025758] erofs: root inode @ nid 36 [ 299.036680] erofs: read_super, device -> /dev/loop5 [ 299.041221] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 299.041726] erofs: options -> fault_injection=0 17:19:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 17) [ 299.073378] erofs: FAULT_INJECTION was not selected [ 299.080587] erofs: unmounted for /dev/loop2 [ 299.085894] erofs: read_super, device -> /dev/loop0 [ 299.095744] erofs: root inode @ nid 36 [ 299.096935] erofs: options -> [ 299.105116] erofs: read_super, device -> /dev/loop4 [ 299.111291] erofs: options -> fault_injecti [ 299.119411] erofs: root inode @ nid 36 17:19:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:23 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:23 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0x00']) [ 299.123561] erofs: Unrecognized mount option "fault_injecti" or missing value [ 299.131560] erofs: bogus i_mode (0) @ nid 36 [ 299.140483] erofs: read_super, device -> /dev/loop1 [ 299.145512] erofs: options -> [ 299.164135] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 299.176531] erofs: blksize 1 isn't supported on this platform 17:19:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x268, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 299.314675] erofs: read_super, device -> /dev/loop3 [ 299.329308] erofs: options -> [ 299.333952] erofs: unmounted for /dev/loop5 [ 299.342630] erofs: read_super, device -> /dev/loop0 [ 299.345073] erofs: root inode @ nid 36 [ 299.347966] erofs: options -> [ 299.355281] erofs: root inode @ nid 36 [ 299.360251] erofs: bogus i_mode (0) @ nid 36 [ 299.360339] FAULT_INJECTION: forcing a failure. [ 299.360339] name failslab, interval 1, probability 0, space 0, times 0 [ 299.383737] erofs: bogus i_mode (0) @ nid 36 [ 299.383827] CPU: 0 PID: 20390 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 299.396034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.405409] Call Trace: [ 299.407989] dump_stack+0x1fc/0x2ef [ 299.411625] should_fail.cold+0xa/0xf [ 299.415417] ? setup_fault_attr+0x200/0x200 [ 299.419724] ? lock_acquire+0x170/0x3c0 [ 299.423699] __should_failslab+0x115/0x180 [ 299.427932] should_failslab+0x5/0x10 [ 299.431717] kmem_cache_alloc+0x277/0x370 [ 299.435862] __kernfs_new_node+0xd2/0x680 [ 299.440005] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 299.444761] ? __mutex_unlock_slowpath+0xea/0x610 [ 299.449665] ? wait_for_completion_io+0x10/0x10 [ 299.454321] ? kernfs_next_descendant_post+0x19c/0x290 [ 299.459584] kernfs_new_node+0x92/0x120 [ 299.463558] __kernfs_create_file+0x51/0x340 [ 299.467959] sysfs_add_file_mode_ns+0x226/0x540 [ 299.472633] internal_create_group+0x355/0xb20 [ 299.477214] ? sysfs_remove_link_from_group+0x70/0x70 [ 299.482389] ? lock_downgrade+0x720/0x720 [ 299.486525] lo_ioctl+0xf7c/0x20e0 [ 299.490050] ? loop_set_status64+0x110/0x110 [ 299.494441] blkdev_ioctl+0x5cb/0x1a80 [ 299.498318] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.503672] ? blkpg_ioctl+0x9d0/0x9d0 [ 299.507551] ? mark_held_locks+0xf0/0xf0 [ 299.511593] ? mark_held_locks+0xf0/0xf0 [ 299.515639] ? debug_check_no_obj_freed+0x201/0x490 [ 299.520638] ? lock_downgrade+0x720/0x720 [ 299.524778] block_ioctl+0xe9/0x130 [ 299.528391] ? blkdev_fallocate+0x3f0/0x3f0 [ 299.532698] do_vfs_ioctl+0xcdb/0x12e0 [ 299.536571] ? lock_downgrade+0x720/0x720 [ 299.540704] ? check_preemption_disabled+0x41/0x280 [ 299.545700] ? ioctl_preallocate+0x200/0x200 [ 299.550096] ? __fget+0x356/0x510 [ 299.553540] ? do_dup2+0x450/0x450 [ 299.557064] ? do_sys_open+0x2bf/0x520 [ 299.560938] ksys_ioctl+0x9b/0xc0 [ 299.564374] __x64_sys_ioctl+0x6f/0xb0 [ 299.568247] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 299.572822] do_syscall_64+0xf9/0x620 [ 299.576625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.581800] RIP: 0033:0x7fb10938aea7 [ 299.585495] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 299.604379] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.612071] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 299.619324] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 299.626587] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 299.633841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 299.641095] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 299.651060] erofs: read_super, device -> /dev/loop4 [ 299.653854] erofs: read_super, device -> /dev/loop2 [ 299.656091] erofs: options -> fault_injection=0x00 [ 299.666869] erofs: options -> fault_injection=0 [ 299.672180] erofs: FAULT_INJECTION was not selected [ 299.678350] erofs: FAULT_INJECTION was not selected [ 299.678579] erofs: root inode @ nid 36 [ 299.686187] erofs: root inode @ nid 36 [ 299.688005] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 299.698800] erofs: mounted on /dev/loop4 with opts: fault_injection=0x00. 17:19:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 18) [ 299.777314] erofs: read_super, device -> /dev/loop1 [ 299.783539] erofs: options -> [ 299.812816] erofs: unmounted for /dev/loop2 17:19:23 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:23 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 299.842573] erofs: blksize 1 isn't supported on this platform [ 299.864685] erofs: unmounted for /dev/loop4 17:19:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x27d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 299.946711] erofs: read_super, device -> /dev/loop3 [ 299.951758] erofs: options -> [ 299.992207] erofs: root inode @ nid 36 [ 300.008323] erofs: read_super, device -> /dev/loop5 [ 300.022895] erofs: read_super, device -> /dev/loop0 [ 300.039888] erofs: options -> fault_injection=0 [ 300.047838] erofs: read_super, device -> /dev/loop4 [ 300.067806] erofs: options -> [ 300.070185] erofs: FAULT_INJECTION was not selected [ 300.071379] erofs: root inode @ nid 36 [ 300.082818] FAULT_INJECTION: forcing a failure. [ 300.082818] name failslab, interval 1, probability 0, space 0, times 0 [ 300.084307] erofs: options -> fault_injectio [ 300.096473] erofs: bogus i_mode (0) @ nid 36 [ 300.108729] erofs: root inode @ nid 36 [ 300.111103] erofs: bogus i_mode (0) @ nid 36 [ 300.113554] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 300.119755] CPU: 0 PID: 20426 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 300.127535] erofs: Unrecognized mount option "fault_injectio" or missing value [ 300.131842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.131848] Call Trace: [ 300.131870] dump_stack+0x1fc/0x2ef [ 300.131891] should_fail.cold+0xa/0xf [ 300.131909] ? setup_fault_attr+0x200/0x200 [ 300.131923] ? lock_acquire+0x170/0x3c0 [ 300.131942] __should_failslab+0x115/0x180 [ 300.171009] should_failslab+0x5/0x10 [ 300.174809] kmem_cache_alloc+0x277/0x370 [ 300.178955] __kernfs_new_node+0xd2/0x680 [ 300.183088] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 300.187834] ? __mutex_unlock_slowpath+0xea/0x610 [ 300.192664] ? wait_for_completion_io+0x10/0x10 [ 300.197327] ? kernfs_next_descendant_post+0x19c/0x290 [ 300.202596] kernfs_new_node+0x92/0x120 [ 300.206571] __kernfs_create_file+0x51/0x340 [ 300.210975] sysfs_add_file_mode_ns+0x226/0x540 [ 300.215652] internal_create_group+0x355/0xb20 [ 300.220249] ? sysfs_remove_link_from_group+0x70/0x70 [ 300.225426] ? lock_downgrade+0x720/0x720 [ 300.229577] lo_ioctl+0xf7c/0x20e0 [ 300.233213] ? loop_set_status64+0x110/0x110 [ 300.237623] blkdev_ioctl+0x5cb/0x1a80 [ 300.241509] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.246857] ? blkpg_ioctl+0x9d0/0x9d0 [ 300.250737] ? mark_held_locks+0xf0/0xf0 [ 300.254788] ? mark_held_locks+0xf0/0xf0 [ 300.258843] ? debug_check_no_obj_freed+0x201/0x490 [ 300.263864] ? lock_downgrade+0x720/0x720 [ 300.268002] block_ioctl+0xe9/0x130 [ 300.271624] ? blkdev_fallocate+0x3f0/0x3f0 [ 300.275941] do_vfs_ioctl+0xcdb/0x12e0 [ 300.279811] ? lock_downgrade+0x720/0x720 [ 300.283949] ? check_preemption_disabled+0x41/0x280 [ 300.288959] ? ioctl_preallocate+0x200/0x200 [ 300.293352] ? __fget+0x356/0x510 [ 300.296809] ? do_dup2+0x450/0x450 [ 300.300341] ? do_sys_open+0x2bf/0x520 [ 300.304215] ksys_ioctl+0x9b/0xc0 [ 300.307653] __x64_sys_ioctl+0x6f/0xb0 [ 300.311525] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 300.316091] do_syscall_64+0xf9/0x620 [ 300.319886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.325067] RIP: 0033:0x7fb10938aea7 [ 300.328775] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 300.347657] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.355347] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 300.362600] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 300.369858] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 300.377109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 300.384361] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:24 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:24 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 300.475089] erofs: unmounted for /dev/loop5 [ 300.487376] erofs: read_super, device -> /dev/loop2 [ 300.492805] erofs: options -> fault_injection=0 [ 300.498872] erofs: FAULT_INJECTION was not selected [ 300.504194] erofs: root inode @ nid 36 [ 300.509091] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3a8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 300.521153] erofs: read_super, device -> /dev/loop1 [ 300.526184] erofs: options -> [ 300.544695] erofs: blksize 1 isn't supported on this platform 17:19:24 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 19) [ 300.578728] erofs: read_super, device -> /dev/loop4 [ 300.583771] erofs: options -> fault_injectio [ 300.598030] erofs: read_super, device -> /dev/loop5 [ 300.603062] erofs: options -> fault_injection=0 [ 300.604851] erofs: unmounted for /dev/loop2 [ 300.614383] erofs: FAULT_INJECTION was not selected 17:19:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 300.622052] erofs: Unrecognized mount option "fault_injectio" or missing value [ 300.628111] erofs: root inode @ nid 36 [ 300.633628] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:24 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x27d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 300.711292] erofs: read_super, device -> /dev/loop1 [ 300.716556] erofs: read_super, device -> /dev/loop0 [ 300.716564] erofs: options -> [ 300.716936] erofs: read_super, device -> /dev/loop3 [ 300.726441] erofs: options -> [ 300.734929] erofs: root inode @ nid 36 [ 300.736060] erofs: blksize 1 isn't supported on this platform [ 300.744141] erofs: bogus i_mode (0) @ nid 36 [ 300.754172] erofs: options -> [ 300.757492] erofs: unmounted for /dev/loop5 [ 300.762920] erofs: root inode @ nid 36 [ 300.767269] erofs: bogus i_mode (0) @ nid 36 [ 300.887254] FAULT_INJECTION: forcing a failure. [ 300.887254] name failslab, interval 1, probability 0, space 0, times 0 [ 300.898791] CPU: 0 PID: 20462 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 300.906684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.916039] Call Trace: [ 300.918618] dump_stack+0x1fc/0x2ef [ 300.922240] should_fail.cold+0xa/0xf [ 300.926035] ? setup_fault_attr+0x200/0x200 [ 300.930344] ? lock_acquire+0x170/0x3c0 [ 300.934311] ? dev_uevent_filter+0xd0/0xd0 [ 300.938527] __should_failslab+0x115/0x180 [ 300.942752] should_failslab+0x5/0x10 [ 300.946537] kmem_cache_alloc_trace+0x284/0x380 [ 300.951297] ? dev_uevent_filter+0xd0/0xd0 [ 300.955515] kobject_uevent_env+0x236/0x1480 [ 300.959917] lo_ioctl+0xff9/0x20e0 [ 300.963442] ? loop_set_status64+0x110/0x110 [ 300.967839] blkdev_ioctl+0x5cb/0x1a80 [ 300.971721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.977084] ? blkpg_ioctl+0x9d0/0x9d0 [ 300.980968] ? mark_held_locks+0xf0/0xf0 [ 300.985010] ? mark_held_locks+0xf0/0xf0 [ 300.989228] ? debug_check_no_obj_freed+0x201/0x490 [ 300.994240] ? lock_downgrade+0x720/0x720 [ 300.998373] block_ioctl+0xe9/0x130 [ 301.001983] ? blkdev_fallocate+0x3f0/0x3f0 [ 301.006288] do_vfs_ioctl+0xcdb/0x12e0 [ 301.010165] ? lock_downgrade+0x720/0x720 [ 301.014306] ? check_preemption_disabled+0x41/0x280 [ 301.019308] ? ioctl_preallocate+0x200/0x200 [ 301.023795] ? __fget+0x356/0x510 [ 301.027232] ? do_dup2+0x450/0x450 [ 301.031115] ? do_sys_open+0x2bf/0x520 [ 301.034995] ksys_ioctl+0x9b/0xc0 [ 301.038435] __x64_sys_ioctl+0x6f/0xb0 [ 301.042305] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 301.046868] do_syscall_64+0xf9/0x620 [ 301.050669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.055844] RIP: 0033:0x7fb10938aea7 [ 301.059541] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 301.078576] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.086271] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 301.093537] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 301.100791] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 301.108065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 301.115319] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 301.132801] erofs: read_super, device -> /dev/loop2 17:19:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3d8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 301.141946] erofs: options -> fault_injection=0 [ 301.162023] erofs: FAULT_INJECTION was not selected [ 301.168681] erofs: root inode @ nid 36 [ 301.174354] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 301.186533] erofs: read_super, device -> /dev/loop4 17:19:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x303, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 301.191572] erofs: options -> fault_injectio [ 301.194673] erofs: read_super, device -> /dev/loop5 [ 301.201463] erofs: options -> fault_injection=0 [ 301.208793] erofs: FAULT_INJECTION was not selected [ 301.220969] erofs: root inode @ nid 36 17:19:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 20) 17:19:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 301.239411] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 301.246777] erofs: unmounted for /dev/loop2 [ 301.251728] erofs: read_super, device -> /dev/loop0 [ 301.264483] erofs: Unrecognized mount option "fault_injectio" or missing value [ 301.264841] erofs: options -> [ 301.286692] erofs: unmounted for /dev/loop5 [ 301.294968] erofs: read_super, device -> /dev/loop1 [ 301.303555] erofs: root inode @ nid 36 [ 301.307621] erofs: options -> [ 301.311575] erofs: blksize 1 isn't supported on this platform [ 301.315942] erofs: bogus i_mode (0) @ nid 36 17:19:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 301.425013] erofs: read_super, device -> /dev/loop3 [ 301.436353] erofs: options -> [ 301.442680] FAULT_INJECTION: forcing a failure. [ 301.442680] name failslab, interval 1, probability 0, space 0, times 0 [ 301.454155] erofs: root inode @ nid 36 [ 301.459970] erofs: bogus i_mode (0) @ nid 36 [ 301.462976] CPU: 1 PID: 20495 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 301.472261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.481600] Call Trace: [ 301.484182] dump_stack+0x1fc/0x2ef [ 301.487798] should_fail.cold+0xa/0xf [ 301.491590] ? setup_fault_attr+0x200/0x200 [ 301.495909] ? lock_acquire+0x170/0x3c0 [ 301.499898] __should_failslab+0x115/0x180 [ 301.504119] should_failslab+0x5/0x10 [ 301.507902] __kmalloc+0x2ab/0x3c0 [ 301.511436] ? kobject_get_path+0xbf/0x240 [ 301.515664] kobject_get_path+0xbf/0x240 [ 301.519730] kobject_uevent_env+0x25c/0x1480 [ 301.524137] lo_ioctl+0xff9/0x20e0 [ 301.527665] ? loop_set_status64+0x110/0x110 [ 301.532061] blkdev_ioctl+0x5cb/0x1a80 [ 301.535935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.541283] ? blkpg_ioctl+0x9d0/0x9d0 [ 301.545155] ? mark_held_locks+0xf0/0xf0 [ 301.549206] ? mark_held_locks+0xf0/0xf0 [ 301.553425] ? debug_check_no_obj_freed+0x201/0x490 [ 301.558438] ? lock_downgrade+0x720/0x720 [ 301.562576] block_ioctl+0xe9/0x130 [ 301.566197] ? blkdev_fallocate+0x3f0/0x3f0 [ 301.570522] do_vfs_ioctl+0xcdb/0x12e0 [ 301.574400] ? lock_downgrade+0x720/0x720 [ 301.578535] ? check_preemption_disabled+0x41/0x280 [ 301.583535] ? ioctl_preallocate+0x200/0x200 [ 301.587941] ? __fget+0x356/0x510 [ 301.591380] ? do_dup2+0x450/0x450 [ 301.594911] ? do_sys_open+0x2bf/0x520 [ 301.598787] ksys_ioctl+0x9b/0xc0 [ 301.602272] __x64_sys_ioctl+0x6f/0xb0 [ 301.606147] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 301.610712] do_syscall_64+0xf9/0x620 [ 301.614496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.619667] RIP: 0033:0x7fb10938aea7 [ 301.623365] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 301.642254] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.649946] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 301.657201] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 301.664454] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 17:19:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x324, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 301.671706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 301.678958] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 301.693878] erofs: read_super, device -> /dev/loop5 [ 301.707794] erofs: options -> fault_injection=0 [ 301.717451] erofs: FAULT_INJECTION was not selected [ 301.722603] erofs: root inode @ nid 36 17:19:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 301.729703] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 301.737702] erofs: read_super, device -> /dev/loop2 [ 301.742730] erofs: options -> fault_injection=0 [ 301.749177] erofs: FAULT_INJECTION was not selected [ 301.754770] erofs: root inode @ nid 36 [ 301.759611] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 21) 17:19:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 301.815703] erofs: unmounted for /dev/loop5 [ 301.822125] erofs: unmounted for /dev/loop2 [ 301.899911] erofs: read_super, device -> /dev/loop4 [ 301.906356] erofs: options -> fault_injection=0 [ 301.912232] erofs: read_super, device -> /dev/loop1 [ 301.913232] erofs: read_super, device -> /dev/loop0 [ 301.917732] erofs: options -> [ 301.925130] erofs: options -> [ 301.931424] erofs: read_super, device -> /dev/loop3 [ 301.936856] erofs: read_super, device -> /dev/loop5 [ 301.939867] erofs: root inode @ nid 36 [ 301.942181] erofs: options -> fault_injection=0 [ 301.951027] erofs: options -> [ 301.955034] erofs: FAULT_INJECTION was not selected [ 301.955261] erofs: bogus i_mode (0) @ nid 36 [ 301.960584] erofs: root inode @ nid 36 [ 301.968765] erofs: root inode @ nid 36 [ 301.973169] erofs: FAULT_INJECTION was not selected [ 301.978215] erofs: blksize 1 isn't supported on this platform [ 301.985424] erofs: bogus i_mode (0) @ nid 36 [ 301.990871] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x382, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 301.997811] erofs: root inode @ nid 36 [ 302.002371] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:26 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 302.047925] FAULT_INJECTION: forcing a failure. [ 302.047925] name failslab, interval 1, probability 0, space 0, times 0 [ 302.060768] erofs: unmounted for /dev/loop4 [ 302.065425] CPU: 0 PID: 20533 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 302.073295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.082636] Call Trace: [ 302.085215] dump_stack+0x1fc/0x2ef [ 302.088950] should_fail.cold+0xa/0xf [ 302.092753] ? setup_fault_attr+0x200/0x200 [ 302.097069] ? lock_acquire+0x170/0x3c0 [ 302.101034] __should_failslab+0x115/0x180 [ 302.105269] should_failslab+0x5/0x10 [ 302.109066] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 302.114171] __kmalloc_node_track_caller+0x38/0x70 [ 302.119088] __alloc_skb+0xae/0x560 [ 302.122709] alloc_uevent_skb+0x7b/0x210 [ 302.126761] kobject_uevent_env+0xa90/0x1480 [ 302.131161] lo_ioctl+0xff9/0x20e0 [ 302.134701] ? loop_set_status64+0x110/0x110 [ 302.139106] blkdev_ioctl+0x5cb/0x1a80 [ 302.142983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.148336] ? blkpg_ioctl+0x9d0/0x9d0 [ 302.152216] ? mark_held_locks+0xf0/0xf0 [ 302.156257] ? mark_held_locks+0xf0/0xf0 [ 302.160315] ? debug_check_no_obj_freed+0x201/0x490 [ 302.165333] ? lock_downgrade+0x720/0x720 [ 302.169466] block_ioctl+0xe9/0x130 [ 302.173074] ? blkdev_fallocate+0x3f0/0x3f0 [ 302.177381] do_vfs_ioctl+0xcdb/0x12e0 [ 302.181260] ? lock_downgrade+0x720/0x720 [ 302.185392] ? check_preemption_disabled+0x41/0x280 [ 302.190389] ? ioctl_preallocate+0x200/0x200 [ 302.194780] ? __fget+0x356/0x510 [ 302.198215] ? do_dup2+0x450/0x450 [ 302.201738] ? do_sys_open+0x2bf/0x520 [ 302.205608] ksys_ioctl+0x9b/0xc0 [ 302.209052] __x64_sys_ioctl+0x6f/0xb0 [ 302.212928] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 302.217492] do_syscall_64+0xf9/0x620 [ 302.221277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.226445] RIP: 0033:0x7fb10938aea7 [ 302.230139] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:19:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1bd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x391, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 302.249030] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.256914] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 302.264176] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 302.271427] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 302.278692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 302.285943] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 302.313520] erofs: unmounted for /dev/loop5 [ 302.357095] erofs: read_super, device -> /dev/loop2 [ 302.362140] erofs: options -> fault_injection=0 [ 302.367454] erofs: FAULT_INJECTION was not selected [ 302.372520] erofs: root inode @ nid 36 [ 302.376889] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 302.399892] erofs: read_super, device -> /dev/loop1 17:19:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 22) 17:19:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 302.404943] erofs: options -> [ 302.451650] erofs: blksize 1 isn't supported on this platform [ 302.457973] erofs: unmounted for /dev/loop2 17:19:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x391, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 302.532549] FAULT_INJECTION: forcing a failure. [ 302.532549] name failslab, interval 1, probability 0, space 0, times 0 [ 302.545045] CPU: 0 PID: 20558 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 302.552934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.562283] Call Trace: [ 302.564870] dump_stack+0x1fc/0x2ef [ 302.568492] should_fail.cold+0xa/0xf [ 302.572293] ? setup_fault_attr+0x200/0x200 [ 302.576617] ? lock_acquire+0x170/0x3c0 [ 302.580586] __should_failslab+0x115/0x180 [ 302.584806] should_failslab+0x5/0x10 [ 302.588600] kmem_cache_alloc_node+0x245/0x3b0 [ 302.593178] __alloc_skb+0x71/0x560 [ 302.596814] alloc_uevent_skb+0x7b/0x210 [ 302.600876] kobject_uevent_env+0xa90/0x1480 [ 302.605279] lo_ioctl+0xff9/0x20e0 [ 302.608810] ? loop_set_status64+0x110/0x110 [ 302.613205] blkdev_ioctl+0x5cb/0x1a80 [ 302.617089] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.622436] ? blkpg_ioctl+0x9d0/0x9d0 [ 302.626307] ? mark_held_locks+0xf0/0xf0 [ 302.630351] ? mark_held_locks+0xf0/0xf0 [ 302.634407] ? debug_check_no_obj_freed+0x201/0x490 [ 302.639534] ? lock_downgrade+0x720/0x720 [ 302.643668] block_ioctl+0xe9/0x130 [ 302.647280] ? blkdev_fallocate+0x3f0/0x3f0 [ 302.651599] do_vfs_ioctl+0xcdb/0x12e0 [ 302.655487] ? lock_downgrade+0x720/0x720 [ 302.659617] ? check_preemption_disabled+0x41/0x280 [ 302.664615] ? ioctl_preallocate+0x200/0x200 [ 302.669008] ? __fget+0x356/0x510 [ 302.672457] ? do_dup2+0x450/0x450 [ 302.675990] ? do_sys_open+0x2bf/0x520 [ 302.679862] ksys_ioctl+0x9b/0xc0 [ 302.683298] __x64_sys_ioctl+0x6f/0xb0 [ 302.687186] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 302.691752] do_syscall_64+0xf9/0x620 [ 302.695538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.700713] RIP: 0033:0x7fb10938aea7 [ 302.704417] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 302.723309] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.731005] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 302.738257] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 302.745511] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 302.752773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 302.760031] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 302.775263] erofs: read_super, device -> /dev/loop5 [ 302.780120] erofs: read_super, device -> /dev/loop3 [ 302.798178] erofs: read_super, device -> /dev/loop4 [ 302.799803] erofs: options -> [ 302.803303] erofs: options -> fault_injectio [ 302.811300] erofs: read_super, device -> /dev/loop0 [ 302.825708] erofs: root inode @ nid 36 [ 302.828721] erofs: Unrecognized mount option "fault_injectio" or missing value [ 302.840198] erofs: bogus i_mode (0) @ nid 36 [ 302.840405] erofs: options -> [ 302.848633] erofs: options -> fault_injection=0 [ 302.853308] erofs: read_super, device -> /dev/loop1 [ 302.860823] erofs: read_super, device -> /dev/loop2 [ 302.868215] erofs: options -> [ 302.870424] erofs: FAULT_INJECTION was not selected [ 302.871900] erofs: blksize 1 isn't supported on this platform 17:19:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 302.878990] erofs: root inode @ nid 36 [ 302.889230] erofs: options -> fault_injection=0 [ 302.897426] erofs: root inode @ nid 36 [ 302.902381] erofs: FAULT_INJECTION was not selected [ 302.910334] erofs: bogus i_mode (0) @ nid 36 [ 302.914907] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 302.924125] erofs: root inode @ nid 36 [ 302.931024] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:26 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) 17:19:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3d8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3ad, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:27 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 23) 17:19:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 303.030080] erofs: read_super, device -> /dev/loop4 [ 303.040949] erofs: options -> fault_injectio [ 303.046854] erofs: unmounted for /dev/loop5 [ 303.052506] erofs: Unrecognized mount option "fault_injectio" or missing value [ 303.060031] erofs: unmounted for /dev/loop2 [ 303.096904] erofs: read_super, device -> /dev/loop3 [ 303.111052] erofs: options -> [ 303.114794] erofs: root inode @ nid 36 [ 303.120420] erofs: bogus i_mode (0) @ nid 36 17:19:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x27d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 303.183249] erofs: read_super, device -> /dev/loop5 17:19:27 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injectio']) [ 303.207021] erofs: read_super, device -> /dev/loop1 [ 303.218489] erofs: options -> fault_injection=0 [ 303.221837] erofs: options -> [ 303.234767] erofs: read_super, device -> /dev/loop0 [ 303.240207] erofs: options -> [ 303.242593] erofs: FAULT_INJECTION was not selected [ 303.243710] erofs: root inode @ nid 36 [ 303.254635] erofs: bogus i_mode (0) @ nid 36 [ 303.256258] FAULT_INJECTION: forcing a failure. [ 303.256258] name failslab, interval 1, probability 0, space 0, times 0 [ 303.271062] erofs: blksize 1 isn't supported on this platform [ 303.271397] CPU: 0 PID: 20605 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 303.284834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.289789] erofs: root inode @ nid 36 [ 303.294181] Call Trace: [ 303.294205] dump_stack+0x1fc/0x2ef [ 303.294225] should_fail.cold+0xa/0xf [ 303.294244] ? setup_fault_attr+0x200/0x200 [ 303.294259] ? lock_acquire+0x170/0x3c0 [ 303.294278] __should_failslab+0x115/0x180 [ 303.307873] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 303.308122] should_failslab+0x5/0x10 [ 303.308137] kmem_cache_alloc+0x277/0x370 [ 303.308153] skb_clone+0x151/0x3d0 [ 303.308170] netlink_broadcast_filtered+0x8e5/0xbc0 [ 303.343804] netlink_broadcast+0x35/0x40 [ 303.347856] kobject_uevent_env+0xa56/0x1480 [ 303.352254] lo_ioctl+0xff9/0x20e0 [ 303.355777] ? loop_set_status64+0x110/0x110 [ 303.360172] blkdev_ioctl+0x5cb/0x1a80 [ 303.364048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.369407] ? blkpg_ioctl+0x9d0/0x9d0 [ 303.373295] ? mark_held_locks+0xf0/0xf0 [ 303.377341] ? mark_held_locks+0xf0/0xf0 [ 303.381405] ? debug_check_no_obj_freed+0x201/0x490 [ 303.386412] ? lock_downgrade+0x720/0x720 [ 303.390563] block_ioctl+0xe9/0x130 [ 303.394181] ? blkdev_fallocate+0x3f0/0x3f0 [ 303.398485] do_vfs_ioctl+0xcdb/0x12e0 [ 303.402356] ? lock_downgrade+0x720/0x720 [ 303.406500] ? check_preemption_disabled+0x41/0x280 [ 303.411512] ? ioctl_preallocate+0x200/0x200 [ 303.415917] ? __fget+0x356/0x510 [ 303.419361] ? do_dup2+0x450/0x450 [ 303.422888] ? do_sys_open+0x2bf/0x520 [ 303.426761] ksys_ioctl+0x9b/0xc0 [ 303.430212] __x64_sys_ioctl+0x6f/0xb0 [ 303.434109] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 303.438692] do_syscall_64+0xf9/0x620 [ 303.442481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.447652] RIP: 0033:0x7fb10938aea7 [ 303.451347] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 303.470231] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.477922] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 303.485184] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 303.492448] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 303.499698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 303.506952] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 303.519712] erofs: read_super, device -> /dev/loop2 [ 303.524795] erofs: options -> fault_injection=0 [ 303.529872] erofs: FAULT_INJECTION was not selected [ 303.534962] erofs: root inode @ nid 36 [ 303.539217] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3ae, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:27 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 24) 17:19:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 303.583935] erofs: read_super, device -> /dev/loop3 [ 303.594065] erofs: read_super, device -> /dev/loop4 [ 303.599227] erofs: options -> [ 303.602643] erofs: options -> fault_injectio [ 303.612001] erofs: root inode @ nid 36 [ 303.616453] erofs: bogus i_mode (0) @ nid 36 [ 303.621217] erofs: Unrecognized mount option "fault_injectio" or missing value [ 303.641116] erofs: unmounted for /dev/loop5 [ 303.645580] erofs: unmounted for /dev/loop2 17:19:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:27 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) [ 303.797594] erofs: read_super, device -> /dev/loop0 [ 303.809350] erofs: options -> [ 303.823090] erofs: root inode @ nid 36 [ 303.840321] erofs: bogus i_mode (0) @ nid 36 [ 303.861821] FAULT_INJECTION: forcing a failure. [ 303.861821] name failslab, interval 1, probability 0, space 0, times 0 [ 303.873208] CPU: 1 PID: 20643 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 303.881086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.890513] Call Trace: [ 303.893089] dump_stack+0x1fc/0x2ef [ 303.896706] should_fail.cold+0xa/0xf [ 303.900495] ? setup_fault_attr+0x200/0x200 [ 303.904812] ? lock_acquire+0x170/0x3c0 [ 303.908809] __should_failslab+0x115/0x180 [ 303.913065] should_failslab+0x5/0x10 [ 303.916861] kmem_cache_alloc_trace+0x284/0x380 [ 303.921517] ? wait_for_completion_io+0x10/0x10 [ 303.926181] ? kobj_ns_initial+0x90/0x90 [ 303.930235] call_usermodehelper_setup+0x84/0x300 [ 303.935077] kobject_uevent_env+0xe83/0x1480 [ 303.939475] lo_ioctl+0xff9/0x20e0 [ 303.943004] ? loop_set_status64+0x110/0x110 [ 303.947406] blkdev_ioctl+0x5cb/0x1a80 [ 303.951305] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.956665] ? blkpg_ioctl+0x9d0/0x9d0 [ 303.960547] ? mark_held_locks+0xf0/0xf0 [ 303.964590] ? mark_held_locks+0xf0/0xf0 [ 303.968636] ? debug_check_no_obj_freed+0x201/0x490 [ 303.973635] ? lock_downgrade+0x720/0x720 [ 303.977772] block_ioctl+0xe9/0x130 [ 303.981383] ? blkdev_fallocate+0x3f0/0x3f0 [ 303.985689] do_vfs_ioctl+0xcdb/0x12e0 [ 303.989586] ? lock_downgrade+0x720/0x720 [ 303.993726] ? check_preemption_disabled+0x41/0x280 [ 303.998727] ? ioctl_preallocate+0x200/0x200 [ 304.003136] ? __fget+0x356/0x510 [ 304.006574] ? do_dup2+0x450/0x450 [ 304.010098] ? do_sys_open+0x2bf/0x520 [ 304.013969] ksys_ioctl+0x9b/0xc0 [ 304.017416] __x64_sys_ioctl+0x6f/0xb0 [ 304.021297] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 304.025859] do_syscall_64+0xf9/0x620 [ 304.029661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.034836] RIP: 0033:0x7fb10938aea7 [ 304.038542] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 304.057442] RSP: 002b:00007fb107cfff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.065143] RAX: ffffffffffffffda RBX: 00007fb1093d4a20 RCX: 00007fb10938aea7 [ 304.072769] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 304.080151] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fb107d001d0 [ 304.087408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 304.094664] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 304.107268] erofs: read_super, device -> /dev/loop3 [ 304.117503] erofs: options -> [ 304.121142] erofs: root inode @ nid 36 [ 304.125451] erofs: bogus i_mode (0) @ nid 36 [ 304.137454] erofs: read_super, device -> /dev/loop5 [ 304.142607] erofs: read_super, device -> /dev/loop1 [ 304.142721] erofs: read_super, device -> /dev/loop2 [ 304.150896] erofs: options -> [ 304.153592] erofs: options -> fault_injection=0 17:19:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 304.162849] erofs: blksize 1 isn't supported on this platform [ 304.168612] erofs: options -> fault_injection=0 [ 304.173298] erofs: FAULT_INJECTION was not selected [ 304.174895] erofs: FAULT_INJECTION was not selected [ 304.183902] erofs: root inode @ nid 36 [ 304.184138] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 304.195570] erofs: root inode @ nid 36 [ 304.199860] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 25) 17:19:28 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:28 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3af, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 304.264712] erofs: read_super, device -> /dev/loop4 [ 304.282491] erofs: unmounted for /dev/loop2 [ 304.298247] erofs: options -> fault_injection= [ 304.305131] erofs: Unrecognized mount option "fault_injection=" or missing value [ 304.315206] erofs: unmounted for /dev/loop5 [ 304.408690] erofs: read_super, device -> /dev/loop0 [ 304.410931] FAULT_INJECTION: forcing a failure. [ 304.410931] name failslab, interval 1, probability 0, space 0, times 0 [ 304.414123] erofs: options -> [ 304.428168] CPU: 0 PID: 20667 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 304.434381] erofs: root inode @ nid 36 [ 304.436299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.436305] Call Trace: [ 304.436326] dump_stack+0x1fc/0x2ef [ 304.436351] should_fail.cold+0xa/0xf [ 304.436369] ? setup_fault_attr+0x200/0x200 [ 304.436384] ? lock_acquire+0x170/0x3c0 [ 304.436405] __should_failslab+0x115/0x180 [ 304.441147] erofs: bogus i_mode (0) @ nid 36 [ 304.449635] should_failslab+0x5/0x10 [ 304.449650] kmem_cache_alloc+0x277/0x370 [ 304.449670] getname_flags+0xce/0x590 [ 304.449686] do_mkdirat+0x8d/0x2d0 [ 304.449702] ? __ia32_sys_mknod+0x120/0x120 [ 304.449718] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.449733] ? trace_hardirqs_off_caller+0x6e/0x210 [ 304.449749] ? do_syscall_64+0x21/0x620 [ 304.510439] do_syscall_64+0xf9/0x620 [ 304.514238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.519416] RIP: 0033:0x7fb10938a1f7 [ 304.523117] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 304.542005] RSP: 002b:00007fb107cfff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 304.549701] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938a1f7 17:19:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 304.557063] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 304.564320] RBP: 00007fb107d001d0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 304.571665] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 304.578923] R13: 0000000020000100 R14: 00007fb107cfffe0 R15: 0000000020000180 17:19:28 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) [ 304.630319] erofs: read_super, device -> /dev/loop1 [ 304.641949] erofs: read_super, device -> /dev/loop5 [ 304.647519] erofs: read_super, device -> /dev/loop3 [ 304.655595] erofs: options -> [ 304.657830] erofs: options -> [ 304.663336] erofs: blksize 1 isn't supported on this platform [ 304.666601] erofs: options -> fault_injection=0 [ 304.673139] erofs: root inode @ nid 36 17:19:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 26) [ 304.691238] erofs: bogus i_mode (0) @ nid 36 [ 304.704955] erofs: FAULT_INJECTION was not selected [ 304.719836] erofs: root inode @ nid 36 [ 304.725968] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:28 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x391, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 304.780634] FAULT_INJECTION: forcing a failure. [ 304.780634] name failslab, interval 1, probability 0, space 0, times 0 [ 304.803983] erofs: read_super, device -> /dev/loop0 [ 304.805410] erofs: unmounted for /dev/loop5 [ 304.811692] erofs: options -> [ 304.814535] erofs: read_super, device -> /dev/loop4 [ 304.821576] erofs: root inode @ nid 36 17:19:28 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 304.829982] erofs: bogus i_mode (0) @ nid 36 [ 304.842629] erofs: options -> fault_injection= [ 304.851894] erofs: Unrecognized mount option "fault_injection=" or missing value [ 304.852245] CPU: 1 PID: 20693 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 304.867324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.876790] Call Trace: [ 304.879366] dump_stack+0x1fc/0x2ef [ 304.882978] should_fail.cold+0xa/0xf [ 304.886777] ? setup_fault_attr+0x200/0x200 [ 304.891086] ? lock_acquire+0x170/0x3c0 [ 304.895043] __should_failslab+0x115/0x180 [ 304.899261] should_failslab+0x5/0x10 [ 304.903041] kmem_cache_alloc+0x277/0x370 [ 304.907261] getname_flags+0xce/0x590 [ 304.911041] do_mkdirat+0x8d/0x2d0 [ 304.914561] ? __ia32_sys_mknod+0x120/0x120 [ 304.918867] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.924211] ? trace_hardirqs_off_caller+0x6e/0x210 [ 304.929208] ? do_syscall_64+0x21/0x620 [ 304.933163] do_syscall_64+0xf9/0x620 [ 304.936946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.942114] RIP: 0033:0x7fb10938a1f7 [ 304.945807] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 304.964692] RSP: 002b:00007fb107cfff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 304.972385] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938a1f7 [ 304.979643] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 304.986907] RBP: 00007fb107d001d0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 304.994165] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 305.001423] R13: 0000000020000100 R14: 00007fb107cfffe0 R15: 0000000020000180 17:19:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 27) [ 305.127982] erofs: read_super, device -> /dev/loop1 [ 305.130374] erofs: read_super, device -> /dev/loop5 [ 305.133022] erofs: options -> [ 305.144993] erofs: read_super, device -> /dev/loop3 17:19:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=']) 17:19:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 305.170592] erofs: options -> fault_injection=0 [ 305.172450] erofs: options -> [ 305.185466] erofs: FAULT_INJECTION was not selected [ 305.196763] erofs: root inode @ nid 36 [ 305.211017] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 305.214796] erofs: blksize 1 isn't supported on this platform [ 305.225088] erofs: root inode @ nid 36 [ 305.239629] erofs: bogus i_mode (0) @ nid 36 17:19:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b1, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 305.331467] FAULT_INJECTION: forcing a failure. [ 305.331467] name failslab, interval 1, probability 0, space 0, times 0 [ 305.345209] CPU: 0 PID: 20728 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 305.346041] erofs: unmounted for /dev/loop5 [ 305.353112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.353118] Call Trace: [ 305.353142] dump_stack+0x1fc/0x2ef [ 305.353163] should_fail.cold+0xa/0xf [ 305.353179] ? setup_fault_attr+0x200/0x200 [ 305.353194] ? lock_acquire+0x170/0x3c0 [ 305.353219] __should_failslab+0x115/0x180 [ 305.353237] should_failslab+0x5/0x10 [ 305.353251] kmem_cache_alloc+0x277/0x370 [ 305.353267] __d_alloc+0x2b/0xa10 [ 305.353287] d_alloc+0x4a/0x230 [ 305.353306] __lookup_hash+0xc8/0x180 [ 305.353321] filename_create+0x186/0x490 [ 305.353335] ? kern_path_mountpoint+0x40/0x40 [ 305.353347] ? strncpy_from_user+0x2a2/0x350 [ 305.353365] ? getname_flags+0x25b/0x590 [ 305.353380] do_mkdirat+0xa0/0x2d0 [ 305.373148] erofs: read_super, device -> /dev/loop4 [ 305.373235] ? __ia32_sys_mknod+0x120/0x120 [ 305.388545] erofs: options -> fault_injection= [ 305.389499] ? trace_hardirqs_off_caller+0x6e/0x210 [ 305.395243] erofs: Unrecognized mount option "fault_injection=" or missing value [ 305.397412] ? do_syscall_64+0x21/0x620 [ 305.397431] do_syscall_64+0xf9/0x620 [ 305.397450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.397462] RIP: 0033:0x7fb10938a1f7 [ 305.397473] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 305.397485] RSP: 002b:00007fb107cfff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 305.497828] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938a1f7 [ 305.505083] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 305.512346] RBP: 00007fb107d001d0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 305.519600] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 305.526854] R13: 0000000020000100 R14: 00007fb107cfffe0 R15: 0000000020000180 17:19:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3d8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 28) 17:19:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 305.606363] erofs: read_super, device -> /dev/loop0 [ 305.611725] erofs: options -> [ 305.614980] erofs: root inode @ nid 36 [ 305.635014] erofs: bogus i_mode (0) @ nid 36 [ 305.681033] erofs: read_super, device -> /dev/loop3 17:19:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 1) 17:19:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 305.706872] erofs: options -> [ 305.712819] erofs: root inode @ nid 36 [ 305.721623] erofs: bogus i_mode (0) @ nid 36 [ 305.729747] erofs: read_super, device -> /dev/loop1 [ 305.738339] erofs: options -> [ 305.746033] erofs: blksize 1 isn't supported on this platform [ 305.781608] FAULT_INJECTION: forcing a failure. [ 305.781608] name failslab, interval 1, probability 0, space 0, times 0 [ 305.793026] CPU: 1 PID: 20758 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 305.797846] erofs: read_super, device -> /dev/loop5 [ 305.800911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.800917] Call Trace: [ 305.800940] dump_stack+0x1fc/0x2ef [ 305.800958] should_fail.cold+0xa/0xf [ 305.800977] ? setup_fault_attr+0x200/0x200 17:19:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 2) [ 305.806056] erofs: options -> fault_injection=0 [ 305.815326] ? lock_acquire+0x170/0x3c0 [ 305.815346] __should_failslab+0x115/0x180 [ 305.815362] should_failslab+0x5/0x10 [ 305.815375] __kmalloc+0x2ab/0x3c0 [ 305.815388] ? __se_sys_memfd_create+0xf8/0x440 [ 305.815406] __se_sys_memfd_create+0xf8/0x440 [ 305.815420] ? memfd_file_seals_ptr+0x150/0x150 [ 305.815435] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.815449] ? trace_hardirqs_off_caller+0x6e/0x210 [ 305.815464] ? do_syscall_64+0x21/0x620 [ 305.815481] do_syscall_64+0xf9/0x620 [ 305.815496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.815508] RIP: 0033:0x7f7bf18310e9 [ 305.815521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 305.815528] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 305.815540] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18310e9 [ 305.815548] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7bf188a1ee [ 305.815556] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f7bf01a61d0 [ 305.815564] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 305.815572] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 305.957758] erofs: FAULT_INJECTION was not selected [ 305.962765] erofs: root inode @ nid 36 [ 305.967248] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:30 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 305.990354] FAULT_INJECTION: forcing a failure. [ 305.990354] name failslab, interval 1, probability 0, space 0, times 0 [ 305.994730] erofs: read_super, device -> /dev/loop0 [ 306.014162] erofs: unmounted for /dev/loop5 [ 306.051913] erofs: options -> [ 306.053200] CPU: 1 PID: 20760 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 306.063011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.065160] erofs: root inode @ nid 36 [ 306.072360] Call Trace: [ 306.072381] dump_stack+0x1fc/0x2ef [ 306.072399] should_fail.cold+0xa/0xf [ 306.072418] ? setup_fault_attr+0x200/0x200 [ 306.072438] __should_failslab+0x115/0x180 [ 306.072454] should_failslab+0x5/0x10 [ 306.072468] kmem_cache_alloc+0x277/0x370 [ 306.072483] ? ext4_sync_fs+0x8d0/0x8d0 [ 306.072497] ext4_alloc_inode+0x1a/0x630 [ 306.072510] ? ext4_sync_fs+0x8d0/0x8d0 [ 306.072527] alloc_inode+0x5d/0x180 [ 306.087532] erofs: bogus i_mode (0) @ nid 36 [ 306.090690] new_inode+0x1d/0xf0 [ 306.090711] __ext4_new_inode+0x400/0x5a20 [ 306.090730] ? putname+0xe1/0x120 [ 306.109404] FAULT_INJECTION: forcing a failure. [ 306.109404] name failslab, interval 1, probability 0, space 0, times 0 [ 306.110875] ? do_mkdirat+0xa0/0x2d0 [ 306.110900] ? ext4_free_inode+0x1780/0x1780 [ 306.110917] ? debug_check_no_obj_freed+0x201/0x490 [ 306.158094] ? __dquot_initialize+0x298/0xb70 [ 306.162598] ? lock_acquire+0x170/0x3c0 [ 306.166574] ? dquot_initialize_needed+0x290/0x290 [ 306.171497] ? trace_hardirqs_off+0x64/0x200 [ 306.175897] ? common_perm+0x4be/0x800 [ 306.179778] ext4_mkdir+0x396/0xe10 [ 306.183405] ? putname+0xe1/0x120 [ 306.186864] ? ext4_init_dot_dotdot+0x600/0x600 [ 306.191534] ? generic_permission+0x116/0x4d0 [ 306.196018] ? security_inode_permission+0xc5/0xf0 [ 306.200936] ? inode_permission.part.0+0x10c/0x450 [ 306.205857] vfs_mkdir+0x508/0x7a0 [ 306.209387] do_mkdirat+0x262/0x2d0 [ 306.213004] ? __ia32_sys_mknod+0x120/0x120 [ 306.217318] ? trace_hardirqs_off_caller+0x6e/0x210 [ 306.222329] ? do_syscall_64+0x21/0x620 [ 306.226303] do_syscall_64+0xf9/0x620 [ 306.230109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.235298] RIP: 0033:0x7fb10938a1f7 [ 306.239005] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 306.257893] RSP: 002b:00007fb107cfff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 306.265592] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938a1f7 [ 306.272851] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 306.280105] RBP: 00007fb107d001d0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 306.287363] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 306.294622] R13: 0000000020000100 R14: 00007fb107cfffe0 R15: 0000000020000180 [ 306.301899] CPU: 0 PID: 20771 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 306.309783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.319138] Call Trace: [ 306.321735] dump_stack+0x1fc/0x2ef [ 306.325375] should_fail.cold+0xa/0xf [ 306.329193] ? setup_fault_attr+0x200/0x200 [ 306.333523] ? lock_acquire+0x170/0x3c0 [ 306.337509] __should_failslab+0x115/0x180 [ 306.341755] should_failslab+0x5/0x10 [ 306.345558] kmem_cache_alloc+0x277/0x370 [ 306.349708] ? shmem_destroy_callback+0xb0/0xb0 [ 306.354377] shmem_alloc_inode+0x18/0x40 [ 306.358441] ? shmem_destroy_callback+0xb0/0xb0 [ 306.363110] alloc_inode+0x5d/0x180 [ 306.366738] new_inode+0x1d/0xf0 [ 306.370108] shmem_get_inode+0x96/0x8d0 [ 306.374092] __shmem_file_setup.part.0+0x7a/0x2b0 [ 306.378950] shmem_file_setup+0x61/0x90 [ 306.382934] __se_sys_memfd_create+0x26b/0x440 [ 306.387514] ? memfd_file_seals_ptr+0x150/0x150 [ 306.392198] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.397572] ? trace_hardirqs_off_caller+0x6e/0x210 [ 306.402591] ? do_syscall_64+0x21/0x620 [ 306.406571] do_syscall_64+0xf9/0x620 [ 306.410379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.415569] RIP: 0033:0x7f7bf18310e9 [ 306.419281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 306.438190] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 306.445900] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18310e9 [ 306.453178] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7bf188a1ee [ 306.460450] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f7bf01a61d0 [ 306.467719] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 306.474990] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:30 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 3) 17:19:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2403, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 29) [ 306.578531] erofs: read_super, device -> /dev/loop3 [ 306.583817] erofs: options -> [ 306.589084] erofs: read_super, device -> /dev/loop1 [ 306.598158] erofs: read_super, device -> /dev/loop5 [ 306.603283] erofs: options -> fault_injection=0 [ 306.624474] erofs: options -> [ 306.631685] erofs: root inode @ nid 36 [ 306.638840] erofs: FAULT_INJECTION was not selected [ 306.648147] erofs: blksize 1 isn't supported on this platform [ 306.664051] erofs: bogus i_mode (0) @ nid 36 [ 306.674054] erofs: root inode @ nid 36 [ 306.688442] FAULT_INJECTION: forcing a failure. [ 306.688442] name failslab, interval 1, probability 0, space 0, times 0 [ 306.697716] FAULT_INJECTION: forcing a failure. [ 306.697716] name failslab, interval 1, probability 0, space 0, times 0 [ 306.712532] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 306.730659] CPU: 1 PID: 20791 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 306.738555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.747910] Call Trace: [ 306.750502] dump_stack+0x1fc/0x2ef [ 306.754139] should_fail.cold+0xa/0xf [ 306.757947] ? setup_fault_attr+0x200/0x200 [ 306.762273] ? lock_acquire+0x170/0x3c0 [ 306.766256] __should_failslab+0x115/0x180 [ 306.770492] should_failslab+0x5/0x10 [ 306.774289] kmem_cache_alloc+0x277/0x370 [ 306.778435] __d_alloc+0x2b/0xa10 [ 306.781894] d_alloc_pseudo+0x19/0x70 [ 306.785695] alloc_file_pseudo+0xc6/0x250 [ 306.789844] ? alloc_file+0x4d0/0x4d0 [ 306.793645] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 306.799272] ? shmem_get_inode+0x44c/0x8d0 [ 306.803512] __shmem_file_setup.part.0+0x102/0x2b0 [ 306.808443] shmem_file_setup+0x61/0x90 [ 306.812413] __se_sys_memfd_create+0x26b/0x440 [ 306.816996] ? memfd_file_seals_ptr+0x150/0x150 [ 306.821663] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.827026] ? trace_hardirqs_off_caller+0x6e/0x210 [ 306.832047] ? do_syscall_64+0x21/0x620 [ 306.836032] do_syscall_64+0xf9/0x620 [ 306.839835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.845021] RIP: 0033:0x7f7bf18310e9 [ 306.848737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 306.867648] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 306.875359] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18310e9 [ 306.882631] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7bf188a1ee [ 306.889901] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f7bf01a61d0 [ 306.897344] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 306.904704] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 306.911991] CPU: 0 PID: 20789 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 [ 306.919887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.929236] Call Trace: [ 306.932000] dump_stack+0x1fc/0x2ef [ 306.935642] should_fail.cold+0xa/0xf [ 306.939452] ? setup_fault_attr+0x200/0x200 [ 306.943860] ? __lock_acquire+0x6de/0x3ff0 [ 306.948100] __should_failslab+0x115/0x180 [ 306.952338] should_failslab+0x5/0x10 [ 306.956145] __kmalloc+0x2ab/0x3c0 [ 306.959684] ? ext4_find_extent+0x9bb/0xc70 [ 306.964009] ext4_find_extent+0x9bb/0xc70 [ 306.968167] ext4_ext_map_blocks+0x1c0/0x7390 [ 306.972673] ? __lock_acquire+0x6de/0x3ff0 [ 306.976916] ? __lock_acquire+0x6de/0x3ff0 [ 306.981153] ? mark_held_locks+0xf0/0xf0 [ 306.985215] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 306.990593] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 306.995784] ? mark_held_locks+0xf0/0xf0 [ 306.999846] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 307.004691] ? ext4_es_lookup_extent+0x375/0xb60 [ 307.009453] ? lock_downgrade+0x720/0x720 [ 307.013596] ? lock_acquire+0x170/0x3c0 [ 307.017574] ? check_preemption_disabled+0x41/0x280 [ 307.022602] ? lock_acquire+0x170/0x3c0 [ 307.026579] ? ext4_map_blocks+0x33e/0x1a50 [ 307.030913] ext4_map_blocks+0xd88/0x1a50 [ 307.035081] ? check_preemption_disabled+0x41/0x280 [ 307.040104] ? ext4_issue_zeroout+0x160/0x160 [ 307.044605] ? __brelse+0x84/0xa0 [ 307.048281] ? __ext4_new_inode+0x2eb/0x5a20 [ 307.052698] ext4_getblk+0xad/0x4f0 [ 307.056336] ? ext4_iomap_begin+0xe00/0xe00 [ 307.060670] ? ext4_free_inode+0x1780/0x1780 [ 307.065081] ? debug_check_no_obj_freed+0x201/0x490 [ 307.070097] ? __dquot_initialize+0x298/0xb70 [ 307.074596] ext4_bread+0x7c/0x210 [ 307.078133] ? ext4_getblk+0x4f0/0x4f0 [ 307.082024] ? dquot_initialize_needed+0x290/0x290 [ 307.086959] ? trace_hardirqs_off+0x64/0x200 [ 307.091377] ext4_append+0x155/0x370 [ 307.095094] ext4_mkdir+0x5bd/0xe10 [ 307.098729] ? ext4_init_dot_dotdot+0x600/0x600 [ 307.103398] ? generic_permission+0x116/0x4d0 [ 307.107895] ? inode_permission.part.0+0x10c/0x450 [ 307.112828] vfs_mkdir+0x508/0x7a0 [ 307.116374] do_mkdirat+0x262/0x2d0 [ 307.120002] ? __ia32_sys_mknod+0x120/0x120 [ 307.124329] ? trace_hardirqs_off_caller+0x6e/0x210 [ 307.129342] ? do_syscall_64+0x21/0x620 [ 307.133315] do_syscall_64+0xf9/0x620 [ 307.137123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.142309] RIP: 0033:0x7fb10938a1f7 [ 307.146022] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 307.164924] RSP: 002b:00007fb107cfff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 307.172641] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb10938a1f7 [ 307.179908] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c 17:19:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 4) [ 307.187174] RBP: 00007fb107d001d0 R08: 0000000000000000 R09: 00007fb107d001d0 [ 307.194443] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 307.201717] R13: 0000000020000100 R14: 00007fb107cfffe0 R15: 0000000020000180 17:19:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 307.281326] erofs: unmounted for /dev/loop5 [ 307.286537] erofs: read_super, device -> /dev/loop0 [ 307.318669] erofs: options -> 17:19:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 307.336251] erofs: root inode @ nid 36 [ 307.348091] erofs: bogus i_mode (0) @ nid 36 [ 307.348218] FAULT_INJECTION: forcing a failure. [ 307.348218] name failslab, interval 1, probability 0, space 0, times 0 [ 307.390679] CPU: 1 PID: 20801 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 307.398580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.407931] Call Trace: [ 307.410523] dump_stack+0x1fc/0x2ef [ 307.414157] should_fail.cold+0xa/0xf [ 307.417964] ? setup_fault_attr+0x200/0x200 [ 307.422290] ? lock_acquire+0x170/0x3c0 [ 307.426273] __should_failslab+0x115/0x180 [ 307.430514] should_failslab+0x5/0x10 [ 307.434320] kmem_cache_alloc+0x277/0x370 [ 307.438469] __alloc_file+0x21/0x340 [ 307.442185] alloc_empty_file+0x6d/0x170 [ 307.446246] alloc_file+0x5e/0x4d0 [ 307.449790] alloc_file_pseudo+0x165/0x250 [ 307.454031] ? alloc_file+0x4d0/0x4d0 [ 307.457831] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 307.463460] ? shmem_get_inode+0x44c/0x8d0 [ 307.467702] __shmem_file_setup.part.0+0x102/0x2b0 [ 307.472636] shmem_file_setup+0x61/0x90 [ 307.476614] __se_sys_memfd_create+0x26b/0x440 [ 307.481198] ? memfd_file_seals_ptr+0x150/0x150 [ 307.485878] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.491241] ? trace_hardirqs_off_caller+0x6e/0x210 [ 307.496309] ? do_syscall_64+0x21/0x620 [ 307.500282] do_syscall_64+0xf9/0x620 [ 307.504090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.509280] RIP: 0033:0x7f7bf18310e9 [ 307.512987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 307.531881] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 307.539587] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18310e9 [ 307.546851] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7bf188a1ee [ 307.554118] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f7bf01a61d0 [ 307.561384] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 307.568653] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 17:19:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 5) [ 307.683037] erofs: read_super, device -> /dev/loop5 [ 307.701000] erofs: read_super, device -> /dev/loop3 [ 307.712306] erofs: options -> fault_injection=0 [ 307.728998] erofs: options -> [ 307.745396] erofs: root inode @ nid 36 [ 307.753543] erofs: FAULT_INJECTION was not selected [ 307.771221] erofs: bogus i_mode (0) @ nid 36 17:19:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 307.800702] FAULT_INJECTION: forcing a failure. [ 307.800702] name failslab, interval 1, probability 0, space 0, times 0 [ 307.836669] erofs: read_super, device -> /dev/loop1 [ 307.846811] erofs: root inode @ nid 36 [ 307.853313] erofs: options -> [ 307.855341] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 307.861997] CPU: 1 PID: 20819 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 307.871266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.880622] Call Trace: [ 307.883219] dump_stack+0x1fc/0x2ef [ 307.886852] should_fail.cold+0xa/0xf [ 307.890660] ? setup_fault_attr+0x200/0x200 [ 307.894982] ? lock_acquire+0x170/0x3c0 [ 307.898975] __should_failslab+0x115/0x180 [ 307.903211] should_failslab+0x5/0x10 [ 307.907014] kmem_cache_alloc_trace+0x284/0x380 [ 307.911690] apparmor_file_alloc_security+0x394/0xad0 [ 307.916895] ? apparmor_file_receive+0x160/0x160 [ 307.921653] ? __alloc_file+0x21/0x340 [ 307.925558] security_file_alloc+0x40/0x90 [ 307.929792] __alloc_file+0xd8/0x340 [ 307.933506] alloc_empty_file+0x6d/0x170 [ 307.937573] alloc_file+0x5e/0x4d0 [ 307.941118] alloc_file_pseudo+0x165/0x250 [ 307.945355] ? alloc_file+0x4d0/0x4d0 [ 307.949154] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 307.954778] ? shmem_get_inode+0x44c/0x8d0 [ 307.959024] __shmem_file_setup.part.0+0x102/0x2b0 [ 307.963958] shmem_file_setup+0x61/0x90 [ 307.967940] __se_sys_memfd_create+0x26b/0x440 [ 307.972613] ? memfd_file_seals_ptr+0x150/0x150 [ 307.977288] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.982651] ? trace_hardirqs_off_caller+0x6e/0x210 [ 307.987671] ? do_syscall_64+0x21/0x620 [ 307.991651] do_syscall_64+0xf9/0x620 [ 307.995462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.000596] erofs: blksize 1 isn't supported on this platform [ 308.000648] RIP: 0033:0x7f7bf18310e9 [ 308.010219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 308.029116] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 308.036823] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18310e9 [ 308.044094] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007f7bf188a1ee 17:19:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 6) [ 308.051371] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007f7bf01a61d0 [ 308.058644] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 308.065918] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000180 [ 308.094702] erofs: read_super, device -> /dev/loop0 [ 308.101154] erofs: options -> [ 308.108172] erofs: root inode @ nid 36 [ 308.113823] erofs: bogus i_mode (0) @ nid 36 17:19:32 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 308.191236] erofs: read_super, device -> /dev/loop2 [ 308.201618] erofs: options -> fault_injection=0 [ 308.212882] erofs: FAULT_INJECTION was not selected [ 308.218632] FAULT_INJECTION: forcing a failure. [ 308.218632] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.222305] erofs: root inode @ nid 36 [ 308.231191] CPU: 0 PID: 20835 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 308.242450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.251812] Call Trace: [ 308.254407] dump_stack+0x1fc/0x2ef [ 308.258052] should_fail.cold+0xa/0xf [ 308.261859] ? lock_acquire+0x170/0x3c0 [ 308.265834] ? setup_fault_attr+0x200/0x200 [ 308.270166] __alloc_pages_nodemask+0x239/0x2890 [ 308.275015] ? __lock_acquire+0x6de/0x3ff0 [ 308.276941] erofs: read_super, device -> /dev/loop3 [ 308.279257] ? static_obj+0x50/0x50 [ 308.279280] ? __lock_acquire+0x6de/0x3ff0 [ 308.279298] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 308.284537] erofs: options -> [ 308.287916] ? __lock_acquire+0x6de/0x3ff0 [ 308.287942] ? mark_held_locks+0xf0/0xf0 [ 308.287957] ? unwind_next_frame+0xeee/0x1400 [ 308.287972] ? mark_held_locks+0xf0/0xf0 [ 308.287985] ? deref_stack_reg+0x134/0x1d0 [ 308.287995] ? get_reg+0x176/0x1f0 [ 308.288013] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 308.304169] erofs: root inode @ nid 36 [ 308.304461] alloc_pages_vma+0xf2/0x780 [ 308.338466] shmem_alloc_page+0x11c/0x1f0 [ 308.339354] erofs: bogus i_mode (0) @ nid 36 [ 308.342619] ? shmem_swapin+0x220/0x220 [ 308.342655] ? percpu_counter_add_batch+0x126/0x180 [ 308.342671] ? __vm_enough_memory+0x316/0x650 [ 308.360532] shmem_alloc_and_acct_page+0x15a/0x850 [ 308.365479] shmem_getpage_gfp+0x4e9/0x37f0 [ 308.369825] ? shmem_alloc_and_acct_page+0x850/0x850 [ 308.374938] ? mark_held_locks+0xa6/0xf0 [ 308.379012] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 308.384202] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 308.389385] shmem_write_begin+0xff/0x1e0 [ 308.393527] generic_perform_write+0x1f8/0x4d0 [ 308.398102] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 308.402760] ? current_time+0x1c0/0x1c0 [ 308.406723] ? lock_acquire+0x170/0x3c0 [ 308.410684] __generic_file_write_iter+0x24b/0x610 [ 308.415602] generic_file_write_iter+0x3f8/0x730 [ 308.420349] __vfs_write+0x51b/0x770 [ 308.424053] ? kernel_read+0x110/0x110 [ 308.427934] ? check_preemption_disabled+0x41/0x280 [ 308.432940] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 308.437943] vfs_write+0x1f3/0x540 [ 308.441473] __x64_sys_pwrite64+0x1f7/0x250 [ 308.445781] ? ksys_pwrite64+0x1a0/0x1a0 [ 308.449835] ? trace_hardirqs_off_caller+0x6e/0x210 [ 308.454838] ? do_syscall_64+0x21/0x620 [ 308.458801] do_syscall_64+0xf9/0x620 [ 308.462593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.467765] RIP: 0033:0x7f7bf17e40b7 [ 308.471462] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 308.490347] RSP: 002b:00007f7bf01a5f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 308.498040] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf17e40b7 [ 308.505292] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 308.512544] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 308.519800] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 308.527054] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 308.534939] erofs: unmounted for /dev/loop5 17:19:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 308.541444] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 308.577854] erofs: read_super, device -> /dev/loop0 [ 308.587725] erofs: read_super, device -> /dev/loop1 17:19:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:32 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 308.594173] erofs: options -> [ 308.597941] erofs: options -> [ 308.603686] erofs: root inode @ nid 36 [ 308.609094] erofs: blksize 1 isn't supported on this platform [ 308.615771] erofs: bogus i_mode (0) @ nid 36 17:19:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 308.709993] erofs: read_super, device -> /dev/loop4 [ 308.715190] erofs: unmounted for /dev/loop2 [ 308.719774] erofs: options -> fault_injection=0 [ 308.724835] erofs: cannot find valid erofs superblock 17:19:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 7) [ 308.789255] erofs: read_super, device -> /dev/loop5 [ 308.798970] erofs: options -> fault_injection=0 [ 308.803934] erofs: FAULT_INJECTION was not selected [ 308.811294] erofs: root inode @ nid 36 [ 308.815361] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 308.858248] erofs: read_super, device -> /dev/loop0 [ 308.860874] erofs: read_super, device -> /dev/loop1 [ 308.863286] erofs: options -> [ 308.868454] erofs: unmounted for /dev/loop5 [ 308.872982] erofs: root inode @ nid 36 [ 308.885149] erofs: bogus i_mode (0) @ nid 36 [ 308.902346] erofs: options -> [ 308.911483] erofs: read_super, device -> /dev/loop2 [ 308.919170] erofs: blksize 1 isn't supported on this platform [ 308.928581] erofs: read_super, device -> /dev/loop3 [ 308.930160] FAULT_INJECTION: forcing a failure. [ 308.930160] name failslab, interval 1, probability 0, space 0, times 0 [ 308.933606] erofs: options -> [ 308.949558] erofs: options -> fault_injection=0 [ 308.949573] erofs: root inode @ nid 36 [ 308.959924] erofs: FAULT_INJECTION was not selected [ 308.965637] erofs: root inode @ nid 36 [ 308.970290] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 308.981939] CPU: 1 PID: 20881 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 308.989830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.999184] Call Trace: [ 309.001783] dump_stack+0x1fc/0x2ef [ 309.005426] should_fail.cold+0xa/0xf 17:19:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9903, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 309.009243] ? setup_fault_attr+0x200/0x200 [ 309.011449] erofs: bogus i_mode (0) @ nid 36 [ 309.013562] ? lock_acquire+0x170/0x3c0 [ 309.013586] __should_failslab+0x115/0x180 [ 309.013604] should_failslab+0x5/0x10 [ 309.013620] kmem_cache_alloc+0x277/0x370 [ 309.034102] getname_flags+0xce/0x590 [ 309.037899] do_sys_open+0x26c/0x520 [ 309.041609] ? filp_open+0x70/0x70 [ 309.045133] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.050487] ? trace_hardirqs_off_caller+0x6e/0x210 [ 309.060007] ? do_syscall_64+0x21/0x620 [ 309.063985] do_syscall_64+0xf9/0x620 [ 309.067793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.072989] RIP: 0033:0x7f7bf17e4004 [ 309.076703] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 309.095943] RSP: 002b:00007f7bf01a5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 309.103642] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf17e4004 17:19:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 8) 17:19:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 309.110895] RDX: 0000000000000002 RSI: 00007f7bf01a5fe0 RDI: 00000000ffffff9c [ 309.118157] RBP: 00007f7bf01a5fe0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 309.125428] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 309.132692] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 309.190184] erofs: unmounted for /dev/loop2 [ 309.206973] erofs: read_super, device -> /dev/loop5 [ 309.213051] erofs: options -> fault_injection=0 [ 309.222046] erofs: FAULT_INJECTION was not selected [ 309.232621] erofs: root inode @ nid 36 [ 309.237733] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 309.242773] FAULT_INJECTION: forcing a failure. [ 309.242773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.256190] CPU: 0 PID: 20894 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 309.264056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.273394] Call Trace: [ 309.275975] dump_stack+0x1fc/0x2ef [ 309.279591] should_fail.cold+0xa/0xf [ 309.283376] ? setup_fault_attr+0x200/0x200 [ 309.287679] ? do_writepages+0x290/0x290 [ 309.291722] ? unlock_page+0x13d/0x230 [ 309.295593] __alloc_pages_nodemask+0x239/0x2890 [ 309.300335] ? lock_downgrade+0x720/0x720 [ 309.304467] ? check_preemption_disabled+0x41/0x280 [ 309.309464] ? __lock_acquire+0x6de/0x3ff0 [ 309.313686] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 309.318508] ? lock_downgrade+0x720/0x720 [ 309.322637] ? lock_acquire+0x170/0x3c0 [ 309.326610] ? up_write+0x18/0x150 [ 309.330140] ? generic_file_write_iter+0x381/0x730 [ 309.335048] ? iov_iter_init+0xb8/0x1d0 [ 309.339012] cache_grow_begin+0xa4/0x8a0 [ 309.343058] ? setup_fault_attr+0x200/0x200 [ 309.347375] ? lock_acquire+0x170/0x3c0 [ 309.351333] cache_alloc_refill+0x273/0x340 [ 309.355657] kmem_cache_alloc+0x346/0x370 [ 309.359804] getname_flags+0xce/0x590 [ 309.363593] do_sys_open+0x26c/0x520 [ 309.367286] ? filp_open+0x70/0x70 [ 309.370821] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.376172] ? trace_hardirqs_off_caller+0x6e/0x210 [ 309.381170] ? do_syscall_64+0x21/0x620 [ 309.385123] do_syscall_64+0xf9/0x620 [ 309.388909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.394081] RIP: 0033:0x7f7bf17e4004 [ 309.397779] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 309.416662] RSP: 002b:00007f7bf01a5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 309.424352] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf17e4004 [ 309.431601] RDX: 0000000000000002 RSI: 00007f7bf01a5fe0 RDI: 00000000ffffff9c [ 309.438849] RBP: 00007f7bf01a5fe0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 309.446096] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 309.453344] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 309.509643] erofs: read_super, device -> /dev/loop1 [ 309.515738] erofs: read_super, device -> /dev/loop4 [ 309.525347] erofs: options -> [ 309.534260] erofs: unmounted for /dev/loop5 [ 309.539904] erofs: options -> fault_injection=0 [ 309.541990] erofs: blksize 1 isn't supported on this platform [ 309.554343] erofs: FAULT_INJECTION was not selected 17:19:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 309.571824] erofs: root inode @ nid 36 [ 309.576613] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 309.607058] erofs: read_super, device -> /dev/loop3 [ 309.616171] erofs: options -> 17:19:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 9) [ 309.620901] erofs: root inode @ nid 36 [ 309.625008] erofs: bogus i_mode (0) @ nid 36 [ 309.645711] erofs: unmounted for /dev/loop4 [ 309.667342] erofs: read_super, device -> /dev/loop2 17:19:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 309.667842] erofs: read_super, device -> /dev/loop0 [ 309.672807] erofs: options -> fault_injection=0 [ 309.696140] erofs: options -> [ 309.699560] erofs: FAULT_INJECTION was not selected [ 309.705931] erofs: root inode @ nid 36 [ 309.711114] erofs: root inode @ nid 36 [ 309.714914] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 309.721878] erofs: bogus i_mode (0) @ nid 36 17:19:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9a03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 309.781933] erofs: read_super, device -> /dev/loop5 [ 309.797057] erofs: read_super, device -> /dev/loop1 [ 309.803972] erofs: options -> fault_injection=0 [ 309.808994] erofs: options -> [ 309.823453] erofs: unmounted for /dev/loop2 [ 309.829015] erofs: blksize 1 isn't supported on this platform [ 309.829165] erofs: FAULT_INJECTION was not selected [ 309.855390] erofs: root inode @ nid 36 [ 309.860316] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 309.861020] FAULT_INJECTION: forcing a failure. [ 309.861020] name failslab, interval 1, probability 0, space 0, times 0 [ 309.882060] CPU: 1 PID: 20935 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 309.889950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.899303] Call Trace: [ 309.901906] dump_stack+0x1fc/0x2ef [ 309.905542] should_fail.cold+0xa/0xf [ 309.909342] ? setup_fault_attr+0x200/0x200 [ 309.913658] ? lock_acquire+0x170/0x3c0 [ 309.917730] __should_failslab+0x115/0x180 [ 309.921959] should_failslab+0x5/0x10 [ 309.925740] kmem_cache_alloc+0x277/0x370 [ 309.929884] __alloc_file+0x21/0x340 [ 309.933588] alloc_empty_file+0x6d/0x170 [ 309.937634] path_openat+0xe9/0x2df0 [ 309.941330] ? __lock_acquire+0x6de/0x3ff0 [ 309.945549] ? path_lookupat+0x8d0/0x8d0 [ 309.949693] ? mark_held_locks+0xf0/0xf0 [ 309.953750] do_filp_open+0x18c/0x3f0 [ 309.957534] ? may_open_dev+0xf0/0xf0 [ 309.961318] ? __alloc_fd+0x28d/0x570 [ 309.965119] ? lock_downgrade+0x720/0x720 [ 309.969266] ? lock_acquire+0x170/0x3c0 [ 309.973238] ? __alloc_fd+0x34/0x570 [ 309.976935] ? do_raw_spin_unlock+0x171/0x230 [ 309.981419] ? _raw_spin_unlock+0x29/0x40 [ 309.985547] ? __alloc_fd+0x28d/0x570 [ 309.989347] do_sys_open+0x3b3/0x520 [ 309.993053] ? filp_open+0x70/0x70 [ 309.996587] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.001933] ? trace_hardirqs_off_caller+0x6e/0x210 [ 310.006941] ? do_syscall_64+0x21/0x620 [ 310.010921] do_syscall_64+0xf9/0x620 [ 310.014715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.019894] RIP: 0033:0x7f7bf17e4004 [ 310.023600] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 310.042487] RSP: 002b:00007f7bf01a5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 310.050200] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf17e4004 [ 310.057463] RDX: 0000000000000002 RSI: 00007f7bf01a5fe0 RDI: 00000000ffffff9c [ 310.064713] RBP: 00007f7bf01a5fe0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 310.071973] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 17:19:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 10) [ 310.079235] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 310.110506] erofs: read_super, device -> /dev/loop3 [ 310.123280] erofs: options -> [ 310.147791] erofs: unmounted for /dev/loop5 [ 310.149772] erofs: root inode @ nid 36 [ 310.156600] erofs: read_super, device -> /dev/loop2 [ 310.161622] erofs: options -> fault_injection=0 [ 310.167014] erofs: bogus i_mode (0) @ nid 36 [ 310.170396] erofs: read_super, device -> /dev/loop0 [ 310.177657] erofs: options -> [ 310.181220] erofs: FAULT_INJECTION was not selected [ 310.188393] FAULT_INJECTION: forcing a failure. [ 310.188393] name failslab, interval 1, probability 0, space 0, times 0 [ 310.192691] erofs: root inode @ nid 36 [ 310.200530] CPU: 1 PID: 20949 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 310.211457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.214247] erofs: root inode @ nid 36 [ 310.220803] Call Trace: [ 310.220825] dump_stack+0x1fc/0x2ef [ 310.220844] should_fail.cold+0xa/0xf [ 310.220861] ? setup_fault_attr+0x200/0x200 [ 310.220878] ? lock_acquire+0x170/0x3c0 [ 310.231100] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 310.234706] __should_failslab+0x115/0x180 [ 310.234722] should_failslab+0x5/0x10 [ 310.234738] kmem_cache_alloc_trace+0x284/0x380 [ 310.262307] apparmor_file_alloc_security+0x394/0xad0 [ 310.267507] ? apparmor_file_receive+0x160/0x160 [ 310.272272] ? __alloc_file+0x21/0x340 [ 310.276168] security_file_alloc+0x40/0x90 [ 310.280409] __alloc_file+0xd8/0x340 [ 310.280540] erofs: bogus i_mode (0) @ nid 36 [ 310.284131] alloc_empty_file+0x6d/0x170 [ 310.284152] path_openat+0xe9/0x2df0 [ 310.296283] ? __lock_acquire+0x6de/0x3ff0 [ 310.300512] ? path_lookupat+0x8d0/0x8d0 [ 310.304571] ? mark_held_locks+0xf0/0xf0 [ 310.308640] do_filp_open+0x18c/0x3f0 [ 310.312439] ? may_open_dev+0xf0/0xf0 [ 310.316241] ? __alloc_fd+0x28d/0x570 [ 310.320032] ? lock_downgrade+0x720/0x720 [ 310.324160] ? lock_acquire+0x170/0x3c0 [ 310.328126] ? __alloc_fd+0x34/0x570 [ 310.331840] ? do_raw_spin_unlock+0x171/0x230 [ 310.336330] ? _raw_spin_unlock+0x29/0x40 [ 310.340458] ? __alloc_fd+0x28d/0x570 [ 310.344244] do_sys_open+0x3b3/0x520 [ 310.347951] ? filp_open+0x70/0x70 [ 310.351486] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.356831] ? trace_hardirqs_off_caller+0x6e/0x210 [ 310.361826] ? do_syscall_64+0x21/0x620 [ 310.365781] do_syscall_64+0xf9/0x620 [ 310.369577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.374755] RIP: 0033:0x7f7bf17e4004 [ 310.378448] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 310.397329] RSP: 002b:00007f7bf01a5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 17:19:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 11) 17:19:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 310.405017] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf17e4004 [ 310.412266] RDX: 0000000000000002 RSI: 00007f7bf01a5fe0 RDI: 00000000ffffff9c [ 310.419525] RBP: 00007f7bf01a5fe0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 310.426783] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 310.434043] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 310.444455] erofs: unmounted for /dev/loop2 17:19:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 310.518956] erofs: read_super, device -> /dev/loop1 [ 310.524054] erofs: options -> [ 310.528834] erofs: blksize 1 isn't supported on this platform 17:19:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3d8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 310.566478] FAULT_INJECTION: forcing a failure. [ 310.566478] name failslab, interval 1, probability 0, space 0, times 0 [ 310.589725] CPU: 0 PID: 20965 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 310.597628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.606966] Call Trace: [ 310.609541] dump_stack+0x1fc/0x2ef [ 310.613152] should_fail.cold+0xa/0xf [ 310.616934] ? setup_fault_attr+0x200/0x200 [ 310.621239] ? lock_acquire+0x170/0x3c0 [ 310.625204] __should_failslab+0x115/0x180 [ 310.629426] should_failslab+0x5/0x10 [ 310.633225] kmem_cache_alloc_trace+0x284/0x380 [ 310.637888] ? loop_info64_to_compat+0x5e0/0x5e0 [ 310.642627] __kthread_create_on_node+0xd2/0x410 [ 310.647367] ? kthread_parkme+0xa0/0xa0 [ 310.651321] ? lock_acquire+0x170/0x3c0 [ 310.655288] ? lo_ioctl+0x1bb/0x20e0 [ 310.658989] ? __mutex_lock+0x368/0x1190 [ 310.663038] ? lock_downgrade+0x720/0x720 [ 310.667165] ? check_preemption_disabled+0x41/0x280 [ 310.672164] ? loop_info64_to_compat+0x5e0/0x5e0 [ 310.676903] kthread_create_on_node+0xbb/0xf0 [ 310.681384] ? __kthread_create_on_node+0x410/0x410 [ 310.686382] ? __fget+0x356/0x510 [ 310.689828] ? do_dup2+0x450/0x450 [ 310.693351] ? __lockdep_init_map+0x100/0x5a0 [ 310.697826] ? __lockdep_init_map+0x100/0x5a0 [ 310.702304] lo_ioctl+0xae5/0x20e0 [ 310.705828] ? loop_set_status64+0x110/0x110 [ 310.710217] blkdev_ioctl+0x5cb/0x1a80 [ 310.714087] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.719438] ? blkpg_ioctl+0x9d0/0x9d0 [ 310.723316] ? mark_held_locks+0xf0/0xf0 [ 310.727364] ? mark_held_locks+0xf0/0xf0 [ 310.731424] ? debug_check_no_obj_freed+0x201/0x490 [ 310.736426] ? lock_downgrade+0x720/0x720 [ 310.740555] block_ioctl+0xe9/0x130 [ 310.744162] ? blkdev_fallocate+0x3f0/0x3f0 [ 310.748465] do_vfs_ioctl+0xcdb/0x12e0 [ 310.752344] ? lock_downgrade+0x720/0x720 [ 310.756481] ? check_preemption_disabled+0x41/0x280 [ 310.761485] ? ioctl_preallocate+0x200/0x200 [ 310.765878] ? __fget+0x356/0x510 [ 310.769316] ? do_dup2+0x450/0x450 [ 310.772837] ? do_sys_open+0x2bf/0x520 [ 310.776722] ksys_ioctl+0x9b/0xc0 [ 310.780160] __x64_sys_ioctl+0x6f/0xb0 [ 310.784129] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 310.788698] do_syscall_64+0xf9/0x620 [ 310.792486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.797662] RIP: 0033:0x7f7bf1830ea7 [ 310.801363] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 310.820246] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.827931] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 310.835184] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 310.842433] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 310.849684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 310.856944] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 12) [ 310.904151] erofs: read_super, device -> /dev/loop2 [ 310.904194] erofs: read_super, device -> /dev/loop5 [ 310.909611] erofs: options -> fault_injection=0 [ 310.914664] erofs: read_super, device -> /dev/loop0 [ 310.924553] erofs: read_super, device -> /dev/loop3 [ 310.925262] erofs: options -> [ 310.933960] erofs: options -> [ 310.939225] erofs: options -> fault_injection=0 [ 310.954812] erofs: root inode @ nid 36 [ 310.959084] erofs: FAULT_INJECTION was not selected [ 310.963798] erofs: root inode @ nid 36 [ 310.968471] erofs: FAULT_INJECTION was not selected [ 310.977788] erofs: bogus i_mode (0) @ nid 36 [ 310.980449] erofs: read_super, device -> /dev/loop1 [ 310.984784] erofs: root inode @ nid 36 [ 310.992952] erofs: root inode @ nid 36 [ 310.993794] erofs: bogus i_mode (0) @ nid 36 17:19:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 311.005992] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 311.007461] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 311.015881] erofs: options -> [ 311.023520] erofs: blksize 1 isn't supported on this platform [ 311.067436] FAULT_INJECTION: forcing a failure. [ 311.067436] name failslab, interval 1, probability 0, space 0, times 0 [ 311.079339] CPU: 1 PID: 20986 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 311.087219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.096561] Call Trace: [ 311.099152] dump_stack+0x1fc/0x2ef [ 311.102774] should_fail.cold+0xa/0xf [ 311.106578] ? setup_fault_attr+0x200/0x200 [ 311.110899] ? lock_acquire+0x170/0x3c0 [ 311.114876] __should_failslab+0x115/0x180 [ 311.119107] should_failslab+0x5/0x10 [ 311.122910] kmem_cache_alloc+0x277/0x370 [ 311.127051] __kernfs_new_node+0xd2/0x680 [ 311.131206] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 311.135952] ? _raw_spin_unlock_irq+0x5a/0x80 [ 311.140440] ? __cpu_to_node+0x7b/0xa0 [ 311.144325] ? mark_held_locks+0xf0/0xf0 [ 311.148384] ? io_schedule_timeout+0x140/0x140 [ 311.152955] ? enqueue_entity+0xf86/0x3850 [ 311.157185] ? set_user_nice.part.0+0x3b9/0xab0 [ 311.161847] kernfs_create_dir_ns+0x9e/0x230 [ 311.166251] internal_create_group+0x1c1/0xb20 [ 311.170829] ? sysfs_remove_link_from_group+0x70/0x70 [ 311.176005] ? lock_downgrade+0x720/0x720 [ 311.180162] lo_ioctl+0xf7c/0x20e0 [ 311.183695] ? loop_set_status64+0x110/0x110 [ 311.188086] blkdev_ioctl+0x5cb/0x1a80 [ 311.191962] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.197326] ? blkpg_ioctl+0x9d0/0x9d0 [ 311.201204] ? mark_held_locks+0xf0/0xf0 [ 311.205255] ? mark_held_locks+0xf0/0xf0 [ 311.209317] ? debug_check_no_obj_freed+0x201/0x490 [ 311.214327] ? lock_downgrade+0x720/0x720 [ 311.218471] block_ioctl+0xe9/0x130 [ 311.222088] ? blkdev_fallocate+0x3f0/0x3f0 [ 311.226402] do_vfs_ioctl+0xcdb/0x12e0 [ 311.230280] ? lock_downgrade+0x720/0x720 [ 311.234414] ? check_preemption_disabled+0x41/0x280 [ 311.239441] ? ioctl_preallocate+0x200/0x200 [ 311.243844] ? __fget+0x356/0x510 [ 311.247298] ? do_dup2+0x450/0x450 [ 311.250830] ? do_sys_open+0x2bf/0x520 [ 311.254719] ksys_ioctl+0x9b/0xc0 [ 311.258176] __x64_sys_ioctl+0x6f/0xb0 [ 311.262053] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 311.266626] do_syscall_64+0xf9/0x620 [ 311.270421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.275593] RIP: 0033:0x7f7bf1830ea7 [ 311.279293] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 311.298189] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.305893] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 311.313146] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.320404] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 311.327667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 311.334926] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 311.392349] erofs: read_super, device -> /dev/loop4 [ 311.412338] erofs: options -> fault_injection=0 [ 311.425488] erofs: FAULT_INJECTION was not selected [ 311.435185] erofs: unmounted for /dev/loop2 17:19:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9c03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9103, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 311.444031] erofs: root inode @ nid 36 [ 311.456732] erofs: unmounted for /dev/loop5 [ 311.465570] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 13) [ 311.513541] erofs: read_super, device -> /dev/loop3 [ 311.514455] erofs: read_super, device -> /dev/loop0 [ 311.529804] erofs: options -> [ 311.537801] erofs: options -> [ 311.541594] erofs: unmounted for /dev/loop4 [ 311.544673] erofs: read_super, device -> /dev/loop2 [ 311.551403] erofs: read_super, device -> /dev/loop1 [ 311.557731] erofs: options -> [ 311.561322] erofs: root inode @ nid 36 [ 311.561394] erofs: root inode @ nid 36 [ 311.569964] erofs: blksize 1 isn't supported on this platform [ 311.576971] erofs: bogus i_mode (0) @ nid 36 [ 311.581940] erofs: options -> fault_injection=0 [ 311.587805] erofs: bogus i_mode (0) @ nid 36 [ 311.588108] erofs: FAULT_INJECTION was not selected 17:19:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 311.616459] erofs: root inode @ nid 36 [ 311.620595] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9d03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 311.702586] FAULT_INJECTION: forcing a failure. [ 311.702586] name failslab, interval 1, probability 0, space 0, times 0 [ 311.713928] erofs: unmounted for /dev/loop2 [ 311.713964] CPU: 1 PID: 21020 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 311.726116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.735456] Call Trace: [ 311.738037] dump_stack+0x1fc/0x2ef [ 311.741652] should_fail.cold+0xa/0xf [ 311.745440] ? setup_fault_attr+0x200/0x200 [ 311.749748] ? lock_acquire+0x170/0x3c0 [ 311.753713] __should_failslab+0x115/0x180 [ 311.757934] should_failslab+0x5/0x10 [ 311.761719] kmem_cache_alloc+0x277/0x370 [ 311.765856] __kernfs_new_node+0xd2/0x680 [ 311.769992] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 311.774731] ? kernfs_activate+0x2c/0x1d0 [ 311.778863] ? lock_downgrade+0x720/0x720 [ 311.782997] ? kernfs_add_one+0x51/0x4c0 [ 311.787042] ? mutex_trylock+0x1a0/0x1a0 [ 311.791095] ? __mutex_unlock_slowpath+0xea/0x610 [ 311.795927] kernfs_new_node+0x92/0x120 [ 311.799893] __kernfs_create_file+0x51/0x340 [ 311.804296] sysfs_add_file_mode_ns+0x226/0x540 [ 311.808958] internal_create_group+0x355/0xb20 [ 311.813529] ? sysfs_remove_link_from_group+0x70/0x70 [ 311.818721] ? lock_downgrade+0x720/0x720 [ 311.822887] lo_ioctl+0xf7c/0x20e0 [ 311.826423] ? loop_set_status64+0x110/0x110 [ 311.830818] blkdev_ioctl+0x5cb/0x1a80 [ 311.834703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.840056] ? blkpg_ioctl+0x9d0/0x9d0 [ 311.843934] ? mark_held_locks+0xf0/0xf0 [ 311.847996] ? mark_held_locks+0xf0/0xf0 [ 311.852146] ? debug_check_no_obj_freed+0x201/0x490 [ 311.857157] ? lock_downgrade+0x720/0x720 [ 311.861307] block_ioctl+0xe9/0x130 [ 311.864926] ? blkdev_fallocate+0x3f0/0x3f0 [ 311.869240] do_vfs_ioctl+0xcdb/0x12e0 [ 311.873121] ? lock_downgrade+0x720/0x720 [ 311.877262] ? check_preemption_disabled+0x41/0x280 [ 311.882313] ? ioctl_preallocate+0x200/0x200 [ 311.886714] ? __fget+0x356/0x510 [ 311.890160] ? do_dup2+0x450/0x450 [ 311.893686] ? do_sys_open+0x2bf/0x520 [ 311.897565] ksys_ioctl+0x9b/0xc0 [ 311.901011] __x64_sys_ioctl+0x6f/0xb0 [ 311.904893] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 311.909463] do_syscall_64+0xf9/0x620 [ 311.913261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.918442] RIP: 0033:0x7f7bf1830ea7 [ 311.922142] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 311.941025] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.948723] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 311.955979] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.963236] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 311.970491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 311.977746] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 312.035337] erofs: read_super, device -> /dev/loop5 [ 312.040832] erofs: options -> fault_injection=0 [ 312.050085] erofs: FAULT_INJECTION was not selected [ 312.055251] erofs: root inode @ nid 36 [ 312.068547] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd803, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 312.098943] erofs: read_super, device -> /dev/loop4 [ 312.101648] erofs: read_super, device -> /dev/loop1 [ 312.103978] erofs: options -> fault_injection=0 [ 312.127941] erofs: FAULT_INJECTION was not selected [ 312.133552] erofs: unmounted for /dev/loop5 [ 312.140364] erofs: options -> [ 312.144173] erofs: root inode @ nid 36 [ 312.147331] erofs: blksize 1 isn't supported on this platform [ 312.164774] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 14) 17:19:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 312.236247] erofs: read_super, device -> /dev/loop2 [ 312.238170] erofs: read_super, device -> /dev/loop3 [ 312.241293] erofs: options -> fault_injection=0 [ 312.258802] erofs: unmounted for /dev/loop4 [ 312.264220] erofs: read_super, device -> /dev/loop5 [ 312.266665] erofs: read_super, device -> /dev/loop0 [ 312.280620] erofs: options -> [ 312.284026] erofs: root inode @ nid 36 [ 312.289998] erofs: bogus i_mode (0) @ nid 36 [ 312.302076] erofs: options -> fault_injection=0 [ 312.303361] erofs: options -> [ 312.310994] erofs: root inode @ nid 36 [ 312.314379] erofs: FAULT_INJECTION was not selected [ 312.315007] erofs: bogus i_mode (0) @ nid 36 [ 312.324738] erofs: FAULT_INJECTION was not selected [ 312.326579] erofs: root inode @ nid 36 [ 312.334234] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 312.335369] erofs: root inode @ nid 36 [ 312.345829] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9e03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 312.419299] erofs: read_super, device -> /dev/loop1 [ 312.424338] erofs: options -> [ 312.434349] erofs: unmounted for /dev/loop5 [ 312.439149] erofs: blksize 1 isn't supported on this platform [ 312.457366] erofs: unmounted for /dev/loop2 17:19:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 312.526909] FAULT_INJECTION: forcing a failure. [ 312.526909] name failslab, interval 1, probability 0, space 0, times 0 [ 312.538492] CPU: 0 PID: 21065 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 312.546369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.555715] Call Trace: [ 312.558290] dump_stack+0x1fc/0x2ef [ 312.561903] should_fail.cold+0xa/0xf [ 312.565688] ? setup_fault_attr+0x200/0x200 [ 312.569990] ? lock_acquire+0x170/0x3c0 [ 312.573945] __should_failslab+0x115/0x180 [ 312.578164] should_failslab+0x5/0x10 [ 312.581952] kmem_cache_alloc+0x277/0x370 [ 312.586088] __kernfs_new_node+0xd2/0x680 [ 312.590232] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 312.594974] ? __mutex_unlock_slowpath+0xea/0x610 [ 312.599796] ? wait_for_completion_io+0x10/0x10 [ 312.604448] ? kernfs_next_descendant_post+0x19c/0x290 [ 312.609709] kernfs_new_node+0x92/0x120 [ 312.613665] __kernfs_create_file+0x51/0x340 [ 312.618058] sysfs_add_file_mode_ns+0x226/0x540 [ 312.622799] internal_create_group+0x355/0xb20 [ 312.627364] ? sysfs_remove_link_from_group+0x70/0x70 [ 312.632532] ? lock_downgrade+0x720/0x720 [ 312.636667] lo_ioctl+0xf7c/0x20e0 [ 312.640189] ? loop_set_status64+0x110/0x110 [ 312.644580] blkdev_ioctl+0x5cb/0x1a80 [ 312.648458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.653801] ? blkpg_ioctl+0x9d0/0x9d0 [ 312.657673] ? mark_held_locks+0xf0/0xf0 [ 312.661713] ? mark_held_locks+0xf0/0xf0 [ 312.665758] ? debug_check_no_obj_freed+0x201/0x490 [ 312.670756] ? lock_downgrade+0x720/0x720 [ 312.674898] block_ioctl+0xe9/0x130 [ 312.678511] ? blkdev_fallocate+0x3f0/0x3f0 [ 312.682831] do_vfs_ioctl+0xcdb/0x12e0 [ 312.686705] ? lock_downgrade+0x720/0x720 [ 312.690843] ? check_preemption_disabled+0x41/0x280 [ 312.695842] ? ioctl_preallocate+0x200/0x200 [ 312.700236] ? __fget+0x356/0x510 [ 312.703671] ? do_dup2+0x450/0x450 [ 312.707206] ? do_sys_open+0x2bf/0x520 [ 312.711079] ksys_ioctl+0x9b/0xc0 [ 312.714513] __x64_sys_ioctl+0x6f/0xb0 [ 312.718382] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 312.722943] do_syscall_64+0xf9/0x620 [ 312.726726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.731903] RIP: 0033:0x7f7bf1830ea7 [ 312.735603] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 312.754491] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.762226] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 312.769480] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 312.776728] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 312.783987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 312.791234] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 312.847557] erofs: read_super, device -> /dev/loop5 [ 312.847561] erofs: read_super, device -> /dev/loop4 [ 312.847571] erofs: options -> fault_injection=0 [ 312.853207] erofs: options -> fault_injection=0 [ 312.881426] erofs: FAULT_INJECTION was not selected [ 312.900438] erofs: root inode @ nid 36 [ 312.914657] erofs: read_super, device -> /dev/loop1 [ 312.915058] erofs: read_super, device -> /dev/loop3 [ 312.925094] erofs: options -> [ 312.928590] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 312.934624] erofs: options -> [ 312.939269] erofs: read_super, device -> /dev/loop0 [ 312.942210] erofs: FAULT_INJECTION was not selected 17:19:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 15) [ 312.944372] erofs: options -> [ 312.944618] erofs: root inode @ nid 36 [ 312.957109] erofs: read_super, device -> /dev/loop2 [ 312.965416] erofs: root inode @ nid 36 [ 312.966184] erofs: options -> fault_injection=0 [ 312.976750] erofs: blksize 1 isn't supported on this platform [ 312.976802] erofs: bogus i_mode (0) @ nid 36 [ 312.987582] erofs: unmounted for /dev/loop4 [ 312.989613] erofs: FAULT_INJECTION was not selected 17:19:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9f03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 312.997069] erofs: root inode @ nid 36 [ 313.002451] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 313.004898] erofs: root inode @ nid 36 [ 313.011616] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 313.018563] erofs: bogus i_mode (0) @ nid 36 [ 313.051042] erofs: unmounted for /dev/loop2 17:19:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 313.115042] erofs: unmounted for /dev/loop5 17:19:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 313.268666] erofs: read_super, device -> /dev/loop0 [ 313.289768] erofs: options -> [ 313.298259] erofs: root inode @ nid 36 [ 313.302682] erofs: bogus i_mode (0) @ nid 36 [ 313.312300] erofs: read_super, device -> /dev/loop2 [ 313.318784] erofs: options -> fault_injection=0 [ 313.324101] erofs: FAULT_INJECTION was not selected [ 313.330685] erofs: root inode @ nid 36 17:19:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa003, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 313.335513] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 313.346751] FAULT_INJECTION: forcing a failure. [ 313.346751] name failslab, interval 1, probability 0, space 0, times 0 [ 313.358723] CPU: 0 PID: 21116 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 313.366603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.375941] Call Trace: [ 313.378523] dump_stack+0x1fc/0x2ef [ 313.382138] should_fail.cold+0xa/0xf [ 313.385932] ? setup_fault_attr+0x200/0x200 [ 313.390242] ? lock_acquire+0x170/0x3c0 [ 313.394266] __should_failslab+0x115/0x180 [ 313.398487] should_failslab+0x5/0x10 [ 313.402265] kmem_cache_alloc+0x277/0x370 [ 313.406403] __kernfs_new_node+0xd2/0x680 [ 313.410533] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 313.415279] ? __mutex_unlock_slowpath+0xea/0x610 [ 313.420191] ? wait_for_completion_io+0x10/0x10 [ 313.424843] ? kernfs_next_descendant_post+0x19c/0x290 [ 313.430103] kernfs_new_node+0x92/0x120 [ 313.434064] __kernfs_create_file+0x51/0x340 [ 313.438456] sysfs_add_file_mode_ns+0x226/0x540 [ 313.443123] internal_create_group+0x355/0xb20 [ 313.447700] ? sysfs_remove_link_from_group+0x70/0x70 [ 313.452884] ? lock_downgrade+0x720/0x720 [ 313.457026] lo_ioctl+0xf7c/0x20e0 [ 313.460548] ? loop_set_status64+0x110/0x110 [ 313.464944] blkdev_ioctl+0x5cb/0x1a80 [ 313.468814] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.474157] ? blkpg_ioctl+0x9d0/0x9d0 [ 313.478023] ? mark_held_locks+0xf0/0xf0 [ 313.482064] ? mark_held_locks+0xf0/0xf0 [ 313.486120] ? debug_check_no_obj_freed+0x201/0x490 [ 313.491128] ? lock_downgrade+0x720/0x720 [ 313.495256] block_ioctl+0xe9/0x130 [ 313.498863] ? blkdev_fallocate+0x3f0/0x3f0 [ 313.503164] do_vfs_ioctl+0xcdb/0x12e0 [ 313.507031] ? lock_downgrade+0x720/0x720 [ 313.511172] ? check_preemption_disabled+0x41/0x280 [ 313.516184] ? ioctl_preallocate+0x200/0x200 [ 313.521008] ? __fget+0x356/0x510 [ 313.524449] ? do_dup2+0x450/0x450 [ 313.527972] ? do_sys_open+0x2bf/0x520 [ 313.531843] ksys_ioctl+0x9b/0xc0 [ 313.535290] __x64_sys_ioctl+0x6f/0xb0 [ 313.539193] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 313.543763] do_syscall_64+0xf9/0x620 [ 313.547549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.552719] RIP: 0033:0x7f7bf1830ea7 [ 313.556412] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 313.575470] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.583161] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 17:19:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 313.590410] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 313.597659] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 313.604907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 313.612155] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 313.639643] erofs: unmounted for /dev/loop2 [ 313.651181] erofs: read_super, device -> /dev/loop4 [ 313.658959] erofs: options -> fault_injection=0 [ 313.667317] erofs: read_super, device -> /dev/loop5 [ 313.672343] erofs: options -> fault_injection=0 [ 313.673429] erofs: read_super, device -> /dev/loop3 [ 313.678956] erofs: read_super, device -> /dev/loop1 [ 313.683189] erofs: options -> [ 313.687431] erofs: FAULT_INJECTION was not selected [ 313.695408] erofs: root inode @ nid 36 [ 313.700417] erofs: options -> [ 313.700970] erofs: root inode @ nid 36 [ 313.704113] erofs: blksize 1 isn't supported on this platform [ 313.721904] erofs: read_super, device -> /dev/loop0 [ 313.725769] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 313.735144] erofs: FAULT_INJECTION was not selected 17:19:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb02, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 313.744112] erofs: options -> [ 313.744938] erofs: root inode @ nid 36 [ 313.751485] erofs: bogus i_mode (0) @ nid 36 [ 313.751703] erofs: root inode @ nid 36 [ 313.762029] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 313.773068] erofs: bogus i_mode (0) @ nid 36 [ 313.784846] erofs: read_super, device -> /dev/loop2 17:19:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:37 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 16) [ 313.791087] erofs: options -> fault_injection=0 [ 313.796810] erofs: unmounted for /dev/loop5 [ 313.798630] erofs: FAULT_INJECTION was not selected [ 313.816356] erofs: root inode @ nid 36 [ 313.820767] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa103, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 313.848566] erofs: unmounted for /dev/loop4 17:19:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 313.938002] erofs: read_super, device -> /dev/loop1 [ 313.953108] erofs: options -> [ 313.964687] erofs: unmounted for /dev/loop2 [ 313.970151] erofs: blksize 1 isn't supported on this platform 17:19:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 314.047932] FAULT_INJECTION: forcing a failure. [ 314.047932] name failslab, interval 1, probability 0, space 0, times 0 [ 314.059499] CPU: 1 PID: 21156 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 314.067386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.076740] Call Trace: [ 314.079332] dump_stack+0x1fc/0x2ef [ 314.082954] should_fail.cold+0xa/0xf [ 314.086748] ? setup_fault_attr+0x200/0x200 [ 314.091065] ? lock_acquire+0x170/0x3c0 [ 314.095039] __should_failslab+0x115/0x180 [ 314.099270] should_failslab+0x5/0x10 [ 314.103064] kmem_cache_alloc+0x277/0x370 [ 314.107210] __kernfs_new_node+0xd2/0x680 [ 314.111360] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 314.116122] ? __mutex_unlock_slowpath+0xea/0x610 [ 314.120971] ? wait_for_completion_io+0x10/0x10 [ 314.125632] ? kernfs_next_descendant_post+0x19c/0x290 [ 314.130893] kernfs_new_node+0x92/0x120 [ 314.134858] __kernfs_create_file+0x51/0x340 [ 314.139265] sysfs_add_file_mode_ns+0x226/0x540 [ 314.143928] internal_create_group+0x355/0xb20 [ 314.148496] ? sysfs_remove_link_from_group+0x70/0x70 [ 314.153668] ? lock_downgrade+0x720/0x720 [ 314.157824] lo_ioctl+0xf7c/0x20e0 [ 314.161357] ? loop_set_status64+0x110/0x110 [ 314.165756] blkdev_ioctl+0x5cb/0x1a80 [ 314.169641] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.174993] ? blkpg_ioctl+0x9d0/0x9d0 [ 314.178870] ? mark_held_locks+0xf0/0xf0 [ 314.182928] ? mark_held_locks+0xf0/0xf0 [ 314.186977] ? debug_check_no_obj_freed+0x201/0x490 [ 314.191977] ? lock_downgrade+0x720/0x720 [ 314.196115] block_ioctl+0xe9/0x130 [ 314.199738] ? blkdev_fallocate+0x3f0/0x3f0 [ 314.204050] do_vfs_ioctl+0xcdb/0x12e0 [ 314.207924] ? lock_downgrade+0x720/0x720 [ 314.212054] ? check_preemption_disabled+0x41/0x280 [ 314.217060] ? ioctl_preallocate+0x200/0x200 [ 314.221475] ? __fget+0x356/0x510 [ 314.224919] ? do_dup2+0x450/0x450 [ 314.228448] ? do_sys_open+0x2bf/0x520 [ 314.232332] ksys_ioctl+0x9b/0xc0 [ 314.235777] __x64_sys_ioctl+0x6f/0xb0 [ 314.239655] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 314.244244] do_syscall_64+0xf9/0x620 [ 314.248033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.253209] RIP: 0033:0x7f7bf1830ea7 [ 314.256913] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 314.275808] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 314.283508] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 314.290770] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 314.298025] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 314.305285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 314.312536] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 314.341757] erofs: read_super, device -> /dev/loop3 [ 314.347249] erofs: options -> [ 314.353882] erofs: read_super, device -> /dev/loop2 [ 314.359536] erofs: read_super, device -> /dev/loop0 [ 314.364914] erofs: read_super, device -> /dev/loop4 [ 314.370713] erofs: read_super, device -> /dev/loop5 [ 314.381919] erofs: options -> [ 314.385266] erofs: options -> fault_injection=0 [ 314.390467] erofs: root inode @ nid 36 [ 314.397296] erofs: options -> fault_injection=0 [ 314.402249] erofs: options -> fault_injection=0 [ 314.412198] erofs: root inode @ nid 36 [ 314.417193] erofs: bogus i_mode (0) @ nid 36 [ 314.422022] erofs: FAULT_INJECTION was not selected [ 314.429613] erofs: FAULT_INJECTION was not selected [ 314.434829] erofs: bogus i_mode (0) @ nid 36 17:19:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 314.440270] erofs: FAULT_INJECTION was not selected [ 314.445629] erofs: root inode @ nid 36 [ 314.450009] erofs: root inode @ nid 36 [ 314.454121] erofs: root inode @ nid 36 [ 314.467853] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 314.475013] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 314.475184] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 314.514716] erofs: read_super, device -> /dev/loop1 17:19:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 17) 17:19:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 314.549382] erofs: options -> [ 314.562677] erofs: read_super, device -> /dev/loop3 [ 314.562901] erofs: unmounted for /dev/loop5 [ 314.568435] erofs: blksize 1 isn't supported on this platform [ 314.584336] erofs: options -> [ 314.590522] erofs: root inode @ nid 36 17:19:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 314.595746] erofs: unmounted for /dev/loop4 [ 314.599688] erofs: bogus i_mode (0) @ nid 36 [ 314.609902] erofs: unmounted for /dev/loop2 [ 314.759628] erofs: read_super, device -> /dev/loop0 [ 314.762880] erofs: read_super, device -> /dev/loop5 [ 314.764666] erofs: options -> [ 314.776070] erofs: root inode @ nid 36 [ 314.785600] erofs: bogus i_mode (0) @ nid 36 17:19:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 314.806738] erofs: options -> fault_injection=0 [ 314.818901] erofs: FAULT_INJECTION was not selected [ 314.824014] erofs: root inode @ nid 36 [ 314.839022] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 314.851274] FAULT_INJECTION: forcing a failure. [ 314.851274] name failslab, interval 1, probability 0, space 0, times 0 [ 314.862754] CPU: 0 PID: 21205 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 314.870629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.879976] Call Trace: [ 314.882562] dump_stack+0x1fc/0x2ef [ 314.886184] should_fail.cold+0xa/0xf [ 314.889979] ? setup_fault_attr+0x200/0x200 [ 314.894282] ? lock_acquire+0x170/0x3c0 [ 314.898253] __should_failslab+0x115/0x180 [ 314.902477] should_failslab+0x5/0x10 [ 314.906265] kmem_cache_alloc+0x277/0x370 [ 314.910412] __kernfs_new_node+0xd2/0x680 [ 314.914554] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 314.919303] ? __mutex_unlock_slowpath+0xea/0x610 [ 314.924138] ? wait_for_completion_io+0x10/0x10 [ 314.928797] ? kernfs_next_descendant_post+0x19c/0x290 [ 314.934084] kernfs_new_node+0x92/0x120 [ 314.938141] __kernfs_create_file+0x51/0x340 [ 314.942535] sysfs_add_file_mode_ns+0x226/0x540 [ 314.947188] internal_create_group+0x355/0xb20 [ 314.951763] ? sysfs_remove_link_from_group+0x70/0x70 [ 314.956938] ? lock_downgrade+0x720/0x720 [ 314.961077] lo_ioctl+0xf7c/0x20e0 [ 314.964609] ? loop_set_status64+0x110/0x110 [ 314.969000] blkdev_ioctl+0x5cb/0x1a80 [ 314.974235] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.979592] ? blkpg_ioctl+0x9d0/0x9d0 [ 314.983474] ? mark_held_locks+0xf0/0xf0 [ 314.987523] ? mark_held_locks+0xf0/0xf0 [ 314.991594] ? debug_check_no_obj_freed+0x201/0x490 [ 314.996619] ? lock_downgrade+0x720/0x720 [ 315.000764] block_ioctl+0xe9/0x130 [ 315.004380] ? blkdev_fallocate+0x3f0/0x3f0 [ 315.008681] do_vfs_ioctl+0xcdb/0x12e0 [ 315.012552] ? lock_downgrade+0x720/0x720 [ 315.016691] ? check_preemption_disabled+0x41/0x280 [ 315.021694] ? ioctl_preallocate+0x200/0x200 [ 315.026115] ? __fget+0x356/0x510 [ 315.029561] ? do_dup2+0x450/0x450 [ 315.033112] ? do_sys_open+0x2bf/0x520 [ 315.037011] ksys_ioctl+0x9b/0xc0 [ 315.040464] __x64_sys_ioctl+0x6f/0xb0 [ 315.044344] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 315.048919] do_syscall_64+0xf9/0x620 [ 315.052711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.057889] RIP: 0033:0x7f7bf1830ea7 [ 315.061588] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 315.080472] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.088170] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 315.095430] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 315.102684] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 315.109934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 315.117195] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 315.127139] erofs: read_super, device -> /dev/loop1 [ 315.132430] erofs: read_super, device -> /dev/loop2 [ 315.137882] erofs: options -> [ 315.141591] erofs: options -> fault_injection=0 [ 315.150005] erofs: blksize 1 isn't supported on this platform [ 315.156501] erofs: read_super, device -> /dev/loop4 17:19:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 315.162199] erofs: FAULT_INJECTION was not selected [ 315.171826] erofs: options -> fault_injection=0 [ 315.178103] erofs: read_super, device -> /dev/loop3 [ 315.178926] erofs: root inode @ nid 36 [ 315.191248] erofs: unmounted for /dev/loop5 [ 315.195240] erofs: options -> [ 315.199108] erofs: FAULT_INJECTION was not selected [ 315.204201] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 315.205059] erofs: root inode @ nid 36 [ 315.211168] erofs: root inode @ nid 36 [ 315.215678] erofs: bogus i_mode (0) @ nid 36 [ 315.235829] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 315.275777] erofs: read_super, device -> /dev/loop0 [ 315.294066] erofs: options -> [ 315.305270] erofs: root inode @ nid 36 [ 315.311321] erofs: bogus i_mode (0) @ nid 36 [ 315.317374] erofs: unmounted for /dev/loop2 17:19:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 18) 17:19:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa403, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 315.394148] erofs: unmounted for /dev/loop4 [ 315.402990] erofs: read_super, device -> /dev/loop1 [ 315.409580] erofs: options -> [ 315.413137] erofs: blksize 1 isn't supported on this platform 17:19:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 315.486852] erofs: read_super, device -> /dev/loop3 [ 315.492119] erofs: read_super, device -> /dev/loop5 [ 315.497576] erofs: options -> [ 315.500981] erofs: options -> fault_injection=0 [ 315.514297] erofs: read_super, device -> /dev/loop2 [ 315.517992] erofs: root inode @ nid 36 [ 315.525905] erofs: bogus i_mode (0) @ nid 36 [ 315.532204] erofs: FAULT_INJECTION was not selected [ 315.548664] erofs: root inode @ nid 36 [ 315.549490] erofs: options -> fault_injection=0 [ 315.561695] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 315.562205] erofs: FAULT_INJECTION was not selected [ 315.579341] erofs: root inode @ nid 36 [ 315.583497] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 315.607234] FAULT_INJECTION: forcing a failure. [ 315.607234] name failslab, interval 1, probability 0, space 0, times 0 [ 315.618762] CPU: 1 PID: 21253 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 315.626650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.636076] Call Trace: [ 315.638665] dump_stack+0x1fc/0x2ef [ 315.642286] should_fail.cold+0xa/0xf [ 315.646086] ? setup_fault_attr+0x200/0x200 [ 315.650394] ? lock_acquire+0x170/0x3c0 [ 315.654365] __should_failslab+0x115/0x180 [ 315.658605] should_failslab+0x5/0x10 [ 315.662396] kmem_cache_alloc+0x277/0x370 [ 315.666530] __kernfs_new_node+0xd2/0x680 [ 315.670657] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 315.675401] ? __mutex_unlock_slowpath+0xea/0x610 [ 315.680241] ? wait_for_completion_io+0x10/0x10 [ 315.684911] ? kernfs_next_descendant_post+0x19c/0x290 [ 315.690182] kernfs_new_node+0x92/0x120 [ 315.694146] __kernfs_create_file+0x51/0x340 [ 315.698551] sysfs_add_file_mode_ns+0x226/0x540 [ 315.703221] internal_create_group+0x355/0xb20 [ 315.707798] ? sysfs_remove_link_from_group+0x70/0x70 [ 315.712969] ? lock_downgrade+0x720/0x720 [ 315.717126] lo_ioctl+0xf7c/0x20e0 [ 315.720929] ? loop_set_status64+0x110/0x110 [ 315.725329] blkdev_ioctl+0x5cb/0x1a80 [ 315.729197] ? blkpg_ioctl+0x9d0/0x9d0 [ 315.733069] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 315.737646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.742393] ? rcu_nmi_exit+0xb3/0x180 [ 315.746260] ? retint_kernel+0x2d/0x2d [ 315.750130] ? blkdev_fallocate+0x3f0/0x3f0 [ 315.754431] block_ioctl+0xe9/0x130 [ 315.758048] ? blkdev_fallocate+0x3f0/0x3f0 [ 315.762374] do_vfs_ioctl+0xcdb/0x12e0 [ 315.766244] ? lock_downgrade+0x720/0x720 [ 315.770459] ? check_preemption_disabled+0x41/0x280 [ 315.775471] ? ioctl_preallocate+0x200/0x200 [ 315.779877] ? __fget+0x356/0x510 [ 315.783320] ? do_dup2+0x450/0x450 [ 315.786840] ? do_sys_open+0x2bf/0x520 [ 315.790710] ksys_ioctl+0x9b/0xc0 [ 315.794145] __x64_sys_ioctl+0x6f/0xb0 [ 315.798022] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 315.802603] do_syscall_64+0xf9/0x620 [ 315.806391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.811560] RIP: 0033:0x7f7bf1830ea7 [ 315.815251] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 315.834222] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.841922] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 315.849183] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:19:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 315.856443] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 315.863704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 315.870958] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1bd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 315.910551] erofs: unmounted for /dev/loop5 [ 315.915261] erofs: read_super, device -> /dev/loop4 [ 315.916335] erofs: read_super, device -> /dev/loop0 [ 315.926316] erofs: read_super, device -> /dev/loop1 [ 315.934541] erofs: options -> [ 315.938198] erofs: options -> [ 315.940320] erofs: options -> fault_injection=0 [ 315.949485] erofs: blksize 1 isn't supported on this platform [ 315.949504] erofs: FAULT_INJECTION was not selected [ 315.965213] erofs: root inode @ nid 36 [ 315.965305] erofs: root inode @ nid 36 [ 315.973803] erofs: bogus i_mode (0) @ nid 36 [ 315.973883] erofs: unmounted for /dev/loop2 17:19:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2403, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 316.009724] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:40 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 19) 17:19:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa503, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 316.127168] erofs: unmounted for /dev/loop4 [ 316.143394] erofs: read_super, device -> /dev/loop3 [ 316.151311] erofs: options -> [ 316.155177] erofs: root inode @ nid 36 [ 316.162217] erofs: bogus i_mode (0) @ nid 36 [ 316.181250] erofs: read_super, device -> /dev/loop5 [ 316.187425] erofs: read_super, device -> /dev/loop1 [ 316.192447] erofs: options -> [ 316.195688] erofs: blksize 1 isn't supported on this platform [ 316.198893] erofs: read_super, device -> /dev/loop0 [ 316.206701] erofs: options -> [ 316.210418] erofs: options -> fault_injection=0 [ 316.214653] erofs: root inode @ nid 36 [ 316.218075] erofs: FAULT_INJECTION was not selected [ 316.219476] erofs: bogus i_mode (0) @ nid 36 17:19:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 316.225315] erofs: root inode @ nid 36 [ 316.233112] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 316.243413] erofs: read_super, device -> /dev/loop2 [ 316.254170] erofs: options -> fault_injection=0 [ 316.261103] erofs: FAULT_INJECTION was not selected [ 316.269299] erofs: root inode @ nid 36 [ 316.273510] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 316.333557] erofs: unmounted for /dev/loop5 17:19:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa603, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2697, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 316.376409] FAULT_INJECTION: forcing a failure. [ 316.376409] name failslab, interval 1, probability 0, space 0, times 0 [ 316.397264] CPU: 1 PID: 21295 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 316.405162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.414506] Call Trace: [ 316.417100] dump_stack+0x1fc/0x2ef [ 316.420733] should_fail.cold+0xa/0xf [ 316.424541] ? setup_fault_attr+0x200/0x200 [ 316.429039] ? lock_acquire+0x170/0x3c0 [ 316.433005] __should_failslab+0x115/0x180 [ 316.437237] should_failslab+0x5/0x10 [ 316.441030] kmem_cache_alloc+0x277/0x370 [ 316.445161] __kernfs_new_node+0xd2/0x680 [ 316.449295] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 316.454035] ? __mutex_unlock_slowpath+0xea/0x610 [ 316.458873] ? wait_for_completion_io+0x10/0x10 [ 316.463534] ? kernfs_next_descendant_post+0x19c/0x290 [ 316.468794] kernfs_new_node+0x92/0x120 [ 316.472753] __kernfs_create_file+0x51/0x340 [ 316.477157] sysfs_add_file_mode_ns+0x226/0x540 [ 316.481820] internal_create_group+0x355/0xb20 [ 316.486387] ? sysfs_remove_link_from_group+0x70/0x70 [ 316.491556] ? lock_downgrade+0x720/0x720 [ 316.495708] lo_ioctl+0xf7c/0x20e0 [ 316.499247] ? loop_set_status64+0x110/0x110 [ 316.503646] blkdev_ioctl+0x5cb/0x1a80 [ 316.507519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.512859] ? blkpg_ioctl+0x9d0/0x9d0 [ 316.516738] ? mark_held_locks+0xf0/0xf0 [ 316.520796] ? mark_held_locks+0xf0/0xf0 [ 316.524839] ? debug_check_no_obj_freed+0x201/0x490 [ 316.529843] ? lock_downgrade+0x720/0x720 [ 316.533972] block_ioctl+0xe9/0x130 [ 316.537585] ? blkdev_fallocate+0x3f0/0x3f0 [ 316.541895] do_vfs_ioctl+0xcdb/0x12e0 [ 316.545763] ? lock_downgrade+0x720/0x720 [ 316.549895] ? check_preemption_disabled+0x41/0x280 [ 316.554979] ? ioctl_preallocate+0x200/0x200 [ 316.559383] ? __fget+0x356/0x510 [ 316.562834] ? do_dup2+0x450/0x450 [ 316.566379] ? do_sys_open+0x2bf/0x520 [ 316.570256] ksys_ioctl+0x9b/0xc0 [ 316.573707] __x64_sys_ioctl+0x6f/0xb0 [ 316.577764] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 316.582497] do_syscall_64+0xf9/0x620 [ 316.586288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.591461] RIP: 0033:0x7f7bf1830ea7 [ 316.595164] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 316.614049] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:19:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 316.621746] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 316.628999] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 316.636253] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 316.643511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 316.650760] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 316.664180] erofs: unmounted for /dev/loop2 [ 316.748785] erofs: read_super, device -> /dev/loop4 [ 316.753827] erofs: options -> fault_injection=0 [ 316.760211] erofs: FAULT_INJECTION was not selected [ 316.765244] erofs: root inode @ nid 36 [ 316.779193] erofs: read_super, device -> /dev/loop3 [ 316.781552] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 316.784220] erofs: options -> 17:19:40 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 20) 17:19:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa703, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 316.794677] erofs: read_super, device -> /dev/loop0 [ 316.798443] erofs: root inode @ nid 36 [ 316.810761] erofs: options -> [ 316.814118] erofs: root inode @ nid 36 [ 316.819405] erofs: bogus i_mode (0) @ nid 36 [ 316.824863] erofs: bogus i_mode (0) @ nid 36 [ 316.842592] erofs: unmounted for /dev/loop4 [ 316.946571] erofs: read_super, device -> /dev/loop1 [ 316.951869] erofs: options -> [ 316.969328] erofs: read_super, device -> /dev/loop2 [ 316.970496] erofs: read_super, device -> /dev/loop5 [ 316.974361] erofs: options -> fault_injection=0 [ 316.990951] erofs: blksize 1 isn't supported on this platform 17:19:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x26aa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 317.011185] erofs: options -> fault_injection=0 [ 317.016737] erofs: FAULT_INJECTION was not selected [ 317.025833] erofs: root inode @ nid 36 [ 317.033224] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 317.041717] erofs: FAULT_INJECTION was not selected [ 317.065269] erofs: read_super, device -> /dev/loop0 [ 317.073531] erofs: options -> [ 317.078817] FAULT_INJECTION: forcing a failure. [ 317.078817] name failslab, interval 1, probability 0, space 0, times 0 [ 317.083626] erofs: root inode @ nid 36 [ 317.094443] erofs: root inode @ nid 36 [ 317.104720] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 317.105332] erofs: bogus i_mode (0) @ nid 36 [ 317.113544] CPU: 0 PID: 21336 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 317.123749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.133164] Call Trace: [ 317.135744] dump_stack+0x1fc/0x2ef [ 317.139370] should_fail.cold+0xa/0xf [ 317.143160] ? setup_fault_attr+0x200/0x200 [ 317.147562] ? lock_acquire+0x170/0x3c0 [ 317.151522] __should_failslab+0x115/0x180 [ 317.155743] should_failslab+0x5/0x10 [ 317.159534] __kmalloc+0x2ab/0x3c0 [ 317.163059] ? kobject_get_path+0xbf/0x240 [ 317.167282] kobject_get_path+0xbf/0x240 [ 317.171327] kobject_uevent_env+0x25c/0x1480 [ 317.175723] lo_ioctl+0xff9/0x20e0 [ 317.179247] ? loop_set_status64+0x110/0x110 [ 317.183651] blkdev_ioctl+0x5cb/0x1a80 [ 317.187535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.192884] ? blkpg_ioctl+0x9d0/0x9d0 [ 317.196764] ? mark_held_locks+0xf0/0xf0 [ 317.200807] ? mark_held_locks+0xf0/0xf0 [ 317.204964] ? debug_check_no_obj_freed+0x201/0x490 [ 317.209964] ? lock_downgrade+0x720/0x720 [ 317.214093] block_ioctl+0xe9/0x130 [ 317.217705] ? blkdev_fallocate+0x3f0/0x3f0 [ 317.222025] do_vfs_ioctl+0xcdb/0x12e0 [ 317.225916] ? lock_downgrade+0x720/0x720 [ 317.230139] ? check_preemption_disabled+0x41/0x280 [ 317.235140] ? ioctl_preallocate+0x200/0x200 [ 317.239532] ? __fget+0x356/0x510 [ 317.242969] ? do_dup2+0x450/0x450 [ 317.246490] ? do_sys_open+0x2bf/0x520 [ 317.250379] ksys_ioctl+0x9b/0xc0 [ 317.253814] __x64_sys_ioctl+0x6f/0xb0 [ 317.257685] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 317.262250] do_syscall_64+0xf9/0x620 [ 317.266036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.271206] RIP: 0033:0x7f7bf1830ea7 [ 317.275072] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 317.293963] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.301662] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 317.308925] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 317.316190] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 317.323456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 317.330718] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 317.356563] erofs: read_super, device -> /dev/loop4 [ 317.361609] erofs: options -> fault_injection=0 17:19:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x27d, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa803, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 317.369559] erofs: FAULT_INJECTION was not selected [ 317.374954] erofs: root inode @ nid 36 [ 317.380105] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 317.398745] erofs: unmounted for /dev/loop2 [ 317.407629] erofs: read_super, device -> /dev/loop1 17:19:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 21) 17:19:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 317.417307] erofs: options -> [ 317.424855] erofs: blksize 1 isn't supported on this platform [ 317.425321] erofs: read_super, device -> /dev/loop3 [ 317.441364] erofs: options -> [ 317.445476] erofs: root inode @ nid 36 [ 317.450077] erofs: bogus i_mode (0) @ nid 36 [ 317.456874] erofs: unmounted for /dev/loop4 [ 317.461637] erofs: unmounted for /dev/loop5 [ 317.616889] erofs: read_super, device -> /dev/loop0 17:19:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9103, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 317.655147] erofs: options -> [ 317.666368] erofs: root inode @ nid 36 [ 317.674747] erofs: bogus i_mode (0) @ nid 36 17:19:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xbd01, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 317.731676] FAULT_INJECTION: forcing a failure. [ 317.731676] name failslab, interval 1, probability 0, space 0, times 0 [ 317.743195] CPU: 0 PID: 21372 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 317.751083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.760418] Call Trace: [ 317.762990] dump_stack+0x1fc/0x2ef [ 317.766598] should_fail.cold+0xa/0xf [ 317.770384] ? setup_fault_attr+0x200/0x200 [ 317.774688] ? lock_acquire+0x170/0x3c0 [ 317.778647] __should_failslab+0x115/0x180 [ 317.782950] should_failslab+0x5/0x10 [ 317.786732] kmem_cache_alloc_node+0x245/0x3b0 [ 317.791311] __alloc_skb+0x71/0x560 [ 317.794925] alloc_uevent_skb+0x7b/0x210 [ 317.798988] kobject_uevent_env+0xa90/0x1480 [ 317.803389] lo_ioctl+0xff9/0x20e0 [ 317.806918] ? loop_set_status64+0x110/0x110 [ 317.811313] blkdev_ioctl+0x5cb/0x1a80 [ 317.815183] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.820530] ? blkpg_ioctl+0x9d0/0x9d0 [ 317.824402] ? mark_held_locks+0xf0/0xf0 [ 317.828449] ? mark_held_locks+0xf0/0xf0 [ 317.832500] ? debug_check_no_obj_freed+0x201/0x490 [ 317.837499] ? lock_downgrade+0x720/0x720 [ 317.841801] block_ioctl+0xe9/0x130 [ 317.845412] ? blkdev_fallocate+0x3f0/0x3f0 [ 317.849890] do_vfs_ioctl+0xcdb/0x12e0 [ 317.853772] ? lock_downgrade+0x720/0x720 [ 317.857916] ? check_preemption_disabled+0x41/0x280 [ 317.862915] ? ioctl_preallocate+0x200/0x200 [ 317.867311] ? __fget+0x356/0x510 [ 317.870746] ? do_dup2+0x450/0x450 [ 317.874267] ? do_sys_open+0x2bf/0x520 [ 317.878139] ksys_ioctl+0x9b/0xc0 [ 317.881576] __x64_sys_ioctl+0x6f/0xb0 [ 317.885447] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 317.890020] do_syscall_64+0xf9/0x620 [ 317.893827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.898998] RIP: 0033:0x7f7bf1830ea7 [ 317.902691] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 317.921579] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.929350] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 317.936611] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 317.943863] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 317.951117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 317.958469] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 317.976117] erofs: read_super, device -> /dev/loop1 [ 317.981541] erofs: options -> [ 317.989324] erofs: read_super, device -> /dev/loop2 [ 317.989328] erofs: read_super, device -> /dev/loop3 [ 317.989338] erofs: options -> [ 317.994465] erofs: options -> fault_injection=0 [ 318.007904] erofs: blksize 1 isn't supported on this platform [ 318.014350] erofs: root inode @ nid 36 [ 318.016454] erofs: read_super, device -> /dev/loop5 [ 318.023992] erofs: options -> fault_injection=0 17:19:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 318.024013] erofs: bogus i_mode (0) @ nid 36 [ 318.030342] erofs: read_super, device -> /dev/loop4 [ 318.051123] erofs: FAULT_INJECTION was not selected [ 318.060199] erofs: FAULT_INJECTION was not selected [ 318.063619] erofs: root inode @ nid 36 [ 318.069218] erofs: options -> fault_injection=0 [ 318.069614] erofs: FAULT_INJECTION was not selected 17:19:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xbd01, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 318.086372] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 318.093510] erofs: root inode @ nid 36 [ 318.108487] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 318.113961] erofs: root inode @ nid 36 [ 318.125765] erofs: read_super, device -> /dev/loop0 [ 318.131275] erofs: unmounted for /dev/loop2 [ 318.137237] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 318.144212] erofs: options -> [ 318.154105] erofs: root inode @ nid 36 17:19:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:42 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 22) [ 318.184976] erofs: bogus i_mode (0) @ nid 36 [ 318.198524] erofs: unmounted for /dev/loop5 [ 318.203686] erofs: read_super, device -> /dev/loop1 [ 318.209118] erofs: unmounted for /dev/loop4 [ 318.219388] erofs: options -> [ 318.225483] erofs: blksize 1 isn't supported on this platform 17:19:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 318.307575] ieee802154 phy0 wpan0: encryption failed: -22 [ 318.313799] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.341303] erofs: read_super, device -> /dev/loop3 17:19:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd803, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 318.365114] erofs: options -> [ 318.370790] erofs: root inode @ nid 36 [ 318.383630] erofs: bogus i_mode (0) @ nid 36 [ 318.399989] erofs: read_super, device -> /dev/loop2 [ 318.405024] erofs: options -> fault_injection=0 [ 318.430581] erofs: FAULT_INJECTION was not selected [ 318.440297] erofs: root inode @ nid 36 [ 318.455653] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 318.466371] erofs: read_super, device -> /dev/loop5 [ 318.471397] erofs: options -> fault_injection=0 17:19:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd803, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 318.483541] erofs: FAULT_INJECTION was not selected [ 318.490174] erofs: root inode @ nid 36 [ 318.494790] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 318.497555] FAULT_INJECTION: forcing a failure. [ 318.497555] name failslab, interval 1, probability 0, space 0, times 0 [ 318.513074] CPU: 1 PID: 21418 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 318.520952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.530293] Call Trace: [ 318.532871] dump_stack+0x1fc/0x2ef [ 318.536499] should_fail.cold+0xa/0xf [ 318.540293] ? setup_fault_attr+0x200/0x200 [ 318.544599] ? lock_acquire+0x170/0x3c0 [ 318.548577] __should_failslab+0x115/0x180 [ 318.552817] should_failslab+0x5/0x10 [ 318.556623] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 318.561736] __kmalloc_node_track_caller+0x38/0x70 [ 318.566669] __alloc_skb+0xae/0x560 [ 318.570291] alloc_uevent_skb+0x7b/0x210 [ 318.574339] kobject_uevent_env+0xa90/0x1480 [ 318.578738] lo_ioctl+0xff9/0x20e0 [ 318.582262] ? loop_set_status64+0x110/0x110 [ 318.586664] blkdev_ioctl+0x5cb/0x1a80 [ 318.590553] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.595915] ? blkpg_ioctl+0x9d0/0x9d0 [ 318.599805] ? mark_held_locks+0xf0/0xf0 [ 318.603934] ? mark_held_locks+0xf0/0xf0 [ 318.607992] ? debug_check_no_obj_freed+0x201/0x490 [ 318.613004] ? lock_downgrade+0x720/0x720 [ 318.617148] block_ioctl+0xe9/0x130 [ 318.620775] ? blkdev_fallocate+0x3f0/0x3f0 [ 318.625092] do_vfs_ioctl+0xcdb/0x12e0 [ 318.628979] ? lock_downgrade+0x720/0x720 [ 318.633124] ? check_preemption_disabled+0x41/0x280 [ 318.638132] ? ioctl_preallocate+0x200/0x200 [ 318.642535] ? __fget+0x356/0x510 [ 318.645981] ? do_dup2+0x450/0x450 [ 318.649515] ? do_sys_open+0x2bf/0x520 [ 318.653389] ksys_ioctl+0x9b/0xc0 [ 318.656839] __x64_sys_ioctl+0x6f/0xb0 [ 318.660719] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 318.665370] do_syscall_64+0xf9/0x620 [ 318.669164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.674337] RIP: 0033:0x7f7bf1830ea7 [ 318.678044] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 318.696941] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.704651] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 318.711906] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.719159] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 318.726420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 318.733679] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 318.742430] erofs: read_super, device -> /dev/loop1 [ 318.752459] erofs: options -> 17:19:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 318.779231] erofs: read_super, device -> /dev/loop0 [ 318.795998] erofs: blksize 1 isn't supported on this platform [ 318.802396] erofs: options -> [ 318.802916] erofs: read_super, device -> /dev/loop4 [ 318.818174] erofs: unmounted for /dev/loop2 [ 318.822841] erofs: options -> fault_injection=0 17:19:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5a02, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 318.827655] erofs: unmounted for /dev/loop5 [ 318.832882] erofs: root inode @ nid 36 [ 318.833535] erofs: FAULT_INJECTION was not selected [ 318.841950] erofs: root inode @ nid 36 [ 318.846379] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 318.852941] erofs: bogus i_mode (0) @ nid 36 [ 318.994661] erofs: read_super, device -> /dev/loop3 [ 319.003887] erofs: read_super, device -> /dev/loop5 [ 319.009275] erofs: read_super, device -> /dev/loop2 [ 319.014455] erofs: options -> fault_injection=0 [ 319.022360] erofs: read_super, device -> /dev/loop1 17:19:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 23) 17:19:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xde00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 319.043239] erofs: options -> [ 319.068288] erofs: FAULT_INJECTION was not selected [ 319.072432] erofs: options -> [ 319.074475] erofs: options -> fault_injection=0 [ 319.077316] erofs: root inode @ nid 36 [ 319.085581] erofs: unmounted for /dev/loop4 [ 319.099583] erofs: blksize 1 isn't supported on this platform [ 319.099599] erofs: FAULT_INJECTION was not selected [ 319.110110] erofs: bogus i_mode (0) @ nid 36 [ 319.114272] erofs: root inode @ nid 36 17:19:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 319.141800] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 319.155187] erofs: root inode @ nid 36 [ 319.163148] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 319.223929] FAULT_INJECTION: forcing a failure. [ 319.223929] name failslab, interval 1, probability 0, space 0, times 0 [ 319.236820] CPU: 0 PID: 21459 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 319.244705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.254060] Call Trace: [ 319.256645] dump_stack+0x1fc/0x2ef [ 319.260262] should_fail.cold+0xa/0xf [ 319.264061] ? setup_fault_attr+0x200/0x200 [ 319.268370] ? lock_acquire+0x170/0x3c0 [ 319.272332] __should_failslab+0x115/0x180 [ 319.276553] should_failslab+0x5/0x10 [ 319.280337] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 319.285424] __kmalloc_node_track_caller+0x38/0x70 [ 319.290336] __alloc_skb+0xae/0x560 [ 319.293950] alloc_uevent_skb+0x7b/0x210 [ 319.297999] kobject_uevent_env+0xa90/0x1480 [ 319.302400] lo_ioctl+0xff9/0x20e0 [ 319.305930] ? loop_set_status64+0x110/0x110 [ 319.310326] blkdev_ioctl+0x5cb/0x1a80 [ 319.314200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.319557] ? blkpg_ioctl+0x9d0/0x9d0 [ 319.323450] ? mark_held_locks+0xf0/0xf0 [ 319.327502] ? mark_held_locks+0xf0/0xf0 [ 319.331549] ? debug_check_no_obj_freed+0x201/0x490 [ 319.336556] ? lock_downgrade+0x720/0x720 [ 319.340693] block_ioctl+0xe9/0x130 [ 319.344312] ? blkdev_fallocate+0x3f0/0x3f0 [ 319.348628] do_vfs_ioctl+0xcdb/0x12e0 [ 319.352503] ? lock_downgrade+0x720/0x720 [ 319.356639] ? check_preemption_disabled+0x41/0x280 [ 319.361647] ? ioctl_preallocate+0x200/0x200 [ 319.366062] ? __fget+0x356/0x510 [ 319.369517] ? do_dup2+0x450/0x450 [ 319.373048] ? do_sys_open+0x2bf/0x520 [ 319.376925] ksys_ioctl+0x9b/0xc0 [ 319.380364] __x64_sys_ioctl+0x6f/0xb0 [ 319.384244] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 319.388824] do_syscall_64+0xf9/0x620 [ 319.392626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.397812] RIP: 0033:0x7f7bf1830ea7 [ 319.401509] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 319.420571] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.428276] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 319.435621] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 319.442877] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 319.450129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 319.457384] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 17:19:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x382, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 319.477403] erofs: read_super, device -> /dev/loop0 [ 319.492991] erofs: options -> [ 319.501575] erofs: unmounted for /dev/loop5 [ 319.507676] erofs: unmounted for /dev/loop2 [ 319.516320] erofs: read_super, device -> /dev/loop1 17:19:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 319.533420] erofs: read_super, device -> /dev/loop4 [ 319.535974] erofs: root inode @ nid 36 [ 319.542629] erofs: options -> [ 319.549125] erofs: options -> fault_injection=0 [ 319.552305] erofs: blksize 1 isn't supported on this platform [ 319.557791] erofs: FAULT_INJECTION was not selected [ 319.560877] erofs: bogus i_mode (0) @ nid 36 [ 319.565304] erofs: root inode @ nid 36 [ 319.588630] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe303, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 24) 17:19:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 319.743312] erofs: unmounted for /dev/loop4 [ 319.756807] erofs: read_super, device -> /dev/loop3 [ 319.761848] erofs: options -> [ 319.771554] erofs: read_super, device -> /dev/loop2 [ 319.773724] erofs: read_super, device -> /dev/loop5 [ 319.781579] erofs: options -> fault_injection=0 [ 319.786359] erofs: options -> fault_injection=0 [ 319.786636] erofs: FAULT_INJECTION was not selected [ 319.796213] erofs: root inode @ nid 36 [ 319.800353] erofs: bogus i_mode (0) @ nid 36 [ 319.804273] erofs: FAULT_INJECTION was not selected [ 319.804825] erofs: root inode @ nid 36 [ 319.824139] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 319.831996] erofs: root inode @ nid 36 [ 319.840089] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 319.870287] erofs: read_super, device -> /dev/loop0 [ 319.875642] erofs: options -> [ 319.881122] FAULT_INJECTION: forcing a failure. [ 319.881122] name failslab, interval 1, probability 0, space 0, times 0 [ 319.893186] erofs: root inode @ nid 36 [ 319.897669] CPU: 1 PID: 21496 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 319.905559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.914908] Call Trace: 17:19:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x391, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 319.917498] dump_stack+0x1fc/0x2ef [ 319.920407] erofs: bogus i_mode (0) @ nid 36 [ 319.921128] should_fail.cold+0xa/0xf [ 319.929315] ? setup_fault_attr+0x200/0x200 [ 319.933636] ? lock_acquire+0x170/0x3c0 [ 319.937613] __should_failslab+0x115/0x180 [ 319.941843] should_failslab+0x5/0x10 [ 319.945636] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 319.950732] __kmalloc_node_track_caller+0x38/0x70 [ 319.955652] __alloc_skb+0xae/0x560 [ 319.959277] alloc_uevent_skb+0x7b/0x210 [ 319.963435] kobject_uevent_env+0xa90/0x1480 [ 319.967858] lo_ioctl+0xff9/0x20e0 [ 319.971424] ? loop_set_status64+0x110/0x110 [ 319.975817] blkdev_ioctl+0x5cb/0x1a80 [ 319.979704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.985085] ? blkpg_ioctl+0x9d0/0x9d0 [ 319.988958] ? mark_held_locks+0xf0/0xf0 [ 319.993011] ? mark_held_locks+0xf0/0xf0 [ 319.997079] ? debug_check_no_obj_freed+0x201/0x490 [ 320.002090] ? lock_downgrade+0x720/0x720 [ 320.006232] block_ioctl+0xe9/0x130 [ 320.009855] ? blkdev_fallocate+0x3f0/0x3f0 [ 320.014170] do_vfs_ioctl+0xcdb/0x12e0 [ 320.018056] ? lock_downgrade+0x720/0x720 [ 320.022197] ? check_preemption_disabled+0x41/0x280 [ 320.027207] ? ioctl_preallocate+0x200/0x200 [ 320.031611] ? __fget+0x356/0x510 [ 320.035061] ? do_dup2+0x450/0x450 [ 320.038594] ? do_sys_open+0x2bf/0x520 [ 320.042468] ksys_ioctl+0x9b/0xc0 [ 320.045916] __x64_sys_ioctl+0x6f/0xb0 [ 320.049798] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 320.054373] do_syscall_64+0xf9/0x620 [ 320.058183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.063363] RIP: 0033:0x7f7bf1830ea7 [ 320.067069] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 320.085971] RSP: 002b:00007f7bf01a5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.093672] RAX: ffffffffffffffda RBX: 00007f7bf187aa20 RCX: 00007f7bf1830ea7 [ 320.100926] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 320.108183] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f7bf01a61d0 17:19:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 320.115442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 320.122698] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 320.137302] erofs: unmounted for /dev/loop2 [ 320.160595] erofs: unmounted for /dev/loop5 [ 320.176844] erofs: read_super, device -> /dev/loop1 [ 320.182734] erofs: options -> [ 320.187038] erofs: blksize 1 isn't supported on this platform [ 320.207165] erofs: read_super, device -> /dev/loop4 [ 320.214675] erofs: options -> fault_injection=0 17:19:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 320.225430] erofs: FAULT_INJECTION was not selected [ 320.234568] erofs: root inode @ nid 36 [ 320.239480] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:44 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 25) [ 320.297496] erofs: read_super, device -> /dev/loop3 [ 320.306526] erofs: options -> [ 320.313835] erofs: read_super, device -> /dev/loop2 [ 320.330112] erofs: root inode @ nid 36 [ 320.333693] erofs: read_super, device -> /dev/loop5 [ 320.334224] erofs: unmounted for /dev/loop4 17:19:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6802, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 320.347337] erofs: options -> fault_injection=0 [ 320.354165] erofs: options -> fault_injection=0 [ 320.362930] erofs: bogus i_mode (0) @ nid 36 [ 320.370810] erofs: FAULT_INJECTION was not selected [ 320.374790] erofs: FAULT_INJECTION was not selected [ 320.381600] erofs: root inode @ nid 36 [ 320.383254] erofs: root inode @ nid 36 [ 320.390366] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 320.395597] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 320.430933] erofs: read_super, device -> /dev/loop0 17:19:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf901, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 320.454033] erofs: options -> 17:19:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 320.497213] erofs: unmounted for /dev/loop5 [ 320.508462] erofs: read_super, device -> /dev/loop1 [ 320.517294] erofs: root inode @ nid 36 [ 320.524341] erofs: unmounted for /dev/loop2 [ 320.526830] erofs: options -> [ 320.540019] erofs: bogus i_mode (0) @ nid 36 [ 320.554605] FAULT_INJECTION: forcing a failure. [ 320.554605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.563237] erofs: blksize 1 isn't supported on this platform [ 320.566416] CPU: 0 PID: 21536 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 320.566427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.566431] Call Trace: [ 320.566452] dump_stack+0x1fc/0x2ef [ 320.566472] should_fail.cold+0xa/0xf [ 320.566489] ? setup_fault_attr+0x200/0x200 [ 320.566504] ? wake_up_q+0x93/0xe0 [ 320.566521] ? __mutex_unlock_slowpath+0x2be/0x610 [ 320.566541] __alloc_pages_nodemask+0x239/0x2890 [ 320.566565] ? __lock_acquire+0x6de/0x3ff0 [ 320.566588] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 320.566600] ? blkdev_ioctl+0x11a/0x1a80 [ 320.566615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.566644] ? blkpg_ioctl+0x9d0/0x9d0 [ 320.566668] ? debug_check_no_obj_freed+0x201/0x490 [ 320.566687] ? lock_downgrade+0x720/0x720 [ 320.566708] cache_grow_begin+0xa4/0x8a0 [ 320.566723] ? setup_fault_attr+0x200/0x200 [ 320.566737] ? lock_acquire+0x170/0x3c0 [ 320.566753] cache_alloc_refill+0x273/0x340 [ 320.566773] kmem_cache_alloc+0x346/0x370 [ 320.566790] getname_flags+0xce/0x590 [ 320.566807] do_mkdirat+0x8d/0x2d0 [ 320.566822] ? __ia32_sys_mknod+0x120/0x120 [ 320.566835] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 320.566853] ? trace_hardirqs_off_caller+0x6e/0x210 [ 320.691309] ? do_syscall_64+0x21/0x620 [ 320.695275] do_syscall_64+0xf9/0x620 [ 320.699064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.704253] RIP: 0033:0x7f7bf18301f7 [ 320.707971] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 320.726854] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 320.734543] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 320.741803] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 320.749069] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 320.756328] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 320.763582] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 320.816946] erofs: read_super, device -> /dev/loop4 [ 320.822162] erofs: options -> fault_injection=0 [ 320.829599] erofs: FAULT_INJECTION was not selected [ 320.834870] erofs: root inode @ nid 36 [ 320.840085] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 320.893062] erofs: read_super, device -> /dev/loop3 [ 320.900181] erofs: options -> [ 320.903710] erofs: root inode @ nid 36 [ 320.914629] erofs: bogus i_mode (0) @ nid 36 [ 320.925616] erofs: read_super, device -> /dev/loop5 17:19:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:44 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 26) [ 320.946623] erofs: read_super, device -> /dev/loop2 [ 320.951659] erofs: options -> fault_injection=0 [ 320.964260] erofs: options -> fault_injection=0 [ 320.976818] erofs: unmounted for /dev/loop4 [ 320.977491] erofs: FAULT_INJECTION was not selected 17:19:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 320.993259] erofs: FAULT_INJECTION was not selected [ 321.011549] erofs: root inode @ nid 36 [ 321.014468] erofs: root inode @ nid 36 [ 321.021649] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 321.032707] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 321.070803] erofs: read_super, device -> /dev/loop1 [ 321.083672] erofs: read_super, device -> /dev/loop0 [ 321.088941] erofs: options -> [ 321.092392] erofs: root inode @ nid 36 [ 321.098648] erofs: bogus i_mode (0) @ nid 36 17:19:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 321.121354] erofs: unmounted for /dev/loop5 [ 321.126333] erofs: unmounted for /dev/loop2 [ 321.134306] erofs: options -> [ 321.141489] erofs: blksize 1 isn't supported on this platform [ 321.208270] FAULT_INJECTION: forcing a failure. [ 321.208270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 321.220099] CPU: 0 PID: 21572 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 321.227974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.237312] Call Trace: [ 321.239885] dump_stack+0x1fc/0x2ef [ 321.243497] should_fail.cold+0xa/0xf [ 321.247284] ? setup_fault_attr+0x200/0x200 [ 321.251587] ? wake_up_q+0x93/0xe0 [ 321.255109] ? __mutex_unlock_slowpath+0x2be/0x610 [ 321.260022] __alloc_pages_nodemask+0x239/0x2890 [ 321.264782] ? __lock_acquire+0x6de/0x3ff0 [ 321.269020] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 321.273861] ? blkdev_ioctl+0x11a/0x1a80 [ 321.277914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.283263] ? blkpg_ioctl+0x9d0/0x9d0 [ 321.287154] ? debug_check_no_obj_freed+0x201/0x490 [ 321.292172] ? lock_downgrade+0x720/0x720 [ 321.296310] cache_grow_begin+0xa4/0x8a0 [ 321.300369] ? setup_fault_attr+0x200/0x200 [ 321.304692] ? lock_acquire+0x170/0x3c0 [ 321.308663] cache_alloc_refill+0x273/0x340 [ 321.312971] kmem_cache_alloc+0x346/0x370 [ 321.317107] getname_flags+0xce/0x590 [ 321.320892] do_mkdirat+0x8d/0x2d0 [ 321.324413] ? __ia32_sys_mknod+0x120/0x120 [ 321.328719] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 321.334071] ? trace_hardirqs_off_caller+0x6e/0x210 [ 321.339071] ? do_syscall_64+0x21/0x620 [ 321.343029] do_syscall_64+0xf9/0x620 [ 321.346828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.352006] RIP: 0033:0x7f7bf18301f7 [ 321.355704] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 321.374594] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 321.382296] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 321.389559] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 321.396821] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 321.404079] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 321.411343] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 321.463386] erofs: read_super, device -> /dev/loop3 [ 321.468749] erofs: options -> [ 321.478608] erofs: read_super, device -> /dev/loop0 [ 321.485516] erofs: read_super, device -> /dev/loop4 [ 321.487337] erofs: root inode @ nid 36 [ 321.503692] erofs: options -> [ 321.513100] erofs: bogus i_mode (0) @ nid 36 [ 321.520047] erofs: root inode @ nid 36 [ 321.531187] erofs: options -> fault_injection=0 [ 321.540248] erofs: read_super, device -> /dev/loop5 [ 321.545579] erofs: FAULT_INJECTION was not selected [ 321.551006] erofs: options -> fault_injection=0 [ 321.555887] erofs: root inode @ nid 36 17:19:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 321.560202] erofs: FAULT_INJECTION was not selected [ 321.565463] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 321.570517] erofs: bogus i_mode (0) @ nid 36 [ 321.573533] erofs: root inode @ nid 36 [ 321.581546] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:45 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 27) 17:19:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 321.617911] erofs: unmounted for /dev/loop5 [ 321.629181] erofs: unmounted for /dev/loop4 [ 321.642704] erofs: read_super, device -> /dev/loop1 [ 321.657358] erofs: options -> [ 321.679217] erofs: blksize 1 isn't supported on this platform [ 321.717352] erofs: read_super, device -> /dev/loop2 [ 321.723955] erofs: options -> fault_injection=0 [ 321.732436] erofs: FAULT_INJECTION was not selected [ 321.751991] erofs: root inode @ nid 36 [ 321.756727] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 321.770001] FAULT_INJECTION: forcing a failure. [ 321.770001] name failslab, interval 1, probability 0, space 0, times 0 [ 321.772056] erofs: read_super, device -> /dev/loop3 [ 321.791802] erofs: options -> [ 321.795117] erofs: root inode @ nid 36 [ 321.799803] erofs: bogus i_mode (0) @ nid 36 [ 321.804501] CPU: 1 PID: 21607 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 321.804531] erofs: read_super, device -> /dev/loop0 [ 321.812380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.812388] Call Trace: [ 321.812409] dump_stack+0x1fc/0x2ef [ 321.812429] should_fail.cold+0xa/0xf [ 321.812447] ? setup_fault_attr+0x200/0x200 17:19:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 321.812462] ? lock_acquire+0x170/0x3c0 [ 321.812480] __should_failslab+0x115/0x180 [ 321.849291] should_failslab+0x5/0x10 [ 321.853104] kmem_cache_alloc+0x277/0x370 [ 321.857267] getname_flags+0xce/0x590 [ 321.861085] do_mkdirat+0x8d/0x2d0 [ 321.864635] ? __ia32_sys_mknod+0x120/0x120 [ 321.868969] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 321.874342] ? trace_hardirqs_off_caller+0x6e/0x210 [ 321.879367] ? do_syscall_64+0x21/0x620 [ 321.882412] erofs: read_super, device -> /dev/loop5 [ 321.883344] do_syscall_64+0xf9/0x620 17:19:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 321.883367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.883379] RIP: 0033:0x7f7bf18301f7 [ 321.883396] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 321.905483] erofs: options -> fault_injection=0 [ 321.919944] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 321.919957] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 321.919966] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 321.919973] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 321.919979] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 321.919986] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 321.963192] erofs: options -> [ 321.969736] erofs: unmounted for /dev/loop2 [ 321.983093] erofs: FAULT_INJECTION was not selected [ 321.990609] erofs: root inode @ nid 36 [ 321.995335] erofs: root inode @ nid 36 [ 322.001409] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 322.002180] erofs: bogus i_mode (0) @ nid 36 17:19:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 322.119351] erofs: unmounted for /dev/loop5 17:19:46 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 28) 17:19:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 322.160544] erofs: read_super, device -> /dev/loop3 [ 322.165541] erofs: read_super, device -> /dev/loop1 [ 322.165588] erofs: options -> [ 322.176496] erofs: options -> [ 322.192406] erofs: root inode @ nid 36 [ 322.209851] erofs: blksize 1 isn't supported on this platform [ 322.211170] erofs: bogus i_mode (0) @ nid 36 17:19:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d02, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 322.308348] erofs: read_super, device -> /dev/loop2 [ 322.316744] erofs: options -> fault_injection=0 [ 322.321922] FAULT_INJECTION: forcing a failure. [ 322.321922] name failslab, interval 1, probability 0, space 0, times 0 [ 322.332101] erofs: FAULT_INJECTION was not selected [ 322.343781] erofs: root inode @ nid 36 [ 322.346548] CPU: 0 PID: 21646 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 322.352817] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 322.355554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.355560] Call Trace: [ 322.355583] dump_stack+0x1fc/0x2ef [ 322.355604] should_fail.cold+0xa/0xf [ 322.355627] ? setup_fault_attr+0x200/0x200 [ 322.386009] __should_failslab+0x115/0x180 [ 322.390260] should_failslab+0x5/0x10 [ 322.394067] kmem_cache_alloc+0x277/0x370 [ 322.398222] ? ext4_sync_fs+0x8d0/0x8d0 [ 322.402200] ext4_alloc_inode+0x1a/0x630 [ 322.406268] ? ext4_sync_fs+0x8d0/0x8d0 [ 322.407103] erofs: read_super, device -> /dev/loop0 [ 322.410248] alloc_inode+0x5d/0x180 [ 322.415241] erofs: options -> [ 322.418854] new_inode+0x1d/0xf0 [ 322.418870] __ext4_new_inode+0x400/0x5a20 [ 322.418889] ? putname+0xe1/0x120 [ 322.418899] ? do_mkdirat+0xa0/0x2d0 [ 322.418922] ? ext4_free_inode+0x1780/0x1780 [ 322.437235] erofs: root inode @ nid 36 [ 322.441195] ? debug_check_no_obj_freed+0x201/0x490 [ 322.441213] ? __dquot_initialize+0x298/0xb70 [ 322.441233] ? lock_acquire+0x170/0x3c0 [ 322.441252] ? dquot_initialize_needed+0x290/0x290 [ 322.441268] ? trace_hardirqs_off+0x64/0x200 [ 322.441286] ? common_perm+0x4be/0x800 [ 322.445369] erofs: bogus i_mode (0) @ nid 36 [ 322.450192] ext4_mkdir+0x396/0xe10 [ 322.450210] ? putname+0xe1/0x120 [ 322.450229] ? ext4_init_dot_dotdot+0x600/0x600 [ 322.450247] ? generic_permission+0x116/0x4d0 [ 322.450262] ? security_inode_permission+0xc5/0xf0 [ 322.450281] ? inode_permission.part.0+0x10c/0x450 [ 322.450299] vfs_mkdir+0x508/0x7a0 [ 322.450315] do_mkdirat+0x262/0x2d0 [ 322.509391] ? __ia32_sys_mknod+0x120/0x120 [ 322.513703] ? trace_hardirqs_off_caller+0x6e/0x210 [ 322.518708] ? do_syscall_64+0x21/0x620 [ 322.522673] do_syscall_64+0xf9/0x620 [ 322.526473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.531670] RIP: 0033:0x7f7bf18301f7 [ 322.535369] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 17:19:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b9, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 322.554263] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 322.561952] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 322.569205] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 322.576457] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 322.583709] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 322.590959] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:46 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 29) 17:19:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 322.635170] erofs: unmounted for /dev/loop2 [ 322.648513] erofs: read_super, device -> /dev/loop1 [ 322.650663] erofs: read_super, device -> /dev/loop5 [ 322.673770] erofs: options -> [ 322.686748] erofs: options -> fault_injection=0 [ 322.709248] erofs: blksize 1 isn't supported on this platform [ 322.742319] erofs: FAULT_INJECTION was not selected [ 322.762228] erofs: root inode @ nid 36 [ 322.767103] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8203, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 322.831031] erofs: read_super, device -> /dev/loop3 [ 322.840123] erofs: options -> [ 322.842955] FAULT_INJECTION: forcing a failure. [ 322.842955] name failslab, interval 1, probability 0, space 0, times 0 [ 322.843465] erofs: root inode @ nid 36 [ 322.861246] erofs: bogus i_mode (0) @ nid 36 [ 322.867092] CPU: 1 PID: 21674 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 322.874986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.884340] Call Trace: [ 322.886936] dump_stack+0x1fc/0x2ef [ 322.890587] should_fail.cold+0xa/0xf [ 322.894402] ? setup_fault_attr+0x200/0x200 [ 322.898761] __should_failslab+0x115/0x180 [ 322.903006] should_failslab+0x5/0x10 [ 322.903048] erofs: read_super, device -> /dev/loop2 [ 322.906805] kmem_cache_alloc+0x277/0x370 [ 322.906824] ? ext4_sync_fs+0x8d0/0x8d0 [ 322.906840] ext4_alloc_inode+0x1a/0x630 [ 322.906853] ? ext4_sync_fs+0x8d0/0x8d0 [ 322.906865] alloc_inode+0x5d/0x180 [ 322.906877] new_inode+0x1d/0xf0 [ 322.906891] __ext4_new_inode+0x400/0x5a20 [ 322.906911] ? putname+0xe1/0x120 [ 322.906921] ? do_mkdirat+0xa0/0x2d0 [ 322.906941] ? ext4_free_inode+0x1780/0x1780 [ 322.924199] erofs: options -> fault_injection=0 [ 322.928052] ? debug_check_no_obj_freed+0x201/0x490 [ 322.928069] ? __dquot_initialize+0x298/0xb70 [ 322.928089] ? lock_acquire+0x170/0x3c0 [ 322.928103] ? dquot_initialize_needed+0x290/0x290 [ 322.928119] ? trace_hardirqs_off+0x64/0x200 [ 322.928136] ? common_perm+0x4be/0x800 [ 322.928152] ext4_mkdir+0x396/0xe10 [ 322.928172] ? putname+0xe1/0x120 [ 322.928190] ? ext4_init_dot_dotdot+0x600/0x600 [ 322.928205] ? generic_permission+0x116/0x4d0 [ 322.928222] ? security_inode_permission+0xc5/0xf0 [ 322.968364] erofs: FAULT_INJECTION was not selected [ 322.969056] ? inode_permission.part.0+0x10c/0x450 [ 322.969073] vfs_mkdir+0x508/0x7a0 [ 323.016909] do_mkdirat+0x262/0x2d0 [ 323.020547] ? __ia32_sys_mknod+0x120/0x120 [ 323.024881] ? trace_hardirqs_off_caller+0x6e/0x210 [ 323.029906] ? do_syscall_64+0x21/0x620 [ 323.033892] do_syscall_64+0xf9/0x620 [ 323.037707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.042894] RIP: 0033:0x7f7bf18301f7 [ 323.046603] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 323.065498] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 323.073200] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 17:19:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 323.080473] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 323.087738] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 323.094999] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 323.102257] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 323.110619] erofs: read_super, device -> /dev/loop0 [ 323.115655] erofs: options -> 17:19:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 323.130495] erofs: root inode @ nid 36 [ 323.137998] erofs: unmounted for /dev/loop5 [ 323.144334] erofs: root inode @ nid 36 [ 323.158709] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 323.170250] erofs: bogus i_mode (0) @ nid 36 [ 323.172712] erofs: read_super, device -> /dev/loop1 [ 323.189864] erofs: options -> [ 323.193349] erofs: blksize 1 isn't supported on this platform 17:19:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3ba, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 323.265145] erofs: unmounted for /dev/loop2 17:19:47 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 30) 17:19:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9103, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 323.288619] erofs: read_super, device -> /dev/loop5 [ 323.294450] erofs: options -> fault_injection=0 [ 323.304838] erofs: FAULT_INJECTION was not selected [ 323.310832] erofs: root inode @ nid 36 [ 323.315675] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 323.405585] erofs: read_super, device -> /dev/loop3 [ 323.424056] erofs: options -> [ 323.444960] erofs: unmounted for /dev/loop5 17:19:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 323.464109] erofs: root inode @ nid 36 [ 323.468364] erofs: bogus i_mode (0) @ nid 36 [ 323.479647] erofs: read_super, device -> /dev/loop1 [ 323.492494] erofs: options -> [ 323.502349] erofs: blksize 1 isn't supported on this platform [ 323.503393] erofs: read_super, device -> /dev/loop2 [ 323.521767] erofs: options -> fault_injection=0 [ 323.528229] erofs: FAULT_INJECTION was not selected [ 323.533754] erofs: root inode @ nid 36 [ 323.540023] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9726, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3bb, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 323.633282] erofs: unmounted for /dev/loop2 [ 323.633649] FAULT_INJECTION: forcing a failure. [ 323.633649] name failslab, interval 1, probability 0, space 0, times 0 [ 323.646022] erofs: read_super, device -> /dev/loop0 [ 323.649597] CPU: 1 PID: 21716 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 323.654337] erofs: options -> [ 323.662203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.662209] Call Trace: [ 323.662230] dump_stack+0x1fc/0x2ef [ 323.662247] should_fail.cold+0xa/0xf [ 323.662264] ? setup_fault_attr+0x200/0x200 [ 323.662278] ? __es_tree_search.isra.0+0x1af/0x210 [ 323.662295] __should_failslab+0x115/0x180 [ 323.662311] should_failslab+0x5/0x10 [ 323.662323] kmem_cache_alloc+0x3f/0x370 [ 323.662340] __es_insert_extent+0x39b/0x13b0 [ 323.662354] ? lock_acquire+0x170/0x3c0 [ 323.662369] ? ext4_es_insert_extent+0x17e/0x5e0 [ 323.666366] erofs: read_super, device -> /dev/loop5 [ 323.674900] ext4_es_insert_extent+0x22e/0x5e0 [ 323.728810] ? lock_downgrade+0x720/0x720 [ 323.732969] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 323.738778] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 323.743799] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 323.749604] ext4_ext_map_blocks+0x2129/0x7390 [ 323.754183] ? __lock_acquire+0x6de/0x3ff0 [ 323.758411] ? __lock_acquire+0x6de/0x3ff0 [ 323.762640] ? mark_held_locks+0xf0/0xf0 [ 323.766689] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 323.772044] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 323.777223] ? mark_held_locks+0xf0/0xf0 [ 323.781276] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 323.786108] ? ext4_es_lookup_extent+0x375/0xb60 [ 323.790862] ? check_preemption_disabled+0x41/0x280 [ 323.795869] ? lock_acquire+0x170/0x3c0 [ 323.799830] ? ext4_map_blocks+0x33e/0x1a50 [ 323.804147] ext4_map_blocks+0xd88/0x1a50 [ 323.808375] ? check_preemption_disabled+0x41/0x280 [ 323.813383] ? ext4_issue_zeroout+0x160/0x160 [ 323.817867] ? __brelse+0x84/0xa0 [ 323.821314] ? __ext4_new_inode+0x2eb/0x5a20 [ 323.825718] ext4_getblk+0xad/0x4f0 [ 323.829338] ? ext4_iomap_begin+0xe00/0xe00 [ 323.833648] ? ext4_free_inode+0x1780/0x1780 [ 323.838050] ? debug_check_no_obj_freed+0x201/0x490 [ 323.843058] ? __dquot_initialize+0x298/0xb70 [ 323.847545] ext4_bread+0x7c/0x210 [ 323.851093] ? ext4_getblk+0x4f0/0x4f0 [ 323.854991] ? dquot_initialize_needed+0x290/0x290 [ 323.859924] ? trace_hardirqs_off+0x64/0x200 [ 323.864329] ext4_append+0x155/0x370 [ 323.868037] ext4_mkdir+0x5bd/0xe10 [ 323.871658] ? ext4_init_dot_dotdot+0x600/0x600 [ 323.876318] ? generic_permission+0x116/0x4d0 [ 323.880802] ? inode_permission.part.0+0x10c/0x450 [ 323.885721] vfs_mkdir+0x508/0x7a0 [ 323.889252] do_mkdirat+0x262/0x2d0 [ 323.892868] ? __ia32_sys_mknod+0x120/0x120 [ 323.897195] ? trace_hardirqs_off_caller+0x6e/0x210 [ 323.902201] ? do_syscall_64+0x21/0x620 [ 323.906168] do_syscall_64+0xf9/0x620 [ 323.909965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.915146] RIP: 0033:0x7f7bf18301f7 [ 323.918848] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 323.937734] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 323.945432] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 323.952690] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 323.959945] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 323.967201] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 323.974470] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 31) [ 323.985405] erofs: read_super, device -> /dev/loop4 [ 323.990894] erofs: options -> fault_injection=0 [ 323.995640] erofs: FAULT_INJECTION was not selected [ 324.000721] erofs: root inode @ nid 36 [ 324.002677] erofs: read_super, device -> /dev/loop3 [ 324.004693] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 324.016786] erofs: root inode @ nid 36 [ 324.026757] erofs: bogus i_mode (0) @ nid 36 17:19:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 324.031401] erofs: options -> fault_injection=0 [ 324.032147] erofs: unmounted for /dev/loop4 [ 324.036501] erofs: FAULT_INJECTION was not selected [ 324.046231] erofs: root inode @ nid 36 [ 324.053451] erofs: options -> [ 324.064723] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 324.079649] erofs: root inode @ nid 36 [ 324.083598] erofs: bogus i_mode (0) @ nid 36 [ 324.107125] erofs: read_super, device -> /dev/loop1 [ 324.112241] erofs: options -> [ 324.115718] erofs: blksize 1 isn't supported on this platform 17:19:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xaa26, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 324.208990] erofs: unmounted for /dev/loop5 [ 324.236988] erofs: read_super, device -> /dev/loop0 [ 324.242292] erofs: options -> [ 324.245744] erofs: root inode @ nid 36 [ 324.250207] erofs: bogus i_mode (0) @ nid 36 17:19:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 324.308118] erofs: read_super, device -> /dev/loop2 [ 324.308412] FAULT_INJECTION: forcing a failure. [ 324.308412] name failslab, interval 1, probability 0, space 0, times 0 [ 324.321985] erofs: options -> fault_injection=0 [ 324.332829] erofs: read_super, device -> /dev/loop1 [ 324.343427] erofs: FAULT_INJECTION was not selected [ 324.353184] erofs: root inode @ nid 36 [ 324.355520] erofs: options -> [ 324.359816] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 324.365165] erofs: blksize 1 isn't supported on this platform [ 324.373013] CPU: 0 PID: 21752 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 324.381066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.390416] Call Trace: [ 324.392989] dump_stack+0x1fc/0x2ef [ 324.396620] should_fail.cold+0xa/0xf [ 324.400423] ? setup_fault_attr+0x200/0x200 [ 324.404729] ? __lock_acquire+0x6de/0x3ff0 [ 324.408954] __should_failslab+0x115/0x180 [ 324.413171] should_failslab+0x5/0x10 [ 324.416958] __kmalloc+0x2ab/0x3c0 [ 324.420478] ? ext4_find_extent+0x9bb/0xc70 [ 324.424782] ext4_find_extent+0x9bb/0xc70 [ 324.428914] ext4_ext_map_blocks+0x1c0/0x7390 [ 324.433396] ? __lock_acquire+0x6de/0x3ff0 [ 324.437617] ? __lock_acquire+0x6de/0x3ff0 [ 324.441846] ? mark_held_locks+0xf0/0xf0 [ 324.445890] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 324.451238] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 324.456412] ? mark_held_locks+0xf0/0xf0 [ 324.460471] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 324.465300] ? ext4_es_lookup_extent+0x375/0xb60 [ 324.470038] ? lock_downgrade+0x720/0x720 [ 324.474166] ? lock_acquire+0x170/0x3c0 [ 324.478124] ? check_preemption_disabled+0x41/0x280 [ 324.483121] ? lock_acquire+0x170/0x3c0 [ 324.487077] ? ext4_map_blocks+0x33e/0x1a50 [ 324.491384] ext4_map_blocks+0xd88/0x1a50 [ 324.495522] ? check_preemption_disabled+0x41/0x280 [ 324.500531] ? ext4_issue_zeroout+0x160/0x160 [ 324.505010] ? __brelse+0x84/0xa0 [ 324.508446] ? __ext4_new_inode+0x2eb/0x5a20 [ 324.512843] ext4_getblk+0xad/0x4f0 [ 324.516456] ? ext4_iomap_begin+0xe00/0xe00 [ 324.520770] ? ext4_free_inode+0x1780/0x1780 [ 324.525178] ? debug_check_no_obj_freed+0x201/0x490 [ 324.530179] ? __dquot_initialize+0x298/0xb70 [ 324.534656] ext4_bread+0x7c/0x210 [ 324.538178] ? ext4_getblk+0x4f0/0x4f0 [ 324.542048] ? dquot_initialize_needed+0x290/0x290 [ 324.546958] ? trace_hardirqs_off+0x64/0x200 [ 324.551351] ext4_append+0x155/0x370 [ 324.555070] ext4_mkdir+0x5bd/0xe10 [ 324.558684] ? ext4_init_dot_dotdot+0x600/0x600 [ 324.563333] ? generic_permission+0x116/0x4d0 [ 324.567811] ? inode_permission.part.0+0x10c/0x450 [ 324.572727] vfs_mkdir+0x508/0x7a0 [ 324.576251] do_mkdirat+0x262/0x2d0 [ 324.579858] ? __ia32_sys_mknod+0x120/0x120 [ 324.584161] ? trace_hardirqs_off_caller+0x6e/0x210 [ 324.589167] ? do_syscall_64+0x21/0x620 [ 324.593123] do_syscall_64+0xf9/0x620 [ 324.596913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.602088] RIP: 0033:0x7f7bf18301f7 [ 324.605783] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 324.624667] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 324.632357] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 324.639609] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 324.646864] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 17:19:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 324.654123] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 324.661375] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 324.692978] erofs: read_super, device -> /dev/loop4 [ 324.704951] erofs: options -> fault_injection=0 17:19:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3bc, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 324.712252] erofs: read_super, device -> /dev/loop5 [ 324.724252] erofs: options -> fault_injection=0 [ 324.734035] erofs: unmounted for /dev/loop2 [ 324.750043] erofs: FAULT_INJECTION was not selected [ 324.758105] erofs: FAULT_INJECTION was not selected [ 324.758124] erofs: root inode @ nid 36 [ 324.763497] erofs: root inode @ nid 36 [ 324.769136] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 324.778656] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xad03, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 32) [ 324.836000] erofs: read_super, device -> /dev/loop0 [ 324.841050] erofs: options -> [ 324.847390] erofs: root inode @ nid 36 [ 324.852301] erofs: bogus i_mode (0) @ nid 36 [ 324.856265] erofs: read_super, device -> /dev/loop3 [ 324.862294] erofs: read_super, device -> /dev/loop2 17:19:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 324.889484] erofs: read_super, device -> /dev/loop1 [ 324.900425] erofs: options -> fault_injection=0 [ 324.901486] erofs: unmounted for /dev/loop5 [ 324.905183] erofs: FAULT_INJECTION was not selected [ 324.912273] erofs: options -> [ 324.918552] erofs: unmounted for /dev/loop4 [ 324.928853] erofs: root inode @ nid 36 [ 324.929639] erofs: options -> 17:19:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80ffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 324.932873] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 324.943766] erofs: blksize 1 isn't supported on this platform [ 324.945607] erofs: root inode @ nid 36 [ 324.953824] erofs: bogus i_mode (0) @ nid 36 17:19:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3bd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xae03, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 325.080228] erofs: read_super, device -> /dev/loop0 [ 325.088508] erofs: unmounted for /dev/loop2 [ 325.096323] erofs: options -> [ 325.111558] erofs: root inode @ nid 36 [ 325.118371] erofs: bogus i_mode (0) @ nid 36 17:19:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 325.191812] erofs: read_super, device -> /dev/loop3 [ 325.199278] FAULT_INJECTION: forcing a failure. [ 325.199278] name failslab, interval 1, probability 0, space 0, times 0 [ 325.211070] erofs: read_super, device -> /dev/loop5 [ 325.216097] erofs: options -> [ 325.216316] erofs: root inode @ nid 36 [ 325.227674] erofs: read_super, device -> /dev/loop2 [ 325.237438] erofs: options -> fault_injection=0 [ 325.245684] erofs: options -> fault_injection=0 [ 325.247821] erofs: bogus i_mode (0) @ nid 36 [ 325.252988] CPU: 1 PID: 21804 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 325.262701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.272057] Call Trace: [ 325.274656] dump_stack+0x1fc/0x2ef [ 325.278295] should_fail.cold+0xa/0xf [ 325.282110] ? setup_fault_attr+0x200/0x200 [ 325.286427] ? lock_downgrade+0x720/0x720 [ 325.290660] __should_failslab+0x115/0x180 [ 325.294891] should_failslab+0x5/0x10 [ 325.298682] __kmalloc+0x2ab/0x3c0 [ 325.302213] ? ext4_find_extent+0x9bb/0xc70 [ 325.306527] ext4_find_extent+0x9bb/0xc70 [ 325.310673] ext4_ext_map_blocks+0x1c0/0x7390 [ 325.315169] ? __lock_acquire+0x6de/0x3ff0 [ 325.319402] ? mark_held_locks+0xf0/0xf0 [ 325.323453] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 325.328806] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 325.334015] ? mark_held_locks+0xf0/0xf0 [ 325.338077] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 325.342918] ? ext4_es_lookup_extent+0x375/0xb60 [ 325.347671] ? ext4_map_blocks+0x59f/0x1a50 [ 325.351990] ? lock_acquire+0x170/0x3c0 [ 325.355954] ? ext4_map_blocks+0x740/0x1a50 [ 325.360276] ext4_map_blocks+0x7a2/0x1a50 [ 325.364422] ? check_preemption_disabled+0x41/0x280 [ 325.369430] ? ext4_issue_zeroout+0x160/0x160 [ 325.373917] ? __brelse+0x84/0xa0 [ 325.377357] ? __ext4_new_inode+0x2eb/0x5a20 [ 325.381762] ext4_getblk+0xad/0x4f0 [ 325.385378] ? ext4_iomap_begin+0xe00/0xe00 [ 325.389695] ? ext4_free_inode+0x1780/0x1780 [ 325.394107] ? debug_check_no_obj_freed+0x201/0x490 [ 325.399124] ? __dquot_initialize+0x298/0xb70 [ 325.403624] ext4_bread+0x7c/0x210 [ 325.407157] ? ext4_getblk+0x4f0/0x4f0 [ 325.411034] ? dquot_initialize_needed+0x290/0x290 [ 325.415957] ? trace_hardirqs_off+0x64/0x200 [ 325.420360] ext4_append+0x155/0x370 [ 325.424064] ext4_mkdir+0x5bd/0xe10 [ 325.427683] ? ext4_init_dot_dotdot+0x600/0x600 [ 325.432346] ? generic_permission+0x116/0x4d0 [ 325.436830] ? inode_permission.part.0+0x10c/0x450 [ 325.441762] vfs_mkdir+0x508/0x7a0 [ 325.445299] do_mkdirat+0x262/0x2d0 [ 325.448930] ? __ia32_sys_mknod+0x120/0x120 [ 325.453250] ? trace_hardirqs_off_caller+0x6e/0x210 [ 325.458262] ? do_syscall_64+0x21/0x620 [ 325.462229] do_syscall_64+0xf9/0x620 [ 325.466027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.471205] RIP: 0033:0x7f7bf18301f7 [ 325.474995] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 325.493886] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 325.501583] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf18301f7 [ 325.508839] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 325.516109] RBP: 00007f7bf01a61d0 R08: 0000000000000000 R09: 00007f7bf01a61d0 [ 325.523363] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 325.530633] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 325.551026] erofs: FAULT_INJECTION was not selected [ 325.561112] erofs: FAULT_INJECTION was not selected [ 325.571229] erofs: root inode @ nid 36 [ 325.575530] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 325.578607] erofs: root inode @ nid 36 [ 325.587938] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 325.636565] erofs: unmounted for /dev/loop5 17:19:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 33) [ 325.665906] erofs: read_super, device -> /dev/loop1 [ 325.671195] erofs: options -> [ 325.673920] erofs: read_super, device -> /dev/loop0 [ 325.690584] erofs: options -> [ 325.698430] erofs: blksize 1 isn't supported on this platform [ 325.702045] erofs: root inode @ nid 36 17:19:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3be, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 325.713127] erofs: bogus i_mode (0) @ nid 36 [ 325.719709] erofs: unmounted for /dev/loop2 [ 325.855223] FAULT_INJECTION: forcing a failure. [ 325.855223] name failslab, interval 1, probability 0, space 0, times 0 [ 325.866129] erofs: read_super, device -> /dev/loop3 [ 325.866809] CPU: 0 PID: 21839 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 325.871455] erofs: options -> [ 325.879322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.879327] Call Trace: [ 325.879348] dump_stack+0x1fc/0x2ef [ 325.879366] should_fail.cold+0xa/0xf [ 325.879383] ? setup_fault_attr+0x200/0x200 [ 325.879402] ? lock_acquire+0x170/0x3c0 [ 325.879422] __should_failslab+0x115/0x180 [ 325.879438] should_failslab+0x5/0x10 [ 325.879453] __kmalloc_track_caller+0x2a6/0x3c0 [ 325.879468] ? strndup_user+0x70/0x120 [ 325.879484] memdup_user+0x22/0xb0 [ 325.879498] strndup_user+0x70/0x120 [ 325.879514] ksys_mount+0x34/0x130 [ 325.913765] erofs: read_super, device -> /dev/loop5 [ 325.914519] __x64_sys_mount+0xba/0x150 [ 325.946571] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 325.951163] do_syscall_64+0xf9/0x620 17:19:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xaf03, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 325.954979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.960176] RIP: 0033:0x7f7bf183261a [ 325.963896] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 325.970875] erofs: options -> fault_injection=0 [ 325.982888] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 325.982902] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a 17:19:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 325.982909] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 325.982916] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 325.982924] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 325.982932] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 326.049067] erofs: root inode @ nid 36 [ 326.053321] erofs: bogus i_mode (0) @ nid 36 [ 326.060478] erofs: read_super, device -> /dev/loop2 [ 326.064813] erofs: FAULT_INJECTION was not selected [ 326.072729] erofs: root inode @ nid 36 [ 326.080328] erofs: options -> fault_injection=0 [ 326.085179] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 326.088199] erofs: FAULT_INJECTION was not selected [ 326.095925] erofs: read_super, device -> /dev/loop1 17:19:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3bf, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 326.110527] erofs: root inode @ nid 36 [ 326.114920] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 326.122090] erofs: options -> [ 326.129887] erofs: read_super, device -> /dev/loop0 [ 326.136542] erofs: unmounted for /dev/loop2 [ 326.144074] erofs: blksize 1 isn't supported on this platform [ 326.151770] erofs: options -> [ 326.158765] erofs: unmounted for /dev/loop5 [ 326.164596] erofs: root inode @ nid 36 [ 326.170175] erofs: bogus i_mode (0) @ nid 36 17:19:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 34) 17:19:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb003, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 326.373092] FAULT_INJECTION: forcing a failure. [ 326.373092] name failslab, interval 1, probability 0, space 0, times 0 [ 326.388479] erofs: read_super, device -> /dev/loop3 [ 326.393518] erofs: options -> [ 326.397966] erofs: read_super, device -> /dev/loop2 [ 326.404120] erofs: options -> fault_injection=0 [ 326.413366] erofs: root inode @ nid 36 [ 326.419747] erofs: FAULT_INJECTION was not selected [ 326.427671] erofs: bogus i_mode (0) @ nid 36 [ 326.432196] CPU: 0 PID: 21876 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 326.440082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.449436] Call Trace: [ 326.452038] dump_stack+0x1fc/0x2ef [ 326.455679] should_fail.cold+0xa/0xf [ 326.459492] ? setup_fault_attr+0x200/0x200 [ 326.463829] ? lock_acquire+0x170/0x3c0 [ 326.467825] __should_failslab+0x115/0x180 [ 326.472070] should_failslab+0x5/0x10 [ 326.475878] __kmalloc_track_caller+0x2a6/0x3c0 [ 326.480556] ? strndup_user+0x70/0x120 [ 326.484456] memdup_user+0x22/0xb0 [ 326.488005] strndup_user+0x70/0x120 [ 326.491734] ksys_mount+0x34/0x130 [ 326.494961] erofs: root inode @ nid 36 [ 326.495279] __x64_sys_mount+0xba/0x150 [ 326.503123] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 326.506026] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 326.507708] do_syscall_64+0xf9/0x620 [ 326.507732] entry_SYSCALL_64_after_hwframe+0x49/0xbe 17:19:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 326.507744] RIP: 0033:0x7f7bf183261a [ 326.507757] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 326.507769] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 326.553674] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 326.560953] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 17:19:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 326.568213] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 326.575471] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 326.582731] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb103, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 326.676735] erofs: read_super, device -> /dev/loop1 [ 326.684182] erofs: options -> [ 326.693556] erofs: blksize 1 isn't supported on this platform [ 326.693561] erofs: read_super, device -> /dev/loop5 [ 326.693570] erofs: options -> fault_injection=0 [ 326.715677] erofs: FAULT_INJECTION was not selected 17:19:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3c0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 326.723819] erofs: root inode @ nid 36 [ 326.735345] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 326.736350] erofs: read_super, device -> /dev/loop0 [ 326.763169] erofs: unmounted for /dev/loop5 [ 326.765247] erofs: options -> [ 326.771147] erofs: unmounted for /dev/loop2 17:19:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 35) [ 326.771418] erofs: root inode @ nid 36 [ 326.780005] erofs: read_super, device -> /dev/loop3 [ 326.790466] erofs: bogus i_mode (0) @ nid 36 [ 326.816025] erofs: options -> [ 326.819494] erofs: root inode @ nid 36 17:19:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 326.864064] erofs: bogus i_mode (0) @ nid 36 [ 326.910006] FAULT_INJECTION: forcing a failure. [ 326.910006] name failslab, interval 1, probability 0, space 0, times 0 [ 326.922161] CPU: 0 PID: 21913 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 326.930050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.939392] Call Trace: [ 326.941974] dump_stack+0x1fc/0x2ef [ 326.945591] should_fail.cold+0xa/0xf [ 326.949382] ? setup_fault_attr+0x200/0x200 [ 326.954121] ? lock_acquire+0x170/0x3c0 [ 326.958517] __should_failslab+0x115/0x180 [ 326.962850] should_failslab+0x5/0x10 [ 326.966644] __kmalloc_track_caller+0x2a6/0x3c0 [ 326.971318] ? strndup_user+0x70/0x120 [ 326.975204] memdup_user+0x22/0xb0 [ 326.978734] strndup_user+0x70/0x120 [ 326.982444] ksys_mount+0x34/0x130 [ 326.985974] __x64_sys_mount+0xba/0x150 [ 326.989943] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 326.994526] do_syscall_64+0xf9/0x620 [ 326.998321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.003518] RIP: 0033:0x7f7bf183261a [ 327.007223] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 327.026214] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.033904] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 327.041157] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 327.048418] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 327.055675] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 327.062939] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 327.091157] erofs: read_super, device -> /dev/loop5 [ 327.097049] erofs: read_super, device -> /dev/loop1 [ 327.102496] erofs: read_super, device -> /dev/loop2 17:19:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 36) [ 327.118805] erofs: options -> fault_injection=0 [ 327.124421] erofs: options -> [ 327.130040] erofs: options -> fault_injection=0 [ 327.133010] erofs: blksize 1 isn't supported on this platform [ 327.142477] erofs: FAULT_INJECTION was not selected [ 327.142604] erofs: FAULT_INJECTION was not selected [ 327.149148] erofs: root inode @ nid 36 [ 327.162153] erofs: root inode @ nid 36 [ 327.167496] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 327.181290] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 327.207086] erofs: read_super, device -> /dev/loop0 [ 327.212186] erofs: options -> 17:19:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3c1, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb203, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 327.225446] erofs: root inode @ nid 36 [ 327.239445] erofs: unmounted for /dev/loop2 [ 327.243480] erofs: read_super, device -> /dev/loop3 [ 327.252458] erofs: options -> [ 327.257541] erofs: unmounted for /dev/loop5 [ 327.263470] erofs: bogus i_mode (0) @ nid 36 [ 327.268740] erofs: root inode @ nid 36 [ 327.272935] erofs: bogus i_mode (0) @ nid 36 17:19:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 327.412465] FAULT_INJECTION: forcing a failure. [ 327.412465] name failslab, interval 1, probability 0, space 0, times 0 [ 327.421658] erofs: read_super, device -> /dev/loop2 [ 327.429068] erofs: read_super, device -> /dev/loop1 [ 327.443110] CPU: 0 PID: 21943 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 327.451040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:19:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 327.460403] Call Trace: [ 327.463011] dump_stack+0x1fc/0x2ef [ 327.465056] erofs: options -> [ 327.466652] should_fail.cold+0xa/0xf [ 327.466672] ? setup_fault_attr+0x200/0x200 [ 327.466686] ? lock_acquire+0x170/0x3c0 [ 327.466707] __should_failslab+0x115/0x180 [ 327.466727] should_failslab+0x5/0x10 [ 327.466742] __kmalloc_track_caller+0x2a6/0x3c0 [ 327.466757] ? strndup_user+0x70/0x120 [ 327.466768] ? _copy_from_user+0xd2/0x130 [ 327.466786] memdup_user+0x22/0xb0 [ 327.494870] erofs: blksize 1 isn't supported on this platform [ 327.498573] strndup_user+0x70/0x120 [ 327.498592] ksys_mount+0x6f/0x130 [ 327.498608] __x64_sys_mount+0xba/0x150 [ 327.498625] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 327.498640] do_syscall_64+0xf9/0x620 [ 327.498659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.498670] RIP: 0033:0x7f7bf183261a [ 327.498687] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 327.506259] erofs: options -> fault_injection=0 [ 327.506344] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.506358] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 327.506366] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 327.506378] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 327.535983] erofs: FAULT_INJECTION was not selected [ 327.537050] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 327.537060] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 327.561306] erofs: read_super, device -> /dev/loop5 [ 327.570838] erofs: root inode @ nid 36 [ 327.573110] erofs: options -> fault_injection=0 [ 327.583927] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 327.618847] erofs: FAULT_INJECTION was not selected [ 327.641491] erofs: root inode @ nid 36 [ 327.646659] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 327.656892] erofs: read_super, device -> /dev/loop0 17:19:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3c2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 327.664349] erofs: options -> [ 327.671184] erofs: read_super, device -> /dev/loop3 [ 327.703054] erofs: options -> [ 327.705889] erofs: root inode @ nid 36 17:19:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 37) 17:19:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb303, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 327.711796] erofs: root inode @ nid 36 [ 327.713121] erofs: unmounted for /dev/loop2 [ 327.720700] erofs: bogus i_mode (0) @ nid 36 [ 327.739919] erofs: bogus i_mode (0) @ nid 36 [ 327.757394] erofs: unmounted for /dev/loop5 [ 327.843948] FAULT_INJECTION: forcing a failure. [ 327.843948] name failslab, interval 1, probability 0, space 0, times 0 [ 327.855498] CPU: 0 PID: 21981 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 327.863393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.872755] Call Trace: [ 327.875355] dump_stack+0x1fc/0x2ef [ 327.878974] should_fail.cold+0xa/0xf [ 327.882763] ? setup_fault_attr+0x200/0x200 [ 327.887075] ? lock_acquire+0x170/0x3c0 [ 327.891047] __should_failslab+0x115/0x180 [ 327.895279] should_failslab+0x5/0x10 [ 327.899066] kmem_cache_alloc+0x277/0x370 [ 327.903204] getname_flags+0xce/0x590 [ 327.906990] user_path_at_empty+0x2a/0x50 [ 327.911134] do_mount+0x147/0x2f50 [ 327.914667] ? cmp_ex_sort+0xc0/0xc0 [ 327.918376] ? __do_page_fault+0x180/0xd60 [ 327.922606] ? copy_mount_string+0x40/0x40 [ 327.926827] ? memset+0x20/0x40 [ 327.930091] ? copy_mount_options+0x26f/0x380 [ 327.934570] ksys_mount+0xcf/0x130 [ 327.938092] __x64_sys_mount+0xba/0x150 [ 327.942138] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 327.946716] do_syscall_64+0xf9/0x620 [ 327.950504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.955682] RIP: 0033:0x7f7bf183261a [ 327.959385] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 327.978276] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.985969] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 327.993238] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 328.000500] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 328.007770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 328.015038] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 38) [ 328.062212] erofs: read_super, device -> /dev/loop1 [ 328.062956] erofs: read_super, device -> /dev/loop2 [ 328.071849] erofs: options -> [ 328.101456] erofs: blksize 1 isn't supported on this platform 17:19:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 328.109029] erofs: read_super, device -> /dev/loop3 [ 328.122375] erofs: options -> fault_injection=0 [ 328.122788] erofs: options -> [ 328.134000] erofs: FAULT_INJECTION was not selected [ 328.138232] erofs: root inode @ nid 36 [ 328.143550] erofs: bogus i_mode (0) @ nid 36 [ 328.147141] erofs: root inode @ nid 36 [ 328.152147] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 328.154399] FAULT_INJECTION: forcing a failure. [ 328.154399] name failslab, interval 1, probability 0, space 0, times 0 [ 328.170604] CPU: 1 PID: 22001 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 328.178503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.187862] Call Trace: [ 328.190471] dump_stack+0x1fc/0x2ef [ 328.194115] should_fail.cold+0xa/0xf [ 328.197934] ? setup_fault_attr+0x200/0x200 [ 328.202264] ? lock_acquire+0x170/0x3c0 [ 328.206251] __should_failslab+0x115/0x180 [ 328.210486] should_failslab+0x5/0x10 [ 328.214271] kmem_cache_alloc+0x277/0x370 [ 328.218420] alloc_vfsmnt+0x23/0x780 [ 328.222129] ? _raw_read_unlock+0x29/0x40 [ 328.226263] vfs_kern_mount.part.0+0x27/0x470 [ 328.230747] do_mount+0x115c/0x2f50 [ 328.234360] ? cmp_ex_sort+0xc0/0xc0 [ 328.238072] ? __do_page_fault+0x180/0xd60 [ 328.242315] ? copy_mount_string+0x40/0x40 [ 328.246563] ? memset+0x20/0x40 [ 328.249845] ? copy_mount_options+0x26f/0x380 [ 328.254340] ksys_mount+0xcf/0x130 [ 328.257889] __x64_sys_mount+0xba/0x150 [ 328.261857] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 328.266439] do_syscall_64+0xf9/0x620 [ 328.270230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.275407] RIP: 0033:0x7f7bf183261a [ 328.279112] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 328.298015] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 328.305732] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 328.313000] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 328.320269] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 328.327535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 328.334790] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb403, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3c3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 328.366144] erofs: read_super, device -> /dev/loop5 [ 328.375226] erofs: options -> fault_injection=0 [ 328.383638] erofs: FAULT_INJECTION was not selected [ 328.389986] erofs: root inode @ nid 36 [ 328.394159] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 328.441424] erofs: unmounted for /dev/loop2 [ 328.495642] erofs: read_super, device -> /dev/loop0 17:19:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x91030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 39) [ 328.521351] erofs: options -> [ 328.532370] erofs: read_super, device -> /dev/loop3 [ 328.549324] erofs: unmounted for /dev/loop5 [ 328.550892] erofs: options -> [ 328.554241] erofs: root inode @ nid 36 [ 328.554289] erofs: bogus i_mode (0) @ nid 36 [ 328.570143] erofs: root inode @ nid 36 [ 328.574372] erofs: bogus i_mode (0) @ nid 36 [ 328.656974] erofs: read_super, device -> /dev/loop2 [ 328.662248] erofs: read_super, device -> /dev/loop1 [ 328.692121] erofs: options -> fault_injection=0 [ 328.698641] erofs: options -> 17:19:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 328.704532] erofs: blksize 1 isn't supported on this platform [ 328.712117] erofs: FAULT_INJECTION was not selected [ 328.720212] FAULT_INJECTION: forcing a failure. [ 328.720212] name failslab, interval 1, probability 0, space 0, times 0 [ 328.735330] erofs: root inode @ nid 36 [ 328.742703] CPU: 0 PID: 22033 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 328.750609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.759971] Call Trace: [ 328.762553] dump_stack+0x1fc/0x2ef [ 328.766191] should_fail.cold+0xa/0xf [ 328.766755] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 328.770003] ? setup_fault_attr+0x200/0x200 [ 328.770021] ? lock_acquire+0x170/0x3c0 [ 328.770043] __should_failslab+0x115/0x180 [ 328.770058] should_failslab+0x5/0x10 [ 328.770074] kmem_cache_alloc+0x277/0x370 [ 328.797137] alloc_vfsmnt+0x23/0x780 [ 328.800839] ? _raw_read_unlock+0x29/0x40 [ 328.804975] vfs_kern_mount.part.0+0x27/0x470 [ 328.809459] do_mount+0x115c/0x2f50 [ 328.813071] ? cmp_ex_sort+0xc0/0xc0 [ 328.816781] ? __do_page_fault+0x180/0xd60 [ 328.821007] ? copy_mount_string+0x40/0x40 [ 328.825228] ? memset+0x20/0x40 [ 328.828493] ? copy_mount_options+0x26f/0x380 [ 328.832973] ksys_mount+0xcf/0x130 [ 328.836512] __x64_sys_mount+0xba/0x150 [ 328.840491] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 328.845070] do_syscall_64+0xf9/0x620 [ 328.848870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.854050] RIP: 0033:0x7f7bf183261a [ 328.857772] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 328.876665] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 328.884361] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 328.891625] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 328.898887] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 328.906246] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 328.913504] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 328.939962] erofs: read_super, device -> /dev/loop5 [ 328.945015] erofs: options -> fault_injection=0 17:19:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb503, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3d8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 328.953582] erofs: FAULT_INJECTION was not selected [ 328.959227] erofs: root inode @ nid 36 [ 328.965351] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 328.982404] erofs: unmounted for /dev/loop2 17:19:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 40) [ 329.016677] erofs: read_super, device -> /dev/loop0 [ 329.026022] erofs: read_super, device -> /dev/loop3 [ 329.032250] erofs: options -> [ 329.038292] erofs: options -> [ 329.049228] erofs: unmounted for /dev/loop5 [ 329.050233] erofs: root inode @ nid 36 [ 329.059294] erofs: root inode @ nid 36 [ 329.063528] erofs: bogus i_mode (0) @ nid 36 [ 329.075450] erofs: bogus i_mode (0) @ nid 36 17:19:53 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 329.186132] FAULT_INJECTION: forcing a failure. [ 329.186132] name failslab, interval 1, probability 0, space 0, times 0 [ 329.214970] CPU: 0 PID: 22059 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 329.216081] erofs: read_super, device -> /dev/loop5 [ 329.222887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.230733] erofs: read_super, device -> /dev/loop1 [ 329.237254] Call Trace: [ 329.237277] dump_stack+0x1fc/0x2ef [ 329.237295] should_fail.cold+0xa/0xf [ 329.237314] ? setup_fault_attr+0x200/0x200 [ 329.244636] erofs: read_super, device -> /dev/loop2 [ 329.244896] ? lock_acquire+0x170/0x3c0 [ 329.248645] erofs: options -> fault_injection=0 [ 329.252298] __should_failslab+0x115/0x180 [ 329.252317] should_failslab+0x5/0x10 [ 329.252334] kmem_cache_alloc+0x277/0x370 [ 329.269680] erofs: options -> [ 329.270397] alloc_vfsmnt+0x23/0x780 [ 329.274928] erofs: options -> fault_injection=0 [ 329.278404] ? _raw_read_unlock+0x29/0x40 [ 329.278421] vfs_kern_mount.part.0+0x27/0x470 [ 329.278439] do_mount+0x115c/0x2f50 [ 329.278458] ? cmp_ex_sort+0xc0/0xc0 [ 329.278475] ? __do_page_fault+0x180/0xd60 [ 329.278492] ? copy_mount_string+0x40/0x40 [ 329.287740] erofs: FAULT_INJECTION was not selected [ 329.289508] ? memset+0x20/0x40 [ 329.289525] ? copy_mount_options+0x26f/0x380 [ 329.289542] ksys_mount+0xcf/0x130 [ 329.294311] erofs: blksize 1 isn't supported on this platform [ 329.298341] __x64_sys_mount+0xba/0x150 [ 329.298359] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 329.298373] do_syscall_64+0xf9/0x620 [ 329.298392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.298403] RIP: 0033:0x7f7bf183261a [ 329.298420] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 329.307378] erofs: root inode @ nid 36 [ 329.310198] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 329.310213] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 329.310222] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 329.310230] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 329.310241] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 329.314769] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 329.318680] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:53 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd8030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 329.382276] erofs: FAULT_INJECTION was not selected [ 329.441506] erofs: root inode @ nid 36 [ 329.449063] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 329.456370] erofs: read_super, device -> /dev/loop3 [ 329.477332] erofs: options -> [ 329.481815] erofs: root inode @ nid 36 17:19:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 41) 17:19:53 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb603, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 329.488749] erofs: read_super, device -> /dev/loop0 [ 329.492659] erofs: unmounted for /dev/loop5 [ 329.520545] erofs: options -> [ 329.524065] erofs: root inode @ nid 36 [ 329.556407] erofs: bogus i_mode (0) @ nid 36 [ 329.564497] erofs: read_super, device -> /dev/loop1 [ 329.569828] erofs: options -> 17:19:53 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 329.621237] erofs: blksize 1 isn't supported on this platform [ 329.629801] erofs: bogus i_mode (0) @ nid 36 [ 329.634594] erofs: unmounted for /dev/loop2 [ 329.691653] erofs: read_super, device -> /dev/loop3 [ 329.696958] FAULT_INJECTION: forcing a failure. [ 329.696958] name failslab, interval 1, probability 0, space 0, times 0 [ 329.709198] erofs: options -> [ 329.713251] CPU: 1 PID: 22092 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 329.715118] erofs: root inode @ nid 36 [ 329.721144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.721167] Call Trace: [ 329.721191] dump_stack+0x1fc/0x2ef [ 329.721211] should_fail.cold+0xa/0xf [ 329.721230] ? setup_fault_attr+0x200/0x200 [ 329.721247] ? lock_acquire+0x170/0x3c0 [ 329.721266] __should_failslab+0x115/0x180 [ 329.721284] should_failslab+0x5/0x10 [ 329.721297] kmem_cache_alloc_trace+0x284/0x380 [ 329.721313] ? set_bdev_super+0x110/0x110 [ 329.721327] ? ns_test_super+0x50/0x50 [ 329.721341] sget_userns+0x122/0xcd0 [ 329.721356] ? set_bdev_super+0x110/0x110 [ 329.721373] ? ns_test_super+0x50/0x50 [ 329.721387] ? set_bdev_super+0x110/0x110 [ 329.721404] ? ns_test_super+0x50/0x50 [ 329.730145] erofs: bogus i_mode (0) @ nid 36 [ 329.734628] sget+0x102/0x140 [ 329.734645] mount_bdev+0xf8/0x3b0 [ 329.734662] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 329.809574] erofs_mount+0x8c/0xc0 [ 329.813112] ? erofs_kill_sb+0x20/0x20 [ 329.816989] ? alloc_pages_current+0x19b/0x2a0 [ 329.821555] ? __lockdep_init_map+0x100/0x5a0 [ 329.826046] mount_fs+0xa3/0x310 [ 329.829422] vfs_kern_mount.part.0+0x68/0x470 [ 329.833915] do_mount+0x115c/0x2f50 [ 329.837529] ? cmp_ex_sort+0xc0/0xc0 [ 329.841227] ? __do_page_fault+0x180/0xd60 [ 329.845444] ? copy_mount_string+0x40/0x40 [ 329.849679] ? memset+0x20/0x40 [ 329.852953] ? copy_mount_options+0x26f/0x380 [ 329.857449] ksys_mount+0xcf/0x130 [ 329.860997] __x64_sys_mount+0xba/0x150 [ 329.864959] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 329.869553] do_syscall_64+0xf9/0x620 [ 329.873355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.878541] RIP: 0033:0x7f7bf183261a [ 329.882239] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 329.901123] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 329.908824] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 329.916094] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 329.923356] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 329.930616] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:19:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 329.937879] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 42) 17:19:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb703, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 330.093104] erofs: read_super, device -> /dev/loop5 [ 330.107908] erofs: options -> fault_injection=0 [ 330.120478] erofs: FAULT_INJECTION was not selected [ 330.142953] erofs: root inode @ nid 36 [ 330.161591] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 330.168821] erofs: read_super, device -> /dev/loop2 [ 330.174308] erofs: options -> fault_injection=0 [ 330.178684] erofs: read_super, device -> /dev/loop3 [ 330.182891] erofs: FAULT_INJECTION was not selected [ 330.194805] FAULT_INJECTION: forcing a failure. [ 330.194805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.212551] erofs: root inode @ nid 36 [ 330.218184] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe3030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 330.244815] erofs: options -> [ 330.261965] erofs: unmounted for /dev/loop5 [ 330.281619] erofs: root inode @ nid 36 [ 330.281856] erofs: unmounted for /dev/loop2 [ 330.292713] CPU: 0 PID: 22121 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 330.298981] erofs: read_super, device -> /dev/loop1 [ 330.300607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.300613] Call Trace: [ 330.300633] dump_stack+0x1fc/0x2ef [ 330.300652] should_fail.cold+0xa/0xf [ 330.324425] erofs: options -> [ 330.325110] ? lock_acquire+0x170/0x3c0 [ 330.332286] ? setup_fault_attr+0x200/0x200 [ 330.336627] __alloc_pages_nodemask+0x239/0x2890 [ 330.341394] ? lock_acquire+0x170/0x3c0 [ 330.344490] erofs: blksize 1 isn't supported on this platform [ 330.345378] ? pcpu_alloc+0x91f/0x1190 [ 330.345396] ? mark_held_locks+0xf0/0xf0 [ 330.345414] ? pcpu_alloc+0xe78/0x1190 [ 330.363110] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 330.367975] ? check_preemption_disabled+0x41/0x280 [ 330.373006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 330.378035] ? pcpu_alloc+0xc9/0x1190 [ 330.381845] alloc_pages_current+0x193/0x2a0 [ 330.386248] ? __lockdep_init_map+0x100/0x5a0 [ 330.390734] get_zeroed_page+0x10/0x40 [ 330.394606] mount_fs+0x203/0x310 [ 330.398056] vfs_kern_mount.part.0+0x68/0x470 [ 330.402543] do_mount+0x115c/0x2f50 [ 330.406167] ? cmp_ex_sort+0xc0/0xc0 [ 330.409872] ? __do_page_fault+0x180/0xd60 [ 330.414097] ? copy_mount_string+0x40/0x40 [ 330.418323] ? memset+0x20/0x40 [ 330.421593] ? copy_mount_options+0x26f/0x380 [ 330.426080] ksys_mount+0xcf/0x130 [ 330.429615] __x64_sys_mount+0xba/0x150 [ 330.433583] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 330.438153] do_syscall_64+0xf9/0x620 [ 330.441946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.447122] RIP: 0033:0x7f7bf183261a [ 330.450827] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 330.469803] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 330.477501] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 330.484759] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 330.492013] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 330.499275] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 330.506533] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 330.515607] erofs: read_super, device -> /dev/loop0 17:19:54 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb803, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 330.538540] erofs: options -> [ 330.548921] erofs: root inode @ nid 36 [ 330.551973] erofs: bogus i_mode (0) @ nid 36 [ 330.562942] erofs: bogus i_mode (0) @ nid 36 17:19:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 330.619623] erofs: read_super, device -> /dev/loop5 [ 330.624771] erofs: options -> fault_injection=0 [ 330.633238] erofs: FAULT_INJECTION was not selected [ 330.639357] erofs: root inode @ nid 36 [ 330.643479] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 43) 17:19:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x24030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:54 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 330.779459] erofs: read_super, device -> /dev/loop3 [ 330.784611] erofs: options -> [ 330.790798] erofs: root inode @ nid 36 [ 330.791890] erofs: read_super, device -> /dev/loop2 [ 330.794956] erofs: bogus i_mode (0) @ nid 36 [ 330.815401] erofs: unmounted for /dev/loop5 [ 330.820775] erofs: options -> fault_injection=0 [ 330.831562] erofs: FAULT_INJECTION was not selected [ 330.836859] erofs: root inode @ nid 36 [ 330.841409] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 330.880116] erofs: read_super, device -> /dev/loop1 [ 330.885162] erofs: options -> [ 330.895947] erofs: blksize 1 isn't supported on this platform [ 330.899099] FAULT_INJECTION: forcing a failure. [ 330.899099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.913669] CPU: 1 PID: 22158 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 330.921547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.930896] Call Trace: [ 330.933488] dump_stack+0x1fc/0x2ef [ 330.937111] should_fail.cold+0xa/0xf [ 330.940907] ? setup_fault_attr+0x200/0x200 [ 330.945224] ? get_page_from_freelist+0x1d60/0x4170 [ 330.950254] __alloc_pages_nodemask+0x239/0x2890 [ 330.955000] ? get_page_from_freelist+0x1d60/0x4170 [ 330.960007] ? bad_range+0x260/0x3c0 [ 330.963711] ? __lock_acquire+0x6de/0x3ff0 [ 330.967939] ? preempt_count_add+0xaf/0x190 [ 330.972256] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 330.977098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.982461] cache_grow_begin+0xa4/0x8a0 [ 330.986515] ? setup_fault_attr+0x200/0x200 [ 330.990829] ? lock_acquire+0x170/0x3c0 [ 330.994794] cache_alloc_refill+0x273/0x340 [ 330.999112] kmem_cache_alloc+0x346/0x370 [ 331.003251] getname_kernel+0x4e/0x370 [ 331.007128] kern_path+0x1b/0x40 [ 331.010488] lookup_bdev+0xfc/0x220 [ 331.014117] ? bd_acquire+0x440/0x440 [ 331.017909] blkdev_get_by_path+0x1b/0xd0 [ 331.022047] mount_bdev+0x5b/0x3b0 [ 331.025581] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 331.030856] erofs_mount+0x8c/0xc0 [ 331.034386] ? erofs_kill_sb+0x20/0x20 [ 331.038268] ? alloc_pages_current+0x19b/0x2a0 [ 331.042837] ? __lockdep_init_map+0x100/0x5a0 [ 331.047324] mount_fs+0xa3/0x310 [ 331.050710] vfs_kern_mount.part.0+0x68/0x470 [ 331.055221] do_mount+0x115c/0x2f50 [ 331.058840] ? cmp_ex_sort+0xc0/0xc0 [ 331.062566] ? __do_page_fault+0x180/0xd60 [ 331.066791] ? copy_mount_string+0x40/0x40 [ 331.071032] ? memset+0x20/0x40 [ 331.074304] ? copy_mount_options+0x26f/0x380 [ 331.078793] ksys_mount+0xcf/0x130 [ 331.082342] __x64_sys_mount+0xba/0x150 [ 331.086315] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 331.090898] do_syscall_64+0xf9/0x620 [ 331.094703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.099883] RIP: 0033:0x7f7bf183261a [ 331.103588] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 331.122475] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.130171] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 331.137426] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 331.144684] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 331.151941] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 331.159197] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:55 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 331.192561] erofs: read_super, device -> /dev/loop0 [ 331.211888] erofs: unmounted for /dev/loop2 [ 331.220327] erofs: options -> [ 331.229347] erofs: root inode @ nid 36 [ 331.234179] erofs: bogus i_mode (0) @ nid 36 [ 331.316367] erofs: read_super, device -> /dev/loop4 [ 331.321608] erofs: options -> fault_injection=0 [ 331.328127] erofs: FAULT_INJECTION was not selected [ 331.333309] erofs: root inode @ nid 36 [ 331.338237] erofs: mounted on /dev/loop4 with opts: fault_injection=0. 17:19:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xbd01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 44) 17:19:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 331.376148] erofs: read_super, device -> /dev/loop5 [ 331.381543] erofs: read_super, device -> /dev/loop3 [ 331.386714] erofs: options -> fault_injection=0 [ 331.402011] erofs: options -> [ 331.405599] erofs: unmounted for /dev/loop4 [ 331.406546] erofs: FAULT_INJECTION was not selected [ 331.415574] erofs: root inode @ nid 36 [ 331.421397] erofs: root inode @ nid 36 17:19:55 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 331.427521] erofs: read_super, device -> /dev/loop2 [ 331.432549] erofs: options -> fault_injection=0 [ 331.442139] erofs: bogus i_mode (0) @ nid 36 [ 331.447370] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 331.454705] erofs: FAULT_INJECTION was not selected [ 331.465727] erofs: root inode @ nid 36 [ 331.474553] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 331.475224] erofs: unmounted for /dev/loop5 17:19:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:55 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 331.559015] erofs: read_super, device -> /dev/loop1 [ 331.564166] erofs: options -> [ 331.569313] FAULT_INJECTION: forcing a failure. [ 331.569313] name failslab, interval 1, probability 0, space 0, times 0 [ 331.586954] erofs: read_super, device -> /dev/loop0 [ 331.592489] erofs: unmounted for /dev/loop2 [ 331.593231] erofs: blksize 1 isn't supported on this platform [ 331.629682] erofs: options -> [ 331.642129] erofs: root inode @ nid 36 [ 331.650075] CPU: 0 PID: 22188 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 331.657973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.659745] erofs: bogus i_mode (0) @ nid 36 [ 331.667316] Call Trace: [ 331.667406] dump_stack+0x1fc/0x2ef [ 331.667422] should_fail.cold+0xa/0xf [ 331.667441] ? setup_fault_attr+0x200/0x200 [ 331.686098] ? lock_acquire+0x170/0x3c0 [ 331.690061] __should_failslab+0x115/0x180 [ 331.694402] should_failslab+0x5/0x10 [ 331.698187] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 331.703273] __kmalloc_node+0x38/0x70 [ 331.707058] kvmalloc_node+0x61/0xf0 [ 331.710759] __list_lru_init+0x4c6/0x7f0 [ 331.714935] ? up_read+0xb3/0x110 [ 331.718377] sget_userns+0x7e2/0xcd0 [ 331.722085] ? set_bdev_super+0x110/0x110 [ 331.726233] ? ns_test_super+0x50/0x50 [ 331.730116] ? set_bdev_super+0x110/0x110 [ 331.734263] ? ns_test_super+0x50/0x50 [ 331.738312] sget+0x102/0x140 [ 331.741402] mount_bdev+0xf8/0x3b0 [ 331.744931] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 331.750199] erofs_mount+0x8c/0xc0 [ 331.753725] ? erofs_kill_sb+0x20/0x20 [ 331.757599] ? alloc_pages_current+0x19b/0x2a0 [ 331.762188] ? __lockdep_init_map+0x100/0x5a0 [ 331.766666] mount_fs+0xa3/0x310 [ 331.770022] vfs_kern_mount.part.0+0x68/0x470 [ 331.774503] do_mount+0x115c/0x2f50 [ 331.778117] ? cmp_ex_sort+0xc0/0xc0 [ 331.781816] ? __do_page_fault+0x180/0xd60 [ 331.786039] ? copy_mount_string+0x40/0x40 [ 331.790273] ? memset+0x20/0x40 [ 331.793550] ? copy_mount_options+0x26f/0x380 [ 331.798041] ksys_mount+0xcf/0x130 [ 331.801568] __x64_sys_mount+0xba/0x150 [ 331.805528] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 331.810094] do_syscall_64+0xf9/0x620 [ 331.813898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.819075] RIP: 0033:0x7f7bf183261a [ 331.822777] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 331.841670] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 331.849384] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 331.856653] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 331.863926] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 331.871190] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:19:55 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd803, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 331.878457] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 331.960576] erofs: read_super, device -> /dev/loop5 [ 331.975075] erofs: options -> fault_injection=0 [ 331.975828] erofs: read_super, device -> /dev/loop2 [ 331.989327] erofs: FAULT_INJECTION was not selected [ 332.001232] erofs: read_super, device -> /dev/loop3 [ 332.001384] erofs: root inode @ nid 36 17:19:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 45) 17:19:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 332.010322] erofs: read_super, device -> /dev/loop1 [ 332.015812] erofs: options -> fault_injection=0 [ 332.029655] erofs: options -> [ 332.032991] erofs: options -> [ 332.040269] erofs: FAULT_INJECTION was not selected [ 332.077281] erofs: root inode @ nid 36 [ 332.081457] erofs: blksize 1 isn't supported on this platform [ 332.091475] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 332.096197] erofs: root inode @ nid 36 [ 332.107780] erofs: bogus i_mode (0) @ nid 36 [ 332.113504] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe303, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 332.188073] FAULT_INJECTION: forcing a failure. [ 332.188073] name failslab, interval 1, probability 0, space 0, times 0 17:19:56 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 332.233358] erofs: read_super, device -> /dev/loop0 [ 332.252198] erofs: unmounted for /dev/loop5 [ 332.257819] erofs: unmounted for /dev/loop2 [ 332.268736] erofs: options -> [ 332.279898] CPU: 1 PID: 22225 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 332.284325] erofs: root inode @ nid 36 [ 332.287795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.287807] Call Trace: [ 332.287829] dump_stack+0x1fc/0x2ef [ 332.287849] should_fail.cold+0xa/0xf [ 332.287865] ? setup_fault_attr+0x200/0x200 [ 332.287880] ? lock_acquire+0x170/0x3c0 [ 332.287899] __should_failslab+0x115/0x180 [ 332.287915] should_failslab+0x5/0x10 [ 332.287928] __kmalloc+0x2ab/0x3c0 [ 332.287942] ? prealloc_shrinker+0x15d/0x340 [ 332.287960] prealloc_shrinker+0x15d/0x340 [ 332.287976] sget_userns+0x7b4/0xcd0 [ 332.287990] ? set_bdev_super+0x110/0x110 [ 332.288007] ? ns_test_super+0x50/0x50 [ 332.288024] ? set_bdev_super+0x110/0x110 [ 332.302318] erofs: bogus i_mode (0) @ nid 36 [ 332.303827] ? ns_test_super+0x50/0x50 [ 332.303847] sget+0x102/0x140 [ 332.366697] mount_bdev+0xf8/0x3b0 [ 332.370222] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 332.375479] erofs_mount+0x8c/0xc0 [ 332.379018] ? erofs_kill_sb+0x20/0x20 [ 332.382904] ? alloc_pages_current+0x19b/0x2a0 [ 332.387473] ? __lockdep_init_map+0x100/0x5a0 [ 332.391962] mount_fs+0xa3/0x310 [ 332.395318] vfs_kern_mount.part.0+0x68/0x470 [ 332.399812] do_mount+0x115c/0x2f50 [ 332.403431] ? cmp_ex_sort+0xc0/0xc0 [ 332.407132] ? __do_page_fault+0x180/0xd60 [ 332.411351] ? copy_mount_string+0x40/0x40 [ 332.415572] ? memset+0x20/0x40 [ 332.418846] ? copy_mount_options+0x26f/0x380 [ 332.423333] ksys_mount+0xcf/0x130 [ 332.426858] __x64_sys_mount+0xba/0x150 [ 332.430819] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 332.435381] do_syscall_64+0xf9/0x620 [ 332.439184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.444366] RIP: 0033:0x7f7bf183261a [ 332.448062] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 332.466952] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 332.474646] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 332.481903] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 332.489158] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 332.496423] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 332.503686] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 46) [ 332.578072] erofs: read_super, device -> /dev/loop2 [ 332.587909] erofs: options -> fault_injection=0 [ 332.600923] erofs: FAULT_INJECTION was not selected [ 332.610574] erofs: root inode @ nid 36 [ 332.614762] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 332.617178] erofs: read_super, device -> /dev/loop3 [ 332.635003] erofs: options -> [ 332.638950] erofs: root inode @ nid 36 [ 332.642989] erofs: bogus i_mode (0) @ nid 36 [ 332.646891] erofs: read_super, device -> /dev/loop1 [ 332.654589] erofs: options -> [ 332.659036] erofs: blksize 1 isn't supported on this platform [ 332.684797] erofs: read_super, device -> /dev/loop5 17:19:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 332.713183] erofs: options -> fault_injection=0 [ 332.728653] erofs: unmounted for /dev/loop2 17:19:56 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 332.754591] erofs: FAULT_INJECTION was not selected [ 332.786289] erofs: root inode @ nid 36 [ 332.793700] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:56 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffff7f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 332.833561] erofs: read_super, device -> /dev/loop3 [ 332.837092] erofs: read_super, device -> /dev/loop0 [ 332.842078] erofs: read_super, device -> /dev/loop2 [ 332.843622] erofs: options -> [ 332.850182] FAULT_INJECTION: forcing a failure. [ 332.850182] name failslab, interval 1, probability 0, space 0, times 0 [ 332.867875] erofs: options -> [ 332.876735] erofs: unmounted for /dev/loop5 [ 332.877102] erofs: root inode @ nid 36 [ 332.885092] erofs: root inode @ nid 36 [ 332.885142] erofs: options -> fault_injection=0 [ 332.911009] erofs: bogus i_mode (0) @ nid 36 [ 332.914680] erofs: bogus i_mode (0) @ nid 36 [ 332.917092] CPU: 0 PID: 22263 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 332.922818] erofs: FAULT_INJECTION was not selected [ 332.927729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.927735] Call Trace: [ 332.927757] dump_stack+0x1fc/0x2ef [ 332.927777] should_fail.cold+0xa/0xf [ 332.927794] ? setup_fault_attr+0x200/0x200 [ 332.927808] ? lock_acquire+0x170/0x3c0 [ 332.927827] __should_failslab+0x115/0x180 [ 332.927844] should_failslab+0x5/0x10 [ 332.927857] __kmalloc+0x2ab/0x3c0 [ 332.927875] ? __list_lru_init+0xd3/0x7f0 [ 332.927892] __list_lru_init+0xd3/0x7f0 [ 332.927906] ? up_write+0x18/0x150 [ 332.927923] sget_userns+0x7e2/0xcd0 [ 332.927940] ? set_bdev_super+0x110/0x110 [ 332.941657] erofs: root inode @ nid 36 [ 332.942298] ? ns_test_super+0x50/0x50 [ 332.942316] ? set_bdev_super+0x110/0x110 [ 332.942329] ? ns_test_super+0x50/0x50 [ 332.942345] sget+0x102/0x140 [ 332.945078] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 332.948535] mount_bdev+0xf8/0x3b0 [ 332.948550] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 332.948566] erofs_mount+0x8c/0xc0 [ 332.948581] ? erofs_kill_sb+0x20/0x20 [ 332.948601] ? alloc_pages_current+0x19b/0x2a0 [ 332.948614] ? __lockdep_init_map+0x100/0x5a0 [ 332.948628] mount_fs+0xa3/0x310 [ 333.045553] vfs_kern_mount.part.0+0x68/0x470 [ 333.050036] do_mount+0x115c/0x2f50 [ 333.053661] ? cmp_ex_sort+0xc0/0xc0 [ 333.057373] ? __do_page_fault+0x180/0xd60 [ 333.061598] ? copy_mount_string+0x40/0x40 [ 333.065946] ? memset+0x20/0x40 [ 333.069222] ? copy_mount_options+0x26f/0x380 [ 333.073707] ksys_mount+0xcf/0x130 [ 333.077241] __x64_sys_mount+0xba/0x150 [ 333.081203] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 333.085783] do_syscall_64+0xf9/0x620 [ 333.089575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.094746] RIP: 0033:0x7f7bf183261a [ 333.098442] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 333.117328] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.125030] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a 17:19:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 333.132284] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 333.139546] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 333.146817] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 333.154075] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 47) [ 333.221852] erofs: read_super, device -> /dev/loop1 [ 333.227211] erofs: options -> [ 333.233078] erofs: blksize 1 isn't supported on this platform [ 333.240275] erofs: unmounted for /dev/loop2 17:19:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xee00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 333.423642] FAULT_INJECTION: forcing a failure. [ 333.423642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.435483] CPU: 1 PID: 22292 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 333.443372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.452731] Call Trace: [ 333.455340] dump_stack+0x1fc/0x2ef [ 333.458986] should_fail.cold+0xa/0xf [ 333.462797] ? setup_fault_attr+0x200/0x200 [ 333.467134] ? mark_held_locks+0xf0/0xf0 [ 333.471209] __alloc_pages_nodemask+0x239/0x2890 [ 333.475982] ? __lock_acquire+0x6de/0x3ff0 [ 333.480232] ? __lock_acquire+0x6de/0x3ff0 [ 333.484486] ? __lock_acquire+0x6de/0x3ff0 [ 333.488746] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 333.493603] ? mark_held_locks+0xf0/0xf0 [ 333.497684] ? mark_held_locks+0xf0/0xf0 [ 333.501753] ? lock_downgrade+0x720/0x720 [ 333.505910] ? blkdev_get+0x4ce/0x940 [ 333.506021] erofs: read_super, device -> /dev/loop2 [ 333.509715] ? _atomic_dec_and_lock+0x122/0x1d0 [ 333.514710] erofs: options -> fault_injection=0 [ 333.519371] cache_grow_begin+0xa4/0x8a0 [ 333.519387] ? setup_fault_attr+0x200/0x200 [ 333.519399] ? lock_acquire+0x170/0x3c0 [ 333.519416] cache_alloc_refill+0x273/0x340 [ 333.519433] kmem_cache_alloc_trace+0x354/0x380 [ 333.519449] ? set_bdev_super+0x110/0x110 [ 333.519460] ? ns_test_super+0x50/0x50 [ 333.519473] sget_userns+0x122/0xcd0 [ 333.519485] ? set_bdev_super+0x110/0x110 [ 333.519501] ? ns_test_super+0x50/0x50 [ 333.540014] erofs: FAULT_INJECTION was not selected [ 333.540773] ? set_bdev_super+0x110/0x110 [ 333.545535] erofs: root inode @ nid 36 [ 333.549552] ? ns_test_super+0x50/0x50 [ 333.549565] sget+0x102/0x140 [ 333.549581] mount_bdev+0xf8/0x3b0 [ 333.549596] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 333.549614] erofs_mount+0x8c/0xc0 [ 333.549628] ? erofs_kill_sb+0x20/0x20 [ 333.549646] ? alloc_pages_current+0x19b/0x2a0 [ 333.549663] ? __lockdep_init_map+0x100/0x5a0 [ 333.553867] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 333.557223] mount_fs+0xa3/0x310 [ 333.557245] vfs_kern_mount.part.0+0x68/0x470 [ 333.557263] do_mount+0x115c/0x2f50 [ 333.557279] ? cmp_ex_sort+0xc0/0xc0 [ 333.557296] ? __do_page_fault+0x180/0xd60 [ 333.557315] ? copy_mount_string+0x40/0x40 [ 333.557335] ? memset+0x20/0x40 [ 333.557351] ? copy_mount_options+0x26f/0x380 [ 333.595885] erofs: read_super, device -> /dev/loop3 [ 333.597639] ksys_mount+0xcf/0x130 [ 333.601504] erofs: options -> [ 333.606084] __x64_sys_mount+0xba/0x150 [ 333.606101] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 333.606113] do_syscall_64+0xf9/0x620 [ 333.606132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.606144] RIP: 0033:0x7f7bf183261a [ 333.606157] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 333.606163] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.606177] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 333.606185] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 333.606198] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 333.617958] erofs: root inode @ nid 36 [ 333.620674] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 333.620683] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 333.630422] erofs: read_super, device -> /dev/loop4 [ 333.636289] erofs: read_super, device -> /dev/loop5 [ 333.637256] erofs: options -> fault_injection=0 [ 333.641482] erofs: read_super, device -> /dev/loop0 [ 333.644831] erofs: FAULT_INJECTION was not selected 17:19:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 48) 17:19:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:57 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 333.668966] erofs: read_super, device -> /dev/loop1 [ 333.689358] erofs: root inode @ nid 36 [ 333.703892] erofs: options -> [ 333.721253] erofs: options -> fault_injection=0 [ 333.780054] erofs: mounted on /dev/loop4 with opts: fault_injection=0. [ 333.781376] erofs: FAULT_INJECTION was not selected [ 333.785014] erofs: blksize 1 isn't supported on this platform [ 333.811759] erofs: root inode @ nid 36 [ 333.816836] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:57 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 333.846144] erofs: unmounted for /dev/loop4 [ 333.846664] erofs: bogus i_mode (0) @ nid 36 [ 333.851939] erofs: options -> [ 333.861021] erofs: unmounted for /dev/loop5 [ 333.864734] erofs: root inode @ nid 36 [ 333.882625] erofs: bogus i_mode (0) @ nid 36 [ 333.885009] erofs: unmounted for /dev/loop2 [ 334.042279] erofs: read_super, device -> /dev/loop1 17:19:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x99030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 334.064657] erofs: options -> 17:19:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 334.089409] erofs: blksize 1 isn't supported on this platform [ 334.141717] erofs: read_super, device -> /dev/loop3 [ 334.147072] erofs: read_super, device -> /dev/loop5 [ 334.155754] erofs: options -> fault_injection=0 [ 334.162827] erofs: options -> [ 334.165940] erofs: FAULT_INJECTION was not selected [ 334.173382] erofs: root inode @ nid 36 [ 334.173830] erofs: root inode @ nid 36 [ 334.186827] erofs: bogus i_mode (0) @ nid 36 [ 334.194335] erofs: read_super, device -> /dev/loop2 [ 334.194566] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 334.199636] FAULT_INJECTION: forcing a failure. [ 334.199636] name failslab, interval 1, probability 0, space 0, times 0 [ 334.230229] erofs: options -> fault_injection=0 [ 334.239840] erofs: read_super, device -> /dev/loop0 17:19:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:58 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 334.254173] erofs: options -> [ 334.272613] erofs: unmounted for /dev/loop5 [ 334.275292] erofs: root inode @ nid 36 [ 334.283691] erofs: bogus i_mode (0) @ nid 36 [ 334.310360] erofs: FAULT_INJECTION was not selected [ 334.326299] erofs: root inode @ nid 36 [ 334.337970] erofs: read_super, device -> /dev/loop1 [ 334.343137] CPU: 0 PID: 22342 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 334.351025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.360382] Call Trace: [ 334.362968] dump_stack+0x1fc/0x2ef [ 334.366613] should_fail.cold+0xa/0xf [ 334.370409] ? setup_fault_attr+0x200/0x200 [ 334.374722] ? lock_acquire+0x170/0x3c0 [ 334.378690] __should_failslab+0x115/0x180 [ 334.382919] should_failslab+0x5/0x10 [ 334.386707] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 334.391803] __kmalloc_node+0x38/0x70 [ 334.395600] kvmalloc_node+0x61/0xf0 [ 334.399310] __list_lru_init+0x4c6/0x7f0 [ 334.403362] ? up_read+0xb3/0x110 [ 334.406810] sget_userns+0x7e2/0xcd0 [ 334.410517] ? set_bdev_super+0x110/0x110 [ 334.414659] ? ns_test_super+0x50/0x50 [ 334.418541] ? set_bdev_super+0x110/0x110 [ 334.422679] ? ns_test_super+0x50/0x50 [ 334.426555] sget+0x102/0x140 [ 334.429650] mount_bdev+0xf8/0x3b0 [ 334.433178] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 334.438447] erofs_mount+0x8c/0xc0 [ 334.441997] ? erofs_kill_sb+0x20/0x20 [ 334.445880] ? alloc_pages_current+0x19b/0x2a0 [ 334.450454] ? __lockdep_init_map+0x100/0x5a0 [ 334.454937] mount_fs+0xa3/0x310 [ 334.458297] vfs_kern_mount.part.0+0x68/0x470 [ 334.462787] do_mount+0x115c/0x2f50 [ 334.466404] ? cmp_ex_sort+0xc0/0xc0 [ 334.470107] ? __do_page_fault+0x180/0xd60 [ 334.474331] ? copy_mount_string+0x40/0x40 [ 334.478565] ? memset+0x20/0x40 [ 334.481837] ? copy_mount_options+0x26f/0x380 [ 334.486325] ksys_mount+0xcf/0x130 [ 334.489857] __x64_sys_mount+0xba/0x150 [ 334.493824] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 334.498392] do_syscall_64+0xf9/0x620 [ 334.502186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.507360] RIP: 0033:0x7f7bf183261a [ 334.511063] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 334.529950] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 334.537644] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 334.544905] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 334.552160] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 334.559414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 334.566672] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 334.597078] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:19:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9a030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 334.608794] erofs: read_super, device -> /dev/loop5 [ 334.613843] erofs: options -> fault_injection=0 [ 334.622195] erofs: FAULT_INJECTION was not selected [ 334.626823] erofs: options -> [ 334.629612] erofs: root inode @ nid 36 [ 334.640021] erofs: blksize 1 isn't supported on this platform [ 334.650053] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:19:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:58 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 334.708312] erofs: unmounted for /dev/loop5 [ 334.717533] erofs: unmounted for /dev/loop2 17:19:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 49) 17:19:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x268b, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 334.841485] erofs: read_super, device -> /dev/loop3 [ 334.852976] erofs: options -> [ 334.861037] erofs: root inode @ nid 36 [ 334.865274] erofs: bogus i_mode (0) @ nid 36 [ 334.890086] erofs: read_super, device -> /dev/loop0 [ 334.895140] erofs: options -> [ 334.921198] erofs: root inode @ nid 36 [ 334.933070] erofs: read_super, device -> /dev/loop1 17:19:58 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:58 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 334.943548] erofs: bogus i_mode (0) @ nid 36 [ 334.960547] erofs: options -> [ 334.968227] erofs: blksize 1 isn't supported on this platform [ 335.039790] erofs: read_super, device -> /dev/loop3 [ 335.045233] erofs: options -> [ 335.045833] erofs: read_super, device -> /dev/loop2 [ 335.053817] erofs: read_super, device -> /dev/loop5 [ 335.059220] FAULT_INJECTION: forcing a failure. [ 335.059220] name failslab, interval 1, probability 0, space 0, times 0 [ 335.066065] erofs: options -> fault_injection=0 [ 335.076398] erofs: options -> fault_injection=0 [ 335.082413] erofs: FAULT_INJECTION was not selected [ 335.093730] erofs: FAULT_INJECTION was not selected [ 335.096386] CPU: 1 PID: 22386 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 335.106066] erofs: root inode @ nid 36 [ 335.106662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.106668] Call Trace: [ 335.106688] dump_stack+0x1fc/0x2ef [ 335.106707] should_fail.cold+0xa/0xf [ 335.110920] erofs: bogus i_mode (0) @ nid 36 [ 335.119945] ? setup_fault_attr+0x200/0x200 [ 335.119962] ? lock_acquire+0x170/0x3c0 [ 335.119983] __should_failslab+0x115/0x180 [ 335.119998] should_failslab+0x5/0x10 [ 335.120010] kmem_cache_alloc+0x277/0x370 [ 335.120028] radix_tree_node_alloc.constprop.0+0x7c/0x320 [ 335.120044] idr_get_free+0x50e/0xa10 [ 335.120068] idr_alloc_u32+0x1a5/0x320 [ 335.120085] ? __fprop_inc_percpu_max+0x210/0x210 [ 335.120097] ? __mutex_unlock_slowpath+0xea/0x610 [ 335.120112] ? should_fail+0x142/0x7b0 [ 335.120126] ? fs_reclaim_release+0xd0/0x110 [ 335.120141] ? setup_fault_attr+0x200/0x200 [ 335.120155] ? lock_acquire+0x170/0x3c0 [ 335.120175] idr_alloc+0xc2/0x130 [ 335.135066] erofs: root inode @ nid 36 [ 335.138863] ? idr_alloc_u32+0x320/0x320 [ 335.138888] prealloc_shrinker+0x193/0x340 [ 335.138905] sget_userns+0x7b4/0xcd0 [ 335.138919] ? set_bdev_super+0x110/0x110 [ 335.138938] ? ns_test_super+0x50/0x50 [ 335.138953] ? set_bdev_super+0x110/0x110 [ 335.138964] ? ns_test_super+0x50/0x50 [ 335.138981] sget+0x102/0x140 [ 335.164372] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 335.164402] mount_bdev+0xf8/0x3b0 [ 335.188616] erofs: root inode @ nid 36 [ 335.190508] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 335.190527] erofs_mount+0x8c/0xc0 [ 335.190540] ? erofs_kill_sb+0x20/0x20 [ 335.190559] ? alloc_pages_current+0x19b/0x2a0 [ 335.194925] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 335.198215] ? __lockdep_init_map+0x100/0x5a0 [ 335.198229] mount_fs+0xa3/0x310 [ 335.198253] vfs_kern_mount.part.0+0x68/0x470 [ 335.198273] do_mount+0x115c/0x2f50 [ 335.198291] ? cmp_ex_sort+0xc0/0xc0 [ 335.198305] ? __do_page_fault+0x180/0xd60 [ 335.198320] ? copy_mount_string+0x40/0x40 [ 335.198343] ? memset+0x20/0x40 [ 335.303090] ? copy_mount_options+0x26f/0x380 [ 335.307617] ksys_mount+0xcf/0x130 [ 335.311174] __x64_sys_mount+0xba/0x150 [ 335.315163] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 335.319762] do_syscall_64+0xf9/0x620 [ 335.323584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.328783] RIP: 0033:0x7f7bf183261a [ 335.332508] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 335.351413] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.359137] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 335.366415] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 335.373708] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 335.380986] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 17:19:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:19:59 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 335.388267] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:19:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 50) 17:19:59 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 335.443475] erofs: read_super, device -> /dev/loop0 [ 335.449204] erofs: read_super, device -> /dev/loop1 [ 335.461304] erofs: unmounted for /dev/loop2 [ 335.470571] erofs: unmounted for /dev/loop5 [ 335.477542] erofs: options -> [ 335.480961] erofs: options -> [ 335.494220] erofs: root inode @ nid 36 [ 335.499714] erofs: bogus i_mode (0) @ nid 36 [ 335.501751] erofs: blksize 1 isn't supported on this platform 17:19:59 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:19:59 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9c030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 335.681047] erofs: read_super, device -> /dev/loop3 [ 335.691424] erofs: options -> [ 335.699408] FAULT_INJECTION: forcing a failure. [ 335.699408] name failslab, interval 1, probability 0, space 0, times 0 [ 335.722655] erofs: read_super, device -> /dev/loop2 [ 335.730044] erofs: read_super, device -> /dev/loop5 [ 335.735092] erofs: options -> fault_injection=0 [ 335.773315] erofs: options -> fault_injection=0 [ 335.779431] erofs: root inode @ nid 36 [ 335.784019] erofs: FAULT_INJECTION was not selected [ 335.791410] erofs: root inode @ nid 36 [ 335.795446] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 335.808733] CPU: 1 PID: 22417 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 335.813777] erofs: FAULT_INJECTION was not selected [ 335.816636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.816642] Call Trace: [ 335.816666] dump_stack+0x1fc/0x2ef [ 335.816688] should_fail.cold+0xa/0xf [ 335.816706] ? setup_fault_attr+0x200/0x200 [ 335.816720] ? lock_acquire+0x170/0x3c0 [ 335.816765] __should_failslab+0x115/0x180 [ 335.816782] should_failslab+0x5/0x10 [ 335.816797] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 335.816815] __kmalloc_node+0x38/0x70 [ 335.816832] kvmalloc_node+0x61/0xf0 [ 335.816847] __list_lru_init+0x4c6/0x7f0 [ 335.816861] ? up_read+0xb3/0x110 [ 335.816880] sget_userns+0x810/0xcd0 [ 335.816893] ? set_bdev_super+0x110/0x110 [ 335.816915] ? ns_test_super+0x50/0x50 [ 335.824389] erofs: bogus i_mode (0) @ nid 36 [ 335.831286] ? set_bdev_super+0x110/0x110 [ 335.831301] ? ns_test_super+0x50/0x50 [ 335.831315] sget+0x102/0x140 [ 335.831333] mount_bdev+0xf8/0x3b0 [ 335.831348] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 335.831363] erofs_mount+0x8c/0xc0 [ 335.831376] ? erofs_kill_sb+0x20/0x20 [ 335.831393] ? alloc_pages_current+0x19b/0x2a0 [ 335.831406] ? __lockdep_init_map+0x100/0x5a0 [ 335.831425] mount_fs+0xa3/0x310 [ 335.831447] vfs_kern_mount.part.0+0x68/0x470 [ 335.844026] erofs: root inode @ nid 36 [ 335.845751] do_mount+0x115c/0x2f50 [ 335.845771] ? cmp_ex_sort+0xc0/0xc0 [ 335.845789] ? __do_page_fault+0x180/0xd60 [ 335.845804] ? copy_mount_string+0x40/0x40 [ 335.845825] ? memset+0x20/0x40 [ 335.845840] ? copy_mount_options+0x26f/0x380 [ 335.845857] ksys_mount+0xcf/0x130 [ 335.845873] __x64_sys_mount+0xba/0x150 [ 335.845892] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 335.876985] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 335.877945] do_syscall_64+0xf9/0x620 [ 335.877967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.877980] RIP: 0033:0x7f7bf183261a [ 335.877994] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 335.878002] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:20:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 336.023461] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 336.030720] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 336.037974] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 336.045227] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 336.052483] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:20:00 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 336.074266] erofs: read_super, device -> /dev/loop0 [ 336.087070] erofs: unmounted for /dev/loop2 [ 336.099914] erofs: options -> [ 336.103443] erofs: unmounted for /dev/loop5 [ 336.118356] erofs: read_super, device -> /dev/loop1 17:20:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 336.124059] erofs: options -> [ 336.124792] erofs: root inode @ nid 36 [ 336.143964] erofs: blksize 1 isn't supported on this platform [ 336.163129] erofs: bogus i_mode (0) @ nid 36 17:20:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 51) 17:20:00 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9d030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 336.302991] erofs: read_super, device -> /dev/loop2 [ 336.303123] erofs: read_super, device -> /dev/loop5 [ 336.332139] erofs: options -> fault_injection=0 [ 336.335836] erofs: options -> fault_injection=0 [ 336.347230] erofs: FAULT_INJECTION was not selected [ 336.358386] erofs: FAULT_INJECTION was not selected [ 336.377104] erofs: root inode @ nid 36 [ 336.381982] erofs: root inode @ nid 36 [ 336.394162] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 336.400155] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 336.421395] erofs: read_super, device -> /dev/loop0 [ 336.426687] erofs: options -> [ 336.434406] erofs: read_super, device -> /dev/loop3 [ 336.434569] FAULT_INJECTION: forcing a failure. [ 336.434569] name failslab, interval 1, probability 0, space 0, times 0 [ 336.446239] erofs: read_super, device -> /dev/loop1 [ 336.455752] erofs: root inode @ nid 36 [ 336.464474] erofs: bogus i_mode (0) @ nid 36 17:20:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:20:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d02, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 336.464938] erofs: options -> [ 336.483343] erofs: unmounted for /dev/loop5 [ 336.483534] erofs: root inode @ nid 36 [ 336.487904] erofs: unmounted for /dev/loop2 [ 336.494598] erofs: options -> [ 336.497258] CPU: 1 PID: 22469 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 336.505238] erofs: blksize 1 isn't supported on this platform [ 336.507345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.507350] Call Trace: [ 336.507370] dump_stack+0x1fc/0x2ef [ 336.507391] should_fail.cold+0xa/0xf [ 336.507410] ? setup_fault_attr+0x200/0x200 [ 336.507425] ? lock_acquire+0x170/0x3c0 [ 336.507447] __should_failslab+0x115/0x180 [ 336.507463] should_failslab+0x5/0x10 [ 336.507478] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 336.507498] __kmalloc_node+0x38/0x70 [ 336.527220] erofs: bogus i_mode (0) @ nid 36 [ 336.528989] kvmalloc_node+0x61/0xf0 [ 336.529008] __list_lru_init+0x4c6/0x7f0 [ 336.529024] ? up_read+0xb3/0x110 [ 336.529042] sget_userns+0x7e2/0xcd0 [ 336.529057] ? set_bdev_super+0x110/0x110 [ 336.581336] ? ns_test_super+0x50/0x50 [ 336.585219] ? set_bdev_super+0x110/0x110 [ 336.589355] ? ns_test_super+0x50/0x50 [ 336.593229] sget+0x102/0x140 [ 336.596332] mount_bdev+0xf8/0x3b0 [ 336.599879] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 336.605167] erofs_mount+0x8c/0xc0 [ 336.608692] ? erofs_kill_sb+0x20/0x20 [ 336.612565] ? alloc_pages_current+0x19b/0x2a0 [ 336.617142] ? __lockdep_init_map+0x100/0x5a0 [ 336.621821] mount_fs+0xa3/0x310 [ 336.625179] vfs_kern_mount.part.0+0x68/0x470 [ 336.629674] do_mount+0x115c/0x2f50 [ 336.633286] ? cmp_ex_sort+0xc0/0xc0 [ 336.636996] ? __do_page_fault+0x180/0xd60 [ 336.641226] ? copy_mount_string+0x40/0x40 [ 336.645445] ? memset+0x20/0x40 [ 336.648713] ? copy_mount_options+0x26f/0x380 [ 336.653192] ksys_mount+0xcf/0x130 [ 336.656731] __x64_sys_mount+0xba/0x150 [ 336.660710] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 336.665283] do_syscall_64+0xf9/0x620 [ 336.669073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.674244] RIP: 0033:0x7f7bf183261a [ 336.677949] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 336.696857] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 336.704565] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 336.711822] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 17:20:00 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 336.719083] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 336.726354] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 336.733621] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:20:00 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 52) 17:20:00 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9e030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 336.941185] erofs: read_super, device -> /dev/loop3 [ 336.943897] erofs: read_super, device -> /dev/loop5 [ 336.953239] erofs: options -> [ 336.957210] erofs: options -> fault_injection=0 [ 336.962127] erofs: read_super, device -> /dev/loop4 [ 336.970672] erofs: FAULT_INJECTION was not selected [ 336.970677] erofs: options -> fault_injection=0 [ 336.970694] FAULT_INJECTION: forcing a failure. [ 336.970694] name failslab, interval 1, probability 0, space 0, times 0 [ 336.979045] erofs: root inode @ nid 36 [ 336.981215] CPU: 0 PID: 22491 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 336.992843] erofs: root inode @ nid 36 [ 336.995568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.995573] Call Trace: [ 336.995594] dump_stack+0x1fc/0x2ef [ 336.995618] should_fail.cold+0xa/0xf [ 336.995640] ? setup_fault_attr+0x200/0x200 [ 337.009004] erofs: read_super, device -> /dev/loop2 [ 337.016727] ? lock_acquire+0x170/0x3c0 [ 337.016751] __should_failslab+0x115/0x180 [ 337.016768] should_failslab+0x5/0x10 [ 337.016781] kmem_cache_alloc_trace+0x284/0x380 [ 337.016797] erofs_fill_super+0x167/0x12cc [ 337.016815] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 337.016833] ? vsprintf+0x30/0x30 [ 337.031720] erofs: read_super, device -> /dev/loop1 [ 337.036125] ? wait_for_completion_io+0x10/0x10 [ 337.036144] ? set_blocksize+0x163/0x3f0 [ 337.036168] mount_bdev+0x2fc/0x3b0 [ 337.042699] erofs: read_super, device -> /dev/loop0 [ 337.044352] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 337.073849] erofs: options -> [ 337.075468] erofs_mount+0x8c/0xc0 [ 337.075486] ? erofs_kill_sb+0x20/0x20 [ 337.075503] ? alloc_pages_current+0x19b/0x2a0 [ 337.075524] ? __lockdep_init_map+0x100/0x5a0 [ 337.093349] erofs: options -> fault_injection=0 [ 337.093451] mount_fs+0xa3/0x310 [ 337.105138] erofs: options -> [ 337.108617] vfs_kern_mount.part.0+0x68/0x470 [ 337.108640] do_mount+0x115c/0x2f50 [ 337.108657] ? cmp_ex_sort+0xc0/0xc0 [ 337.108673] ? __do_page_fault+0x180/0xd60 [ 337.108692] ? copy_mount_string+0x40/0x40 [ 337.126992] erofs: FAULT_INJECTION was not selected [ 337.128860] ? memset+0x20/0x40 [ 337.128879] ? copy_mount_options+0x26f/0x380 [ 337.128895] ksys_mount+0xcf/0x130 [ 337.132568] erofs: root inode @ nid 36 [ 337.136210] __x64_sys_mount+0xba/0x150 [ 337.136240] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 337.136255] do_syscall_64+0xf9/0x620 [ 337.136273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.136286] RIP: 0033:0x7f7bf183261a [ 337.144774] erofs: root inode @ nid 36 17:20:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 53) [ 337.149719] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 337.149727] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 337.149741] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 337.149750] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 337.149758] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 17:20:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7d020000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 337.149765] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 337.149773] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 337.154183] erofs: blksize 1 isn't supported on this platform [ 337.159309] erofs: bogus i_mode (0) @ nid 36 [ 337.181687] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 337.183709] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 337.188735] erofs: bogus i_mode (0) @ nid 36 17:20:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:20:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 337.319605] erofs: unmounted for /dev/loop2 [ 337.347168] erofs: unmounted for /dev/loop5 [ 337.464999] erofs: read_super, device -> /dev/loop4 [ 337.470398] erofs: options -> fault_injection=0 [ 337.490441] erofs: FAULT_INJECTION was not selected 17:20:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9f030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 337.512337] erofs: root inode @ nid 36 [ 337.538678] FAULT_INJECTION: forcing a failure. [ 337.538678] name failslab, interval 1, probability 0, space 0, times 0 [ 337.563486] CPU: 1 PID: 22513 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 337.571391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.580746] Call Trace: [ 337.583346] dump_stack+0x1fc/0x2ef [ 337.586985] should_fail.cold+0xa/0xf [ 337.590797] ? setup_fault_attr+0x200/0x200 [ 337.595124] ? lock_acquire+0x170/0x3c0 [ 337.599106] __should_failslab+0x115/0x180 [ 337.603348] should_failslab+0x5/0x10 [ 337.607154] kmem_cache_alloc+0x277/0x370 [ 337.607857] erofs: read_super, device -> /dev/loop3 [ 337.611306] ? destroy_inode+0x20/0x20 [ 337.611323] alloc_inode+0x18/0x50 [ 337.611336] ? destroy_inode+0x20/0x20 [ 337.611353] alloc_inode+0x5d/0x180 [ 337.631233] new_inode+0x1d/0xf0 [ 337.631754] erofs: options -> [ 337.634605] erofs_fill_super+0xde9/0x12cc [ 337.634626] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 337.634644] ? vsprintf+0x30/0x30 [ 337.650451] erofs: read_super, device -> /dev/loop2 [ 337.650743] ? wait_for_completion_io+0x10/0x10 [ 337.656095] erofs: read_super, device -> /dev/loop5 [ 337.660390] ? set_blocksize+0x163/0x3f0 [ 337.660411] mount_bdev+0x2fc/0x3b0 [ 337.660428] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 337.676550] erofs: options -> fault_injection=0 [ 337.678354] erofs_mount+0x8c/0xc0 [ 337.678370] ? erofs_kill_sb+0x20/0x20 [ 337.678389] ? alloc_pages_current+0x19b/0x2a0 [ 337.683197] erofs: options -> fault_injection=0 [ 337.686571] ? __lockdep_init_map+0x100/0x5a0 [ 337.686588] mount_fs+0xa3/0x310 [ 337.686607] vfs_kern_mount.part.0+0x68/0x470 [ 337.686623] do_mount+0x115c/0x2f50 [ 337.686640] ? cmp_ex_sort+0xc0/0xc0 [ 337.686655] ? __do_page_fault+0x180/0xd60 [ 337.686670] ? copy_mount_string+0x40/0x40 [ 337.686693] ? memset+0x20/0x40 [ 337.686707] ? copy_mount_options+0x26f/0x380 [ 337.686723] ksys_mount+0xcf/0x130 [ 337.686741] __x64_sys_mount+0xba/0x150 [ 337.696402] erofs: FAULT_INJECTION was not selected [ 337.699837] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 337.699852] do_syscall_64+0xf9/0x620 [ 337.699872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.699885] RIP: 0033:0x7f7bf183261a [ 337.704517] erofs: FAULT_INJECTION was not selected [ 337.707723] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 337.707732] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 337.707747] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 337.707755] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 337.707763] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 337.707770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 337.707777] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 337.734767] erofs: root inode @ nid 36 [ 337.736195] erofs: root inode @ nid 36 [ 337.741240] erofs: root inode @ nid 36 [ 337.754560] erofs: read_super, device -> /dev/loop1 [ 337.757607] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 337.780909] erofs: options -> [ 337.792226] erofs: bogus i_mode (0) @ nid 36 [ 337.814283] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 337.822601] erofs: blksize 1 isn't supported on this platform 17:20:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 337.918490] erofs: read_super, device -> /dev/loop0 17:20:01 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8b26, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:20:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 54) 17:20:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8ac881f0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 337.960556] erofs: options -> [ 337.977500] erofs: root inode @ nid 36 [ 337.984668] erofs: unmounted for /dev/loop5 [ 337.992251] erofs: unmounted for /dev/loop2 [ 338.003737] erofs: bogus i_mode (0) @ nid 36 17:20:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa0030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 338.150032] erofs: read_super, device -> /dev/loop1 [ 338.160584] erofs: options -> [ 338.164884] erofs: blksize 1 isn't supported on this platform 17:20:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 338.216619] erofs: read_super, device -> /dev/loop5 [ 338.221970] erofs: read_super, device -> /dev/loop3 [ 338.223950] erofs: options -> fault_injection=0 [ 338.235974] erofs: options -> [ 338.239848] erofs: FAULT_INJECTION was not selected [ 338.245123] erofs: root inode @ nid 36 [ 338.246855] erofs: root inode @ nid 36 [ 338.252891] erofs: mounted on /dev/loop5 with opts: fault_injection=0. [ 338.253006] erofs: bogus i_mode (0) @ nid 36 [ 338.264504] erofs: read_super, device -> /dev/loop4 [ 338.269592] erofs: options -> fault_injection=0 [ 338.277055] FAULT_INJECTION: forcing a failure. [ 338.277055] name failslab, interval 1, probability 0, space 0, times 0 [ 338.289786] CPU: 1 PID: 22554 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 338.297676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.307028] Call Trace: [ 338.309625] dump_stack+0x1fc/0x2ef [ 338.313102] erofs: read_super, device -> /dev/loop2 [ 338.313263] should_fail.cold+0xa/0xf [ 338.322067] ? setup_fault_attr+0x200/0x200 [ 338.326406] ? lock_acquire+0x170/0x3c0 [ 338.326898] erofs: options -> fault_injection=0 [ 338.330390] __should_failslab+0x115/0x180 [ 338.330410] should_failslab+0x5/0x10 [ 338.330423] __kmalloc+0x2ab/0x3c0 [ 338.330438] ? match_number+0xad/0x230 [ 338.330455] match_number+0xad/0x230 [ 338.330469] ? match_strdup+0xa0/0xa0 [ 338.330490] erofs_fill_super+0xcd8/0x12cc [ 338.362273] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 338.367567] ? vsprintf+0x30/0x30 [ 338.371030] ? wait_for_completion_io+0x10/0x10 [ 338.375706] ? set_blocksize+0x163/0x3f0 [ 338.379781] mount_bdev+0x2fc/0x3b0 [ 338.383416] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 338.388702] erofs_mount+0x8c/0xc0 [ 338.392254] ? erofs_kill_sb+0x20/0x20 [ 338.396160] ? alloc_pages_current+0x19b/0x2a0 [ 338.400750] ? __lockdep_init_map+0x100/0x5a0 [ 338.405252] mount_fs+0xa3/0x310 [ 338.407635] erofs: FAULT_INJECTION was not selected 17:20:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 338.408625] vfs_kern_mount.part.0+0x68/0x470 [ 338.413618] erofs: root inode @ nid 36 [ 338.418099] do_mount+0x115c/0x2f50 [ 338.418115] ? cmp_ex_sort+0xc0/0xc0 [ 338.418132] ? __do_page_fault+0x180/0xd60 [ 338.418146] ? copy_mount_string+0x40/0x40 [ 338.418167] ? memset+0x20/0x40 [ 338.418182] ? copy_mount_options+0x26f/0x380 [ 338.418198] ksys_mount+0xcf/0x130 [ 338.418214] __x64_sys_mount+0xba/0x150 [ 338.425787] erofs: read_super, device -> /dev/loop0 [ 338.429392] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 338.433601] erofs: options -> [ 338.437828] do_syscall_64+0xf9/0x620 [ 338.437849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.437860] RIP: 0033:0x7f7bf183261a [ 338.437878] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 338.437885] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 338.437898] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 338.437905] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 338.437913] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 338.437919] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 338.437926] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 338.481117] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 338.499242] erofs: unmounted for /dev/loop5 [ 338.513235] erofs: root inode @ nid 36 [ 338.558490] erofs: bogus i_mode (0) @ nid 36 17:20:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa1030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 55) 17:20:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9103, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 338.651603] erofs: read_super, device -> /dev/loop1 [ 338.668859] erofs: options -> [ 338.672799] erofs: blksize 1 isn't supported on this platform [ 338.734569] erofs: unmounted for /dev/loop2 17:20:02 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 338.812824] erofs: read_super, device -> /dev/loop3 [ 338.832338] erofs: options -> [ 338.836404] erofs: root inode @ nid 36 [ 338.840735] erofs: read_super, device -> /dev/loop1 [ 338.840741] erofs: bogus i_mode (0) @ nid 36 [ 338.844940] erofs: read_super, device -> /dev/loop2 [ 338.856357] erofs: options -> fault_injection=0 17:20:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x91030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 338.861348] erofs: FAULT_INJECTION was not selected [ 338.869961] erofs: root inode @ nid 36 [ 338.874556] erofs: mounted on /dev/loop2 with opts: fault_injection=0. [ 338.875968] erofs: options -> [ 338.887011] erofs: read_super, device -> /dev/loop0 [ 338.897985] FAULT_INJECTION: forcing a failure. [ 338.897985] name failslab, interval 1, probability 0, space 0, times 0 17:20:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb603, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 338.912396] erofs: read_super, device -> /dev/loop5 [ 338.932940] erofs: options -> [ 338.935714] erofs: unmounted for /dev/loop2 [ 338.942518] erofs: options -> fault_injection=0 [ 338.947946] erofs: blksize 1 isn't supported on this platform [ 338.956099] erofs: root inode @ nid 36 [ 338.964101] erofs: FAULT_INJECTION was not selected [ 338.967047] CPU: 0 PID: 22600 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 338.971894] erofs: bogus i_mode (0) @ nid 36 [ 338.977009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.977014] Call Trace: [ 338.977035] dump_stack+0x1fc/0x2ef [ 338.977052] should_fail.cold+0xa/0xf [ 338.977070] ? setup_fault_attr+0x200/0x200 [ 338.981553] erofs: root inode @ nid 36 [ 338.990815] ? lock_acquire+0x170/0x3c0 [ 338.990835] __should_failslab+0x115/0x180 [ 338.990852] should_failslab+0x5/0x10 [ 338.990865] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 338.990881] __kmalloc_node+0x38/0x70 [ 339.029889] kvmalloc_node+0x61/0xf0 [ 339.033600] __list_lru_init+0x4c6/0x7f0 [ 339.037653] ? up_read+0xb3/0x110 [ 339.041100] sget_userns+0x810/0xcd0 [ 339.044807] ? set_bdev_super+0x110/0x110 [ 339.048946] ? ns_test_super+0x50/0x50 [ 339.052825] ? set_bdev_super+0x110/0x110 [ 339.056959] ? ns_test_super+0x50/0x50 [ 339.060835] sget+0x102/0x140 [ 339.063932] mount_bdev+0xf8/0x3b0 [ 339.067463] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 339.072728] erofs_mount+0x8c/0xc0 [ 339.076259] ? erofs_kill_sb+0x20/0x20 [ 339.080139] ? alloc_pages_current+0x19b/0x2a0 [ 339.084709] ? __lockdep_init_map+0x100/0x5a0 [ 339.089190] mount_fs+0xa3/0x310 [ 339.092550] vfs_kern_mount.part.0+0x68/0x470 [ 339.097037] do_mount+0x115c/0x2f50 [ 339.100655] ? cmp_ex_sort+0xc0/0xc0 [ 339.104362] ? __do_page_fault+0x180/0xd60 [ 339.108586] ? copy_mount_string+0x40/0x40 [ 339.112814] ? memset+0x20/0x40 [ 339.116083] ? copy_mount_options+0x26f/0x380 [ 339.120567] ksys_mount+0xcf/0x130 [ 339.124098] __x64_sys_mount+0xba/0x150 [ 339.128066] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 339.132637] do_syscall_64+0xf9/0x620 [ 339.136431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.141608] RIP: 0033:0x7f7bf183261a [ 339.145310] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 339.164198] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 339.171894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 339.179150] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 339.186409] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 339.193664] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 339.200919] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 17:20:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) 17:20:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa2030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 339.212189] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:20:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) (fail_nth: 56) 17:20:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 339.345946] erofs: read_super, device -> /dev/loop2 [ 339.354013] erofs: options -> fault_injection=0 [ 339.368633] erofs: read_super, device -> /dev/loop3 [ 339.373678] erofs: options -> [ 339.397244] erofs: unmounted for /dev/loop5 [ 339.402439] erofs: FAULT_INJECTION was not selected [ 339.406043] erofs: read_super, device -> /dev/loop0 [ 339.418478] erofs: root inode @ nid 36 [ 339.425037] erofs: root inode @ nid 36 [ 339.433539] erofs: options -> [ 339.440953] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:20:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb703, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 339.442744] erofs: bogus i_mode (0) @ nid 36 [ 339.466389] erofs: root inode @ nid 36 [ 339.479665] erofs: bogus i_mode (0) @ nid 36 [ 339.492382] erofs: unmounted for /dev/loop2 [ 339.519635] erofs: read_super, device -> /dev/loop1 [ 339.524678] erofs: options -> [ 339.528740] erofs: blksize 1 isn't supported on this platform 17:20:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 339.565913] erofs: read_super, device -> /dev/loop4 [ 339.575832] erofs: options -> fault_injection=0 [ 339.583159] erofs: FAULT_INJECTION was not selected [ 339.592497] erofs: root inode @ nid 36 [ 339.597837] FAULT_INJECTION: forcing a failure. [ 339.597837] name failslab, interval 1, probability 0, space 0, times 0 [ 339.617052] erofs: read_super, device -> /dev/loop5 17:20:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa3030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 339.653937] erofs: options -> fault_injection=0 17:20:03 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 339.680999] erofs: FAULT_INJECTION was not selected [ 339.686681] CPU: 1 PID: 22645 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 339.694577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.703934] Call Trace: [ 339.706531] dump_stack+0x1fc/0x2ef [ 339.710172] should_fail.cold+0xa/0xf [ 339.713987] ? setup_fault_attr+0x200/0x200 [ 339.718317] ? lock_acquire+0x170/0x3c0 [ 339.722307] __should_failslab+0x115/0x180 [ 339.726552] should_failslab+0x5/0x10 [ 339.730359] kmem_cache_alloc+0x277/0x370 [ 339.734527] __d_alloc+0x2b/0xa10 [ 339.737994] d_make_root+0x3e/0x90 [ 339.741535] erofs_fill_super+0x102f/0x12cc [ 339.745860] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 339.751126] ? vsprintf+0x30/0x30 [ 339.754571] ? wait_for_completion_io+0x10/0x10 [ 339.759227] ? set_blocksize+0x163/0x3f0 [ 339.763279] mount_bdev+0x2fc/0x3b0 [ 339.766896] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 339.772161] erofs_mount+0x8c/0xc0 [ 339.775690] ? erofs_kill_sb+0x20/0x20 [ 339.779570] ? alloc_pages_current+0x19b/0x2a0 [ 339.784141] ? __lockdep_init_map+0x100/0x5a0 [ 339.788652] mount_fs+0xa3/0x310 [ 339.792010] vfs_kern_mount.part.0+0x68/0x470 [ 339.796497] do_mount+0x115c/0x2f50 [ 339.800118] ? cmp_ex_sort+0xc0/0xc0 [ 339.803821] ? __do_page_fault+0x180/0xd60 [ 339.808044] ? copy_mount_string+0x40/0x40 [ 339.812273] ? memset+0x20/0x40 [ 339.815541] ? copy_mount_options+0x26f/0x380 [ 339.820028] ksys_mount+0xcf/0x130 [ 339.823559] __x64_sys_mount+0xba/0x150 [ 339.827523] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 339.832097] do_syscall_64+0xf9/0x620 [ 339.835890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.841065] RIP: 0033:0x7f7bf183261a [ 339.844768] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 339.863669] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 339.871372] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 339.878632] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 339.885896] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 339.893509] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 339.900780] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 339.957886] erofs: read_super, device -> /dev/loop0 [ 339.963248] erofs: options -> [ 339.967796] erofs: root inode @ nid 36 [ 339.971943] erofs: bogus i_mode (0) @ nid 36 [ 339.974511] erofs: root inode @ nid 36 [ 339.993468] erofs: read_super, device -> /dev/loop3 [ 340.001492] erofs: mounted on /dev/loop5 with opts: fault_injection=0. 17:20:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa4030000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 340.018956] erofs: options -> [ 340.029957] erofs: root inode @ nid 36 [ 340.049215] erofs: bogus i_mode (0) @ nid 36 17:20:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) 17:20:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb803, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x83, &(0x7f0000000180)=ANY=[@ANYBLOB='fault_injection=0']) [ 340.072260] erofs: read_super, device -> /dev/loop2 [ 340.077413] erofs: options -> fault_injection=0 [ 340.083502] erofs: FAULT_INJECTION was not selected [ 340.090151] erofs: root inode @ nid 36 [ 340.094293] erofs: mounted on /dev/loop2 with opts: fault_injection=0. 17:20:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xbd010000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c002400", 0x10, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) [ 340.118884] erofs: unmounted for /dev/loop5 [ 340.125548] ------------[ cut here ]------------ [ 340.130357] kernel BUG at fs/inode.c:1571! [ 340.134834] erofs: unmounted for /dev/loop2 [ 340.136301] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 340.144535] CPU: 1 PID: 22645 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 [ 340.152402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.161751] RIP: 0010:iput+0x727/0x860 [ 340.165635] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 33 d9 ee ff e9 0a fd ff ff e8 39 fc b8 ff <0f> 0b e8 32 fc b8 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 b2 c6 6f [ 340.184532] RSP: 0018:ffff88804cc3fa80 EFLAGS: 00010246 [ 340.189887] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc90006217000 [ 340.197145] RDX: 0000000000040000 RSI: ffffffff81a98937 RDI: 0000000000000007 [ 340.204400] RBP: ffff888054ccd680 R08: 0000000000000000 R09: 0000000000000000 [ 340.211654] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880a10b9340 [ 340.218910] R13: ffff888054ccd680 R14: 0000000000000000 R15: 00000000fffffff4 [ 340.226171] FS: 00007f7bf01a6700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 340.234390] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 340.240263] CR2: 00007fbfbf7e2fc8 CR3: 00000000aa000000 CR4: 00000000003406e0 [ 340.247521] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 340.254773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 340.262023] Call Trace: [ 340.264598] erofs_fill_super+0x1205/0x12cc [ 340.268907] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 340.274179] ? vsprintf+0x30/0x30 [ 340.277624] ? wait_for_completion_io+0x10/0x10 [ 340.282274] ? set_blocksize+0x163/0x3f0 [ 340.286331] mount_bdev+0x2fc/0x3b0 [ 340.289955] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 340.295212] erofs_mount+0x8c/0xc0 [ 340.298735] ? erofs_kill_sb+0x20/0x20 [ 340.302653] ? alloc_pages_current+0x19b/0x2a0 [ 340.307229] ? __lockdep_init_map+0x100/0x5a0 [ 340.311714] mount_fs+0xa3/0x310 [ 340.315073] vfs_kern_mount.part.0+0x68/0x470 [ 340.319560] do_mount+0x115c/0x2f50 [ 340.323178] ? cmp_ex_sort+0xc0/0xc0 [ 340.326880] ? __do_page_fault+0x180/0xd60 [ 340.331103] ? copy_mount_string+0x40/0x40 [ 340.335326] ? memset+0x20/0x40 [ 340.338597] ? copy_mount_options+0x26f/0x380 [ 340.343079] ksys_mount+0xcf/0x130 [ 340.346608] __x64_sys_mount+0xba/0x150 [ 340.350605] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 340.355173] do_syscall_64+0xf9/0x620 [ 340.358970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.364146] RIP: 0033:0x7f7bf183261a [ 340.367847] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 340.386734] RSP: 002b:00007f7bf01a5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 340.394427] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f7bf183261a [ 340.401682] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f7bf01a5fe0 [ 340.408935] RBP: 00007f7bf01a6020 R08: 00007f7bf01a6020 R09: 0000000020000000 [ 340.416186] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 340.423439] R13: 0000000020000100 R14: 00007f7bf01a5fe0 R15: 0000000020000180 [ 340.430695] Modules linked in: [ 340.440519] ---[ end trace 6062bb2009326d3c ]--- [ 340.445415] RIP: 0010:iput+0x727/0x860 [ 340.450413] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 33 d9 ee ff e9 0a fd ff ff e8 39 fc b8 ff <0f> 0b e8 32 fc b8 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 b2 c6 6f [ 340.471789] RSP: 0018:ffff88804cc3fa80 EFLAGS: 00010246 [ 340.477663] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc90006217000 [ 340.485003] RDX: 0000000000040000 RSI: ffffffff81a98937 RDI: 0000000000000007 [ 340.493903] RBP: ffff888054ccd680 R08: 0000000000000000 R09: 0000000000000000 [ 340.502658] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880a10b9340 [ 340.514572] R13: ffff888054ccd680 R14: 0000000000000000 R15: 00000000fffffff4 [ 340.522283] FS: 00007f7bf01a6700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 340.531287] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 340.537981] CR2: 00005555555c9708 CR3: 00000000aa000000 CR4: 00000000003406f0 [ 340.545546] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 340.552926] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 340.562944] Kernel panic - not syncing: Fatal exception [ 340.568387] Kernel Offset: disabled [ 340.572006] Rebooting in 86400 seconds..