ing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0xa00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:46:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3f000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:46:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:46:47 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:46:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0xa00, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:46:47 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 14) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:46:47 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2779.431348] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2779.431866] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2779.436065] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2779.448696] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2779.449973] EXT4-fs (loop4): group descriptors corrupted! [ 2779.458632] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2779.468465] FAULT_INJECTION: forcing a failure. [ 2779.468465] name failslab, interval 1, probability 0, space 0, times 0 [ 2779.470167] CPU: 0 PID: 15653 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2779.471090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2779.472169] Call Trace: [ 2779.472529] dump_stack+0x107/0x167 [ 2779.473006] should_fail.cold+0x5/0xa [ 2779.473511] ? create_object.isra.0+0x3a/0xa20 [ 2779.474111] should_failslab+0x5/0x20 [ 2779.474616] kmem_cache_alloc+0x5b/0x360 [ 2779.475154] create_object.isra.0+0x3a/0xa20 [ 2779.475730] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2779.476416] kmem_cache_alloc_node_trace+0x16d/0x380 [ 2779.477106] sbitmap_queue_init_node+0x29e/0x720 [ 2779.477725] ? lockdep_init_map_type+0x2b7/0x780 [ 2779.478362] blk_mq_init_tags+0x1a9/0x3d0 [ 2779.478921] blk_mq_alloc_rq_map+0x59/0x1e0 [ 2779.479494] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2779.480196] blk_mq_alloc_tag_set+0x764/0xe70 [ 2779.480807] loop_add+0x26d/0x8b0 [ 2779.481275] loop_control_ioctl+0x170/0x480 [ 2779.481847] ? loop_lookup+0x1d0/0x1d0 [ 2779.482378] ? selinux_file_ioctl+0xb1/0x260 [ 2779.482965] ? loop_lookup+0x1d0/0x1d0 [ 2779.483485] __x64_sys_ioctl+0x19a/0x210 [ 2779.484022] do_syscall_64+0x33/0x40 [ 2779.484518] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2779.485201] RIP: 0033:0x7f3b305e3b19 [ 2779.485693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2779.488086] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2779.489115] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2779.490059] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2779.490995] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2779.491932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2779.492892] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2779.542058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2779.560523] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2779.565420] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2779.566638] EXT4-fs (loop6): get root inode failed [ 2779.567273] EXT4-fs (loop6): mount failed 19:46:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x4002, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:46:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:46:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x4002, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:46:47 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2779.664371] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:46:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:46:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x20000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2779.688864] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:46:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 15) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:46:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x40000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2779.745615] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2779.747272] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2779.748099] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2779.749243] EXT4-fs (loop4): group descriptors corrupted! [ 2779.754445] EXT4-fs (loop6): get root inode failed [ 2779.755092] EXT4-fs (loop6): mount failed [ 2779.791679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2779.809109] FAULT_INJECTION: forcing a failure. [ 2779.809109] name failslab, interval 1, probability 0, space 0, times 0 [ 2779.810624] CPU: 0 PID: 15695 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2779.811442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2779.812601] Call Trace: [ 2779.812924] dump_stack+0x107/0x167 [ 2779.813364] should_fail.cold+0x5/0xa [ 2779.813825] ? create_object.isra.0+0x3a/0xa20 [ 2779.814365] should_failslab+0x5/0x20 [ 2779.814823] kmem_cache_alloc+0x5b/0x360 [ 2779.815306] create_object.isra.0+0x3a/0xa20 [ 2779.815837] kmemleak_alloc_percpu+0xa0/0x100 [ 2779.816398] pcpu_alloc+0x4e2/0x12f0 [ 2779.816846] sbitmap_queue_init_node+0x80/0x720 [ 2779.817399] blk_mq_init_tags+0x20e/0x3d0 [ 2779.817887] blk_mq_alloc_rq_map+0x59/0x1e0 [ 2779.818393] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2779.819026] blk_mq_alloc_tag_set+0x764/0xe70 [ 2779.819587] loop_add+0x26d/0x8b0 [ 2779.820013] loop_control_ioctl+0x170/0x480 [ 2779.820542] ? loop_lookup+0x1d0/0x1d0 [ 2779.821022] ? selinux_file_ioctl+0xb1/0x260 [ 2779.821559] ? loop_lookup+0x1d0/0x1d0 [ 2779.822030] __x64_sys_ioctl+0x19a/0x210 [ 2779.822519] do_syscall_64+0x33/0x40 [ 2779.822969] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2779.823588] RIP: 0033:0x7f3b305e3b19 [ 2779.824043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2779.826256] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2779.827172] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2779.828031] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2779.828908] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2779.829763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2779.830619] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:46:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3f000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2779.833014] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:46:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0xa000000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:46:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2779.890458] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2779.929867] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2779.947565] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2779.965766] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2779.966832] EXT4-fs (loop4): group descriptors corrupted! [ 2780.011733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2790.083377] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:47:06 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 16) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:47:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0xa000000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x40020000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:06 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:06 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x40000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x48000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2798.069338] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:47:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2798.109408] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2798.113071] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2798.116944] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2798.121167] FAULT_INJECTION: forcing a failure. [ 2798.121167] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.123947] CPU: 0 PID: 15741 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2798.125387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.127058] Call Trace: [ 2798.127623] dump_stack+0x107/0x167 [ 2798.128374] should_fail.cold+0x5/0xa [ 2798.129152] ? create_object.isra.0+0x3a/0xa20 [ 2798.130119] should_failslab+0x5/0x20 [ 2798.131098] kmem_cache_alloc+0x5b/0x360 [ 2798.132145] ? mark_held_locks+0x9e/0xe0 [ 2798.133204] create_object.isra.0+0x3a/0xa20 [ 2798.134184] kmemleak_alloc_percpu+0xa0/0x100 [ 2798.135103] pcpu_alloc+0x4e2/0x12f0 [ 2798.135887] sbitmap_queue_init_node+0x80/0x720 [ 2798.136875] blk_mq_init_tags+0x20e/0x3d0 [ 2798.137731] blk_mq_alloc_rq_map+0x59/0x1e0 [ 2798.138646] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2798.139725] blk_mq_alloc_tag_set+0x764/0xe70 [ 2798.140692] loop_add+0x26d/0x8b0 [ 2798.141423] loop_control_ioctl+0x170/0x480 [ 2798.142293] ? loop_lookup+0x1d0/0x1d0 [ 2798.143111] ? selinux_file_ioctl+0xb1/0x260 [ 2798.144012] ? loop_lookup+0x1d0/0x1d0 [ 2798.144832] __x64_sys_ioctl+0x19a/0x210 [ 2798.145678] do_syscall_64+0x33/0x40 [ 2798.146444] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2798.147486] RIP: 0033:0x7f3b305e3b19 [ 2798.148236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2798.151993] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2798.153569] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2798.155008] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2798.156459] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2798.157919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2798.159386] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2798.192127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2798.192967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2798.198845] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2798.201929] EXT4-fs (loop6): get root inode failed [ 2798.203233] EXT4-fs (loop6): mount failed [ 2798.276711] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2798.278657] EXT4-fs (loop4): group descriptors corrupted! 19:47:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0xffffff7f, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x40020000, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 2798.310320] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:47:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4c000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2798.436758] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2798.445520] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2798.532260] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 2798.570455] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2809.446199] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:47:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0xffffff7f, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x7ffff000}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x48000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x68000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 17) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2817.823475] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2817.846153] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2817.858975] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2817.861122] EXT4-fs (loop4): group descriptors corrupted! [ 2817.864674] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2817.879905] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2817.888390] FAULT_INJECTION: forcing a failure. [ 2817.888390] name failslab, interval 1, probability 0, space 0, times 0 [ 2817.891094] CPU: 0 PID: 15795 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2817.892605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2817.894403] Call Trace: [ 2817.894994] dump_stack+0x107/0x167 [ 2817.895775] should_fail.cold+0x5/0xa [ 2817.896607] ? sbitmap_queue_init_node+0x29e/0x720 [ 2817.897679] should_failslab+0x5/0x20 [ 2817.898477] kmem_cache_alloc_node_trace+0x59/0x380 [ 2817.899579] sbitmap_queue_init_node+0x29e/0x720 [ 2817.900624] blk_mq_init_tags+0x20e/0x3d0 [ 2817.901525] blk_mq_alloc_rq_map+0x59/0x1e0 [ 2817.902458] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2817.903584] blk_mq_alloc_tag_set+0x764/0xe70 [ 2817.904561] loop_add+0x26d/0x8b0 [ 2817.905295] loop_control_ioctl+0x170/0x480 [ 2817.906196] ? loop_lookup+0x1d0/0x1d0 [ 2817.907014] ? selinux_file_ioctl+0xb1/0x260 [ 2817.907938] ? loop_lookup+0x1d0/0x1d0 [ 2817.908771] __x64_sys_ioctl+0x19a/0x210 [ 2817.909653] do_syscall_64+0x33/0x40 [ 2817.910446] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2817.911498] RIP: 0033:0x7f3b305e3b19 [ 2817.912282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2817.916061] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2817.917655] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2817.919126] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2817.920581] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2817.922096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2817.923561] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2817.949930] EXT4-fs (loop6): get root inode failed [ 2817.951095] EXT4-fs (loop6): mount failed [ 2817.951861] blk-mq: reduced tag depth (128 -> 64) [ 2817.954263] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2817.978024] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x11fffffaf}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x7ffff000}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4c000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2818.103174] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:47:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2818.121480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:47:26 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6c000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:26 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2818.166308] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2818.168583] EXT4-fs (loop4): group descriptors corrupted! [ 2818.220207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2818.245228] FAULT_INJECTION: forcing a failure. [ 2818.245228] name failslab, interval 1, probability 0, space 0, times 0 [ 2818.246789] CPU: 1 PID: 15837 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2818.247541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2818.248431] Call Trace: [ 2818.248721] dump_stack+0x107/0x167 [ 2818.249118] should_fail.cold+0x5/0xa [ 2818.249532] ? create_object.isra.0+0x3a/0xa20 [ 2818.250023] should_failslab+0x5/0x20 [ 2818.250431] kmem_cache_alloc+0x5b/0x360 [ 2818.250864] create_object.isra.0+0x3a/0xa20 [ 2818.251332] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2818.251884] kmem_cache_alloc_node_trace+0x16d/0x380 [ 2818.252435] sbitmap_queue_init_node+0x29e/0x720 [ 2818.252979] blk_mq_init_tags+0x20e/0x3d0 [ 2818.253449] blk_mq_alloc_rq_map+0x59/0x1e0 [ 2818.254037] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2818.254763] blk_mq_alloc_tag_set+0x764/0xe70 [ 2818.255410] loop_add+0x26d/0x8b0 [ 2818.255877] loop_control_ioctl+0x170/0x480 [ 2818.256426] ? loop_lookup+0x1d0/0x1d0 [ 2818.256974] ? selinux_file_ioctl+0xb1/0x260 [ 2818.257608] ? loop_lookup+0x1d0/0x1d0 [ 2818.258129] __x64_sys_ioctl+0x19a/0x210 [ 2818.258675] do_syscall_64+0x33/0x40 [ 2818.259183] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2818.259898] RIP: 0033:0x7f3b305e3b19 [ 2818.260421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2818.262948] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2818.263779] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2818.264565] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2818.265369] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2818.266142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2818.266908] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2818.269423] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2818.274307] EXT4-fs (loop6): get root inode failed [ 2818.275708] EXT4-fs (loop6): mount failed 19:47:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x11fffffaf}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x8}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 2818.323333] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2818.356905] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2818.360150] EXT4-fs: failed to create workqueue [ 2818.360722] EXT4-fs (loop1): mount failed [ 2818.373088] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2818.403039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:47:26 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 19) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:47:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2818.459166] FAULT_INJECTION: forcing a failure. [ 2818.459166] name failslab, interval 1, probability 0, space 0, times 0 [ 2818.460736] CPU: 1 PID: 15864 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2818.461506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2818.462405] Call Trace: [ 2818.462698] dump_stack+0x107/0x167 [ 2818.463097] should_fail.cold+0x5/0xa [ 2818.463514] ? blk_mq_alloc_rq_map+0xa1/0x1e0 [ 2818.464000] should_failslab+0x5/0x20 [ 2818.464408] __kmalloc_node+0x76/0x4b0 [ 2818.464837] ? blk_mq_init_tags+0x114/0x3d0 [ 2818.465312] blk_mq_alloc_rq_map+0xa1/0x1e0 [ 2818.465776] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2818.466340] blk_mq_alloc_tag_set+0x764/0xe70 [ 2818.466834] loop_add+0x26d/0x8b0 [ 2818.467210] loop_control_ioctl+0x170/0x480 [ 2818.467676] ? loop_lookup+0x1d0/0x1d0 [ 2818.468129] ? selinux_file_ioctl+0xb1/0x260 [ 2818.468603] ? loop_lookup+0x1d0/0x1d0 [ 2818.469032] __x64_sys_ioctl+0x19a/0x210 [ 2818.469485] do_syscall_64+0x33/0x40 [ 2818.469884] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2818.470434] RIP: 0033:0x7f3b305e3b19 [ 2818.470836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2818.472791] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2818.473622] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2818.474386] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2818.475148] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2818.475937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2818.476708] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2818.488882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2818.518569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2818.520835] blk-mq: reduced tag depth (128 -> 64) [ 2818.589710] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2818.591743] EXT4-fs (loop4): group descriptors corrupted! [ 2830.971485] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:47:47 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x68000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:47 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 20) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:47:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x74000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:47 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100), 0x0, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:47:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x500}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:47:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x8}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 2839.454036] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2839.457060] EXT4-fs (loop6): get root inode failed [ 2839.458169] EXT4-fs (loop6): mount failed [ 2839.458992] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2839.473059] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2839.505070] FAULT_INJECTION: forcing a failure. [ 2839.505070] name failslab, interval 1, probability 0, space 0, times 0 [ 2839.507766] CPU: 1 PID: 15895 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2839.509219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2839.510916] Call Trace: [ 2839.511461] dump_stack+0x107/0x167 [ 2839.512216] should_fail.cold+0x5/0xa [ 2839.512993] ? create_object.isra.0+0x3a/0xa20 [ 2839.513936] should_failslab+0x5/0x20 [ 2839.514724] kmem_cache_alloc+0x5b/0x360 [ 2839.515565] create_object.isra.0+0x3a/0xa20 [ 2839.516462] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2839.517528] __kmalloc_node+0x1ae/0x4b0 [ 2839.518348] blk_mq_alloc_rq_map+0xa1/0x1e0 [ 2839.519243] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2839.520330] blk_mq_alloc_tag_set+0x764/0xe70 [ 2839.521279] loop_add+0x26d/0x8b0 [ 2839.522002] loop_control_ioctl+0x170/0x480 [ 2839.522897] ? loop_lookup+0x1d0/0x1d0 [ 2839.523722] ? selinux_file_ioctl+0xb1/0x260 [ 2839.524627] ? loop_lookup+0x1d0/0x1d0 [ 2839.525451] __x64_sys_ioctl+0x19a/0x210 [ 2839.526289] do_syscall_64+0x33/0x40 [ 2839.527071] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2839.528117] RIP: 0033:0x7f3b305e3b19 [ 2839.528901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2839.532671] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2839.534239] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2839.535725] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2839.537211] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2839.538671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2839.540121] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2839.562487] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2839.575403] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2839.600035] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2839.604812] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2852.406181] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:48:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6c000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:48:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:07 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 21) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:48:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x500}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:48:07 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7a000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2859.529484] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2859.533117] EXT4-fs (loop6): get root inode failed [ 2859.534570] EXT4-fs (loop6): mount failed [ 2859.555852] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2859.600317] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2859.610486] FAULT_INJECTION: forcing a failure. [ 2859.610486] name failslab, interval 1, probability 0, space 0, times 0 [ 2859.613205] CPU: 1 PID: 15937 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2859.614714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2859.616520] Call Trace: [ 2859.617104] dump_stack+0x107/0x167 [ 2859.617995] should_fail.cold+0x5/0xa [ 2859.618879] ? blk_mq_alloc_rq_map+0xe2/0x1e0 [ 2859.619880] should_failslab+0x5/0x20 [ 2859.620712] __kmalloc_node+0x76/0x4b0 [ 2859.621571] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2859.622700] blk_mq_alloc_rq_map+0xe2/0x1e0 [ 2859.623649] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2859.624802] blk_mq_alloc_tag_set+0x764/0xe70 [ 2859.625826] loop_add+0x26d/0x8b0 [ 2859.626589] loop_control_ioctl+0x170/0x480 [ 2859.627526] ? loop_lookup+0x1d0/0x1d0 [ 2859.628386] ? selinux_file_ioctl+0xb1/0x260 [ 2859.629348] ? loop_lookup+0x1d0/0x1d0 [ 2859.630266] __x64_sys_ioctl+0x19a/0x210 [ 2859.631217] do_syscall_64+0x33/0x40 [ 2859.632109] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2859.633557] RIP: 0033:0x7f3b305e3b19 [ 2859.634574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2859.639302] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2859.640993] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2859.642615] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2859.644211] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2859.645813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2859.647419] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:48:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2859.654309] blk-mq: reduced tag depth (128 -> 64) 19:48:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 2859.711213] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2859.712897] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2859.733347] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:48:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x74000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2859.825160] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2859.827887] EXT4-fs (loop6): get root inode failed [ 2859.829113] EXT4-fs (loop6): mount failed 19:48:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:08 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:08 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 22) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:48:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7f000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2859.942232] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2859.943405] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:48:08 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0", 0x11, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2860.003114] FAULT_INJECTION: forcing a failure. [ 2860.003114] name failslab, interval 1, probability 0, space 0, times 0 [ 2860.005788] CPU: 1 PID: 15976 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2860.007231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2860.008913] Call Trace: [ 2860.009494] dump_stack+0x107/0x167 [ 2860.010260] should_fail.cold+0x5/0xa [ 2860.011039] ? create_object.isra.0+0x3a/0xa20 [ 2860.011975] should_failslab+0x5/0x20 [ 2860.012762] kmem_cache_alloc+0x5b/0x360 [ 2860.013620] ? mark_held_locks+0x9e/0xe0 [ 2860.014466] create_object.isra.0+0x3a/0xa20 [ 2860.015354] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2860.016398] __kmalloc_node+0x1ae/0x4b0 [ 2860.017238] blk_mq_alloc_rq_map+0xe2/0x1e0 [ 2860.018152] __blk_mq_alloc_map_and_request+0xe0/0x410 [ 2860.019228] blk_mq_alloc_tag_set+0x764/0xe70 [ 2860.020158] loop_add+0x26d/0x8b0 [ 2860.020858] loop_control_ioctl+0x170/0x480 [ 2860.021746] ? loop_lookup+0x1d0/0x1d0 [ 2860.022555] ? selinux_file_ioctl+0xb1/0x260 [ 2860.023459] ? loop_lookup+0x1d0/0x1d0 [ 2860.024259] __x64_sys_ioctl+0x19a/0x210 [ 2860.025087] do_syscall_64+0x33/0x40 [ 2860.025864] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2860.026934] RIP: 0033:0x7f3b305e3b19 [ 2860.027688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2860.031399] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2860.032948] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2860.034463] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2860.035958] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2860.037418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2860.038900] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:48:08 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2860.178439] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2860.180993] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2873.521388] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:48:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7a000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x240}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:48:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x240}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:48:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:28 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 23) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:48:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8cffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2880.493376] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2880.497947] FAULT_INJECTION: forcing a failure. [ 2880.497947] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2880.500810] CPU: 1 PID: 16009 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2880.502184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2880.503813] Call Trace: [ 2880.504330] dump_stack+0x107/0x167 [ 2880.505038] should_fail.cold+0x5/0xa [ 2880.505785] __alloc_pages_nodemask+0x182/0x680 [ 2880.506698] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2880.507864] ? __kmalloc_node+0x1ae/0x4b0 [ 2880.508686] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 2880.509727] ? cpumask_next+0x1f/0x30 [ 2880.510475] ? blk_mq_hw_queue_to_node+0xf1/0x1b0 [ 2880.511425] blk_mq_alloc_rqs+0x250/0x7a0 [ 2880.512226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2880.513229] __blk_mq_alloc_map_and_request+0x191/0x410 [ 2880.514347] blk_mq_alloc_tag_set+0x764/0xe70 [ 2880.515225] loop_add+0x26d/0x8b0 [ 2880.515902] loop_control_ioctl+0x170/0x480 [ 2880.516784] ? loop_lookup+0x1d0/0x1d0 [ 2880.517549] ? selinux_file_ioctl+0xb1/0x260 [ 2880.518436] ? loop_lookup+0x1d0/0x1d0 [ 2880.519200] __x64_sys_ioctl+0x19a/0x210 [ 2880.519992] do_syscall_64+0x33/0x40 [ 2880.520715] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2880.521726] RIP: 0033:0x7f3b305e3b19 [ 2880.522441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2880.525979] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2880.527440] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2880.528809] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2880.530229] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2880.531626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2880.533028] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2880.632699] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2880.635713] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2880.656017] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2880.670302] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2880.677086] EXT4-fs (loop6): get root inode failed [ 2880.678295] EXT4-fs (loop6): mount failed 19:48:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:29 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 24) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:48:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7f000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2880.837581] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:48:29 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2880.853154] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2880.867922] FAULT_INJECTION: forcing a failure. [ 2880.867922] name failslab, interval 1, probability 0, space 0, times 0 [ 2880.870915] CPU: 0 PID: 16050 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2880.872335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2880.874068] Call Trace: [ 2880.874618] dump_stack+0x107/0x167 [ 2880.875369] should_fail.cold+0x5/0xa [ 2880.876146] ? create_object.isra.0+0x3a/0xa20 [ 2880.877073] ? create_object.isra.0+0x3a/0xa20 [ 2880.878006] should_failslab+0x5/0x20 [ 2880.878781] kmem_cache_alloc+0x5b/0x360 [ 2880.879608] create_object.isra.0+0x3a/0xa20 [ 2880.880509] blk_mq_alloc_rqs+0x3cb/0x7a0 [ 2880.881354] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2880.882416] __blk_mq_alloc_map_and_request+0x191/0x410 [ 2880.883502] blk_mq_alloc_tag_set+0x764/0xe70 [ 2880.884427] loop_add+0x26d/0x8b0 [ 2880.885133] loop_control_ioctl+0x170/0x480 [ 2880.886014] ? loop_lookup+0x1d0/0x1d0 [ 2880.886820] ? selinux_file_ioctl+0xb1/0x260 [ 2880.887712] ? loop_lookup+0x1d0/0x1d0 [ 2880.888524] __x64_sys_ioctl+0x19a/0x210 [ 2880.889348] do_syscall_64+0x33/0x40 [ 2880.890124] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2880.891173] RIP: 0033:0x7f3b305e3b19 [ 2880.891927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2880.895689] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2880.897226] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2880.898689] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2880.900130] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2880.901581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2880.903032] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2880.911666] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 19:48:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x97ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8cffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2881.059917] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2881.063518] EXT4-fs (loop6): get root inode failed [ 2881.064647] EXT4-fs (loop6): mount failed [ 2881.095994] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:48:29 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 25) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2881.133503] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2881.189030] FAULT_INJECTION: forcing a failure. [ 2881.189030] name failslab, interval 1, probability 0, space 0, times 0 [ 2881.191803] CPU: 0 PID: 16075 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2881.193235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2881.194960] Call Trace: [ 2881.195514] dump_stack+0x107/0x167 [ 2881.196270] should_fail.cold+0x5/0xa [ 2881.197052] ? blk_alloc_queue+0x28/0x670 [ 2881.197921] should_failslab+0x5/0x20 [ 2881.198719] kmem_cache_alloc_node+0x55/0x370 [ 2881.199626] ? debug_mutex_init+0x33/0x70 [ 2881.200470] blk_alloc_queue+0x28/0x670 [ 2881.201284] blk_mq_init_queue+0x44/0xd0 [ 2881.202139] loop_add+0x2cf/0x8b0 [ 2881.202848] loop_control_ioctl+0x170/0x480 [ 2881.203719] ? loop_lookup+0x1d0/0x1d0 [ 2881.204515] ? selinux_file_ioctl+0xb1/0x260 [ 2881.205416] ? loop_lookup+0x1d0/0x1d0 [ 2881.206228] __x64_sys_ioctl+0x19a/0x210 [ 2881.207060] do_syscall_64+0x33/0x40 [ 2881.207827] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2881.208871] RIP: 0033:0x7f3b305e3b19 [ 2881.209625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2881.213374] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2881.214936] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2881.216383] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2881.217839] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2881.219281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2881.220728] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2881.229722] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2892.107403] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:48:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x9dddfcb3) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa00}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:48:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa00}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:48:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 26) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:48:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x97ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2899.832868] EXT4-fs error (device loop5): ext4_fill_super:4973: inode #2: comm syz-executor.5: iget: root inode unallocated [ 2899.835935] EXT4-fs (loop5): get root inode failed [ 2899.837017] EXT4-fs (loop5): mount failed [ 2899.858960] FAULT_INJECTION: forcing a failure. [ 2899.858960] name failslab, interval 1, probability 0, space 0, times 0 [ 2899.861500] CPU: 1 PID: 16094 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2899.862885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2899.864596] Call Trace: [ 2899.865126] dump_stack+0x107/0x167 [ 2899.865871] should_fail.cold+0x5/0xa [ 2899.866638] ? create_object.isra.0+0x3a/0xa20 [ 2899.867573] should_failslab+0x5/0x20 [ 2899.868327] kmem_cache_alloc+0x5b/0x360 [ 2899.869163] create_object.isra.0+0x3a/0xa20 [ 2899.870053] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2899.871087] kmem_cache_alloc_node+0x169/0x370 [ 2899.872013] ? debug_mutex_init+0x33/0x70 [ 2899.872863] blk_alloc_queue+0x28/0x670 [ 2899.873677] blk_mq_init_queue+0x44/0xd0 [ 2899.874514] loop_add+0x2cf/0x8b0 [ 2899.875223] loop_control_ioctl+0x170/0x480 [ 2899.876095] ? loop_lookup+0x1d0/0x1d0 [ 2899.876888] ? selinux_file_ioctl+0xb1/0x260 [ 2899.877781] ? loop_lookup+0x1d0/0x1d0 [ 2899.878588] __x64_sys_ioctl+0x19a/0x210 [ 2899.879416] do_syscall_64+0x33/0x40 [ 2899.880173] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2899.881214] RIP: 0033:0x7f3b305e3b19 [ 2899.881976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2899.885704] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2899.887254] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2899.888701] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2899.890166] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2899.891613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2899.893061] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2899.965399] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2899.972725] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2899.976893] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2899.979372] EXT4-fs (loop6): get root inode failed [ 2899.980694] EXT4-fs (loop6): mount failed [ 2899.984299] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:48:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 27) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:48:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x9dddfcb3) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xb3fcdd9d) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2900.179299] EXT4-fs error (device loop5): ext4_fill_super:4973: inode #2: comm syz-executor.5: iget: root inode unallocated [ 2900.183154] EXT4-fs (loop5): get root inode failed [ 2900.184229] EXT4-fs (loop5): mount failed [ 2900.233233] FAULT_INJECTION: forcing a failure. [ 2900.233233] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.235932] CPU: 1 PID: 16138 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2900.237297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2900.238968] Call Trace: [ 2900.239497] dump_stack+0x107/0x167 [ 2900.240224] should_fail.cold+0x5/0xa [ 2900.240981] ? mempool_init_node+0x132/0x590 [ 2900.241845] should_failslab+0x5/0x20 [ 2900.242606] __kmalloc_node+0x76/0x4b0 [ 2900.243378] ? mempool_free_pages+0x20/0x20 [ 2900.244224] mempool_init_node+0x132/0x590 [ 2900.245097] ? mempool_free_pages+0x20/0x20 [ 2900.245960] ? mempool_free+0x3b0/0x3b0 [ 2900.246748] mempool_init+0x38/0x50 [ 2900.247489] bioset_init+0x32b/0x800 [ 2900.248227] ? debug_mutex_init+0x33/0x70 [ 2900.249079] blk_alloc_queue+0xdc/0x670 [ 2900.249875] blk_mq_init_queue+0x44/0xd0 [ 2900.250703] loop_add+0x2cf/0x8b0 [ 2900.251389] loop_control_ioctl+0x170/0x480 [ 2900.252236] ? loop_lookup+0x1d0/0x1d0 [ 2900.253004] ? selinux_file_ioctl+0xb1/0x260 [ 2900.253874] ? loop_lookup+0x1d0/0x1d0 [ 2900.254659] __x64_sys_ioctl+0x19a/0x210 [ 2900.255484] do_syscall_64+0x33/0x40 [ 2900.256219] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2900.257257] RIP: 0033:0x7f3b305e3b19 [ 2900.258015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2900.261789] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2900.263300] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2900.264760] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2900.266229] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2900.267684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2900.269141] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:48:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xb3fcdd9d) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:48:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2900.378761] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 19:48:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 28) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2900.414930] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2900.447997] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2900.462114] FAULT_INJECTION: forcing a failure. [ 2900.462114] name failslab, interval 1, probability 0, space 0, times 0 [ 2900.465002] CPU: 1 PID: 16156 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2900.466660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2900.468607] Call Trace: [ 2900.469246] dump_stack+0x107/0x167 [ 2900.470132] should_fail.cold+0x5/0xa [ 2900.471045] ? create_object.isra.0+0x3a/0xa20 [ 2900.472128] should_failslab+0x5/0x20 [ 2900.473035] kmem_cache_alloc+0x5b/0x360 [ 2900.474022] create_object.isra.0+0x3a/0xa20 [ 2900.475068] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2900.476278] __kmalloc_node+0x1ae/0x4b0 [ 2900.477229] ? mempool_free_pages+0x20/0x20 [ 2900.478269] mempool_init_node+0x132/0x590 [ 2900.479281] ? mempool_free_pages+0x20/0x20 [ 2900.480299] ? mempool_free+0x3b0/0x3b0 [ 2900.481238] mempool_init+0x38/0x50 [ 2900.482116] bioset_init+0x32b/0x800 [ 2900.482999] ? debug_mutex_init+0x33/0x70 [ 2900.483987] blk_alloc_queue+0xdc/0x670 [ 2900.484939] blk_mq_init_queue+0x44/0xd0 [ 2900.485782] loop_add+0x2cf/0x8b0 [ 2900.486495] loop_control_ioctl+0x170/0x480 [ 2900.487367] ? loop_lookup+0x1d0/0x1d0 [ 2900.488177] ? selinux_file_ioctl+0xb1/0x260 [ 2900.489071] ? loop_lookup+0x1d0/0x1d0 [ 2900.489886] __x64_sys_ioctl+0x19a/0x210 [ 2900.490732] do_syscall_64+0x33/0x40 [ 2900.491520] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2900.492558] RIP: 0033:0x7f3b305e3b19 [ 2900.493335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2900.497288] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2900.499042] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2900.500651] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2900.502264] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2900.503870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2900.505477] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2900.508404] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2900.607504] EXT4-fs error (device loop5): ext4_fill_super:4973: inode #2: comm syz-executor.5: iget: root inode unallocated [ 2900.614949] EXT4-fs (loop5): get root inode failed [ 2900.616297] EXT4-fs (loop5): mount failed [ 2912.245057] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:49:08 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 29) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:49:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x4002}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf4ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x4002}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf4ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2920.193838] FAULT_INJECTION: forcing a failure. [ 2920.193838] name failslab, interval 1, probability 0, space 0, times 0 [ 2920.196469] CPU: 1 PID: 16179 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2920.197873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2920.199562] Call Trace: [ 2920.200112] dump_stack+0x107/0x167 [ 2920.200850] should_fail.cold+0x5/0xa [ 2920.201650] ? mempool_free_pages+0x20/0x20 [ 2920.202536] ? mempool_init_node+0x2d4/0x590 [ 2920.203428] ? mempool_free_pages+0x20/0x20 [ 2920.204312] should_failslab+0x5/0x20 [ 2920.205080] kmem_cache_alloc+0x5b/0x360 [ 2920.205895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2920.206963] ? mempool_free_pages+0x20/0x20 [ 2920.207825] ? mempool_free_pages+0x20/0x20 [ 2920.208710] mempool_init_node+0x2d4/0x590 [ 2920.209562] ? mempool_free_pages+0x20/0x20 [ 2920.210445] ? mempool_free+0x3b0/0x3b0 [ 2920.211249] mempool_init+0x38/0x50 [ 2920.211986] bioset_init+0x32b/0x800 [ 2920.212745] blk_alloc_queue+0xdc/0x670 [ 2920.213562] blk_mq_init_queue+0x44/0xd0 [ 2920.214399] loop_add+0x2cf/0x8b0 [ 2920.215111] loop_control_ioctl+0x170/0x480 [ 2920.215966] ? loop_lookup+0x1d0/0x1d0 [ 2920.216748] ? selinux_file_ioctl+0xb1/0x260 [ 2920.217631] ? loop_lookup+0x1d0/0x1d0 [ 2920.218433] __x64_sys_ioctl+0x19a/0x210 [ 2920.219250] do_syscall_64+0x33/0x40 [ 2920.220015] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2920.221038] RIP: 0033:0x7f3b305e3b19 [ 2920.221788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2920.225508] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2920.227046] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2920.228488] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2920.229922] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2920.231367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2920.231901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2920.232803] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2920.272603] EXT4-fs (loop5): invalid first ino: 0 [ 2920.285922] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:49:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 2920.316203] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2920.316826] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:49:08 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 30) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2920.332921] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 19:49:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f00000800000004000455", 0x1e, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2920.440845] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2920.444246] FAULT_INJECTION: forcing a failure. [ 2920.444246] name failslab, interval 1, probability 0, space 0, times 0 [ 2920.446804] CPU: 1 PID: 16215 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2920.448176] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2920.449835] Call Trace: [ 2920.450395] dump_stack+0x107/0x167 [ 2920.451144] should_fail.cold+0x5/0xa [ 2920.451905] ? create_object.isra.0+0x3a/0xa20 [ 2920.452844] should_failslab+0x5/0x20 [ 2920.453616] kmem_cache_alloc+0x5b/0x360 [ 2920.454454] ? mark_held_locks+0x9e/0xe0 [ 2920.455288] create_object.isra.0+0x3a/0xa20 [ 2920.456186] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2920.457227] kmem_cache_alloc+0x159/0x360 [ 2920.458076] ? mempool_free_pages+0x20/0x20 [ 2920.458959] ? mempool_free_pages+0x20/0x20 [ 2920.459835] mempool_init_node+0x2d4/0x590 [ 2920.460704] ? mempool_free_pages+0x20/0x20 [ 2920.461581] ? mempool_free+0x3b0/0x3b0 [ 2920.462405] mempool_init+0x38/0x50 [ 2920.463154] bioset_init+0x32b/0x800 [ 2920.463911] ? debug_mutex_init+0x33/0x70 [ 2920.464761] blk_alloc_queue+0xdc/0x670 [ 2920.465580] blk_mq_init_queue+0x44/0xd0 [ 2920.466416] loop_add+0x2cf/0x8b0 [ 2920.467127] loop_control_ioctl+0x170/0x480 [ 2920.468005] ? loop_lookup+0x1d0/0x1d0 [ 2920.468806] ? selinux_file_ioctl+0xb1/0x260 [ 2920.469705] ? loop_lookup+0x1d0/0x1d0 [ 2920.470516] __x64_sys_ioctl+0x19a/0x210 [ 2920.471348] do_syscall_64+0x33/0x40 [ 2920.472107] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2920.473149] RIP: 0033:0x7f3b305e3b19 [ 2920.473907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2920.477653] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2920.479215] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2920.480663] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2920.482119] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2920.483574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2920.485031] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:49:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf5ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf5ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2920.614589] EXT4-fs (loop5): invalid first ino: 0 [ 2920.638066] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 19:49:09 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2920.689237] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:49:09 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:09 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 31) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2920.720144] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2920.825915] FAULT_INJECTION: forcing a failure. [ 2920.825915] name failslab, interval 1, probability 0, space 0, times 0 [ 2920.828818] CPU: 1 PID: 16240 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2920.830220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2920.831892] Call Trace: [ 2920.832393] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2920.832447] dump_stack+0x107/0x167 [ 2920.835061] should_fail.cold+0x5/0xa [ 2920.835829] ? mempool_free_pages+0x20/0x20 [ 2920.836695] ? mempool_init_node+0x2d4/0x590 [ 2920.837583] should_failslab+0x5/0x20 [ 2920.838349] kmem_cache_alloc+0x5b/0x360 [ 2920.839158] ? mempool_free_pages+0x20/0x20 [ 2920.840019] ? mempool_free_pages+0x20/0x20 [ 2920.840872] mempool_init_node+0x2d4/0x590 [ 2920.841726] ? mempool_free_pages+0x20/0x20 [ 2920.842604] ? mempool_free+0x3b0/0x3b0 [ 2920.843392] mempool_init+0x38/0x50 [ 2920.844125] bioset_init+0x32b/0x800 [ 2920.844865] ? debug_mutex_init+0x33/0x70 [ 2920.845697] blk_alloc_queue+0xdc/0x670 [ 2920.846502] blk_mq_init_queue+0x44/0xd0 [ 2920.847314] loop_add+0x2cf/0x8b0 [ 2920.848008] loop_control_ioctl+0x170/0x480 [ 2920.848867] ? loop_lookup+0x1d0/0x1d0 [ 2920.849653] ? selinux_file_ioctl+0xb1/0x260 [ 2920.850535] ? loop_lookup+0x1d0/0x1d0 [ 2920.851322] __x64_sys_ioctl+0x19a/0x210 [ 2920.852140] do_syscall_64+0x33/0x40 [ 2920.852925] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2920.853946] RIP: 0033:0x7f3b305e3b19 [ 2920.854707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2920.858372] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2920.859895] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2920.861313] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2920.862748] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2920.864169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2920.865588] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2920.868792] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2920.873783] EXT4-fs (loop4): get root inode failed [ 2920.874943] EXT4-fs (loop4): mount failed [ 2932.475288] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2939.113845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:49:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x40020000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:27 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 32) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:49:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf6ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf6ffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2939.145312] FAULT_INJECTION: forcing a failure. [ 2939.145312] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.148112] CPU: 1 PID: 16265 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2939.149556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2939.151333] Call Trace: [ 2939.151903] dump_stack+0x107/0x167 [ 2939.152685] should_fail.cold+0x5/0xa [ 2939.153500] ? create_object.isra.0+0x3a/0xa20 [ 2939.154501] should_failslab+0x5/0x20 [ 2939.155312] kmem_cache_alloc+0x5b/0x360 [ 2939.156181] ? mark_held_locks+0x9e/0xe0 [ 2939.157052] create_object.isra.0+0x3a/0xa20 [ 2939.157989] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2939.159094] kmem_cache_alloc+0x159/0x360 [ 2939.159983] ? mempool_free_pages+0x20/0x20 [ 2939.160904] ? mempool_free_pages+0x20/0x20 [ 2939.161816] mempool_init_node+0x2d4/0x590 [ 2939.162185] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2939.162735] ? mempool_free_pages+0x20/0x20 [ 2939.162751] ? mempool_free+0x3b0/0x3b0 [ 2939.162769] mempool_init+0x38/0x50 [ 2939.166307] bioset_init+0x32b/0x800 [ 2939.167130] ? debug_mutex_init+0x33/0x70 [ 2939.168025] blk_alloc_queue+0xdc/0x670 [ 2939.168883] blk_mq_init_queue+0x44/0xd0 [ 2939.169750] loop_add+0x2cf/0x8b0 [ 2939.170504] loop_control_ioctl+0x170/0x480 [ 2939.171450] ? loop_lookup+0x1d0/0x1d0 [ 2939.172322] ? selinux_file_ioctl+0xb1/0x260 [ 2939.173310] ? loop_lookup+0x1d0/0x1d0 [ 2939.174183] __x64_sys_ioctl+0x19a/0x210 [ 2939.175110] do_syscall_64+0x33/0x40 [ 2939.175940] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2939.177085] RIP: 0033:0x7f3b305e3b19 [ 2939.177917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.181990] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2939.183689] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2939.185270] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2939.186871] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.188457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2939.190041] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:49:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x40020000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 2939.257182] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 2939.272480] EXT4-fs (loop4): Unrecognized mount option "./file0" or missing value [ 2939.272535] EXT4-fs (loop5): invalid first ino: 0 [ 2939.285302] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 19:49:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfbffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfbffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f000008000000040004553954", 0x20, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 33) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2939.410769] FAULT_INJECTION: forcing a failure. [ 2939.410769] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.412397] CPU: 0 PID: 16309 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2939.413294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2939.414364] Call Trace: [ 2939.414726] dump_stack+0x107/0x167 [ 2939.415201] should_fail.cold+0x5/0xa [ 2939.415705] ? mempool_init_node+0x132/0x590 [ 2939.416275] should_failslab+0x5/0x20 [ 2939.416777] __kmalloc_node+0x76/0x4b0 [ 2939.417281] ? mempool_free_pages+0x20/0x20 [ 2939.417831] mempool_init_node+0x132/0x590 [ 2939.418385] ? mempool_free_pages+0x20/0x20 [ 2939.418953] ? mempool_free+0x3b0/0x3b0 [ 2939.419427] mempool_init+0x38/0x50 [ 2939.419839] bioset_init+0x52c/0x800 [ 2939.420248] blk_alloc_queue+0xdc/0x670 [ 2939.420696] blk_mq_init_queue+0x44/0xd0 [ 2939.421126] loop_add+0x2cf/0x8b0 [ 2939.421510] loop_control_ioctl+0x170/0x480 [ 2939.421988] ? loop_lookup+0x1d0/0x1d0 [ 2939.422431] ? loop_lookup+0x1d0/0x1d0 [ 2939.422875] ? loop_lookup+0x1d0/0x1d0 [ 2939.423308] __x64_sys_ioctl+0x19a/0x210 [ 2939.423775] do_syscall_64+0x33/0x40 [ 2939.424148] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2939.424738] RIP: 0033:0x7f3b305e3b19 [ 2939.425115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2939.427176] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2939.428019] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2939.428736] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2939.429446] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.430155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2939.430889] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2939.434427] EXT4-fs error (device loop4): ext4_fill_super:4973: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2939.436973] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2939.437840] EXT4-fs (loop4): get root inode failed [ 2939.438330] EXT4-fs (loop4): mount failed 19:49:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfc010000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2939.497049] EXT4-fs (loop5): unsupported inode size: 0 [ 2939.498329] EXT4-fs (loop5): blocksize: 2048 [ 2939.551946] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 2939.557220] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:49:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xffffff7f}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545c", 0x21, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:28 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 34) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:49:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfc010000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfdffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2940.030483] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2940.051658] EXT4-fs (loop4): invalid first ino: 0 [ 2940.076510] FAULT_INJECTION: forcing a failure. [ 2940.076510] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.077735] CPU: 0 PID: 16344 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2940.078428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2940.079266] Call Trace: [ 2940.079541] dump_stack+0x107/0x167 [ 2940.079907] should_fail.cold+0x5/0xa [ 2940.080291] ? create_object.isra.0+0x3a/0xa20 [ 2940.080753] should_failslab+0x5/0x20 [ 2940.081136] kmem_cache_alloc+0x5b/0x360 [ 2940.081577] create_object.isra.0+0x3a/0xa20 [ 2940.082021] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2940.082544] __kmalloc_node+0x1ae/0x4b0 [ 2940.082983] ? mempool_free_pages+0x20/0x20 [ 2940.083413] mempool_init_node+0x132/0x590 [ 2940.083879] ? mempool_free_pages+0x20/0x20 [ 2940.084309] ? mempool_free+0x3b0/0x3b0 [ 2940.084706] mempool_init+0x38/0x50 [ 2940.085105] bioset_init+0x52c/0x800 [ 2940.085483] ? debug_mutex_init+0x33/0x70 [ 2940.085912] blk_alloc_queue+0xdc/0x670 [ 2940.086336] blk_mq_init_queue+0x44/0xd0 [ 2940.086774] loop_add+0x2cf/0x8b0 [ 2940.087152] loop_control_ioctl+0x170/0x480 [ 2940.087605] ? loop_lookup+0x1d0/0x1d0 [ 2940.088020] ? selinux_file_ioctl+0xb1/0x260 [ 2940.088484] ? loop_lookup+0x1d0/0x1d0 [ 2940.088910] __x64_sys_ioctl+0x19a/0x210 [ 2940.089342] do_syscall_64+0x33/0x40 [ 2940.089738] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2940.090274] RIP: 0033:0x7f3b305e3b19 [ 2940.090686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2940.092690] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2940.093521] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2940.094295] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2940.095069] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2940.095835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2940.096605] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:49:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545c", 0x21, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2940.120446] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2940.142256] EXT4-fs (loop5): unsupported inode size: 0 [ 2940.142896] EXT4-fs (loop5): blocksize: 2048 [ 2940.153565] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2952.378765] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:49:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa00000000000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xffffff7f}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:49:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545c", 0x21, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfeffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfdffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 35) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2959.773045] EXT4-fs (loop4): invalid first ino: 0 [ 2959.779924] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2959.789445] FAULT_INJECTION: forcing a failure. [ 2959.789445] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.792044] CPU: 1 PID: 16383 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2959.793496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2959.793731] EXT4-fs (loop5): unsupported inode size: 0 [ 2959.795281] Call Trace: [ 2959.795309] dump_stack+0x107/0x167 [ 2959.795331] should_fail.cold+0x5/0xa [ 2959.795350] ? mempool_free_pages+0x20/0x20 [ 2959.795373] ? mempool_init_node+0x2d4/0x590 [ 2959.796569] EXT4-fs (loop5): blocksize: 2048 [ 2959.797052] ? mempool_free_pages+0x20/0x20 [ 2959.797080] should_failslab+0x5/0x20 [ 2959.803134] kmem_cache_alloc+0x5b/0x360 [ 2959.803977] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2959.805021] ? mempool_free_pages+0x20/0x20 [ 2959.805921] ? mempool_free_pages+0x20/0x20 [ 2959.806864] mempool_init_node+0x2d4/0x590 [ 2959.807761] ? mempool_free_pages+0x20/0x20 [ 2959.808658] ? mempool_free+0x3b0/0x3b0 [ 2959.809488] mempool_init+0x38/0x50 [ 2959.810268] bioset_init+0x52c/0x800 [ 2959.811072] ? debug_mutex_init+0x33/0x70 [ 2959.811935] blk_alloc_queue+0xdc/0x670 [ 2959.812767] blk_mq_init_queue+0x44/0xd0 [ 2959.813614] loop_add+0x2cf/0x8b0 [ 2959.814354] loop_control_ioctl+0x170/0x480 [ 2959.815258] ? loop_lookup+0x1d0/0x1d0 [ 2959.816073] ? selinux_file_ioctl+0xb1/0x260 [ 2959.816984] ? loop_lookup+0x1d0/0x1d0 [ 2959.817794] __x64_sys_ioctl+0x19a/0x210 [ 2959.818640] do_syscall_64+0x33/0x40 [ 2959.819439] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2959.820507] RIP: 0033:0x7f3b305e3b19 [ 2959.821281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2959.825096] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2959.826663] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2959.828166] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2959.829644] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2959.831131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2959.832634] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2959.848679] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2959.852488] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 19:49:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 36) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:49:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfeffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:49:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfff7ffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2960.044784] FAULT_INJECTION: forcing a failure. [ 2960.044784] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.047771] CPU: 1 PID: 16400 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2960.049229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2960.050964] Call Trace: [ 2960.051533] dump_stack+0x107/0x167 [ 2960.052318] should_fail.cold+0x5/0xa [ 2960.053117] ? create_object.isra.0+0x3a/0xa20 [ 2960.054068] should_failslab+0x5/0x20 [ 2960.054874] kmem_cache_alloc+0x5b/0x360 [ 2960.055732] ? mark_held_locks+0x9e/0xe0 [ 2960.056582] create_object.isra.0+0x3a/0xa20 [ 2960.057519] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2960.058574] kmem_cache_alloc+0x159/0x360 [ 2960.059487] ? mempool_free_pages+0x20/0x20 [ 2960.060414] ? mempool_free_pages+0x20/0x20 [ 2960.061356] mempool_init_node+0x2d4/0x590 [ 2960.062252] ? mempool_free_pages+0x20/0x20 [ 2960.063186] ? mempool_free+0x3b0/0x3b0 [ 2960.063996] mempool_init+0x38/0x50 [ 2960.064790] bioset_init+0x52c/0x800 [ 2960.065569] ? debug_mutex_init+0x33/0x70 [ 2960.066490] blk_alloc_queue+0xdc/0x670 [ 2960.067352] blk_mq_init_queue+0x44/0xd0 [ 2960.068234] loop_add+0x2cf/0x8b0 [ 2960.068957] loop_control_ioctl+0x170/0x480 [ 2960.069868] ? loop_lookup+0x1d0/0x1d0 [ 2960.070696] ? selinux_file_ioctl+0xb1/0x260 [ 2960.071608] ? loop_lookup+0x1d0/0x1d0 [ 2960.072407] __x64_sys_ioctl+0x19a/0x210 [ 2960.073252] do_syscall_64+0x33/0x40 [ 2960.074024] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2960.075152] RIP: 0033:0x7f3b305e3b19 [ 2960.075928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2960.079770] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2960.081338] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2960.082801] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2960.084267] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2960.085724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2960.087492] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2960.177612] EXT4-fs (loop4): invalid first ino: 0 [ 2960.234165] EXT4-fs (loop6): Unrecognized mount option "./file0" or missing value 19:49:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2960.268101] EXT4-fs (loop5): unsupported inode size: 0 [ 2960.269263] EXT4-fs (loop5): blocksize: 2048 19:49:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 37) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2960.371592] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 2960.375793] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2960.423406] FAULT_INJECTION: forcing a failure. [ 2960.423406] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.426068] CPU: 0 PID: 16426 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2960.427453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2960.429108] Call Trace: [ 2960.429641] dump_stack+0x107/0x167 [ 2960.430373] should_fail.cold+0x5/0xa [ 2960.431151] ? mempool_free_pages+0x20/0x20 [ 2960.432010] ? mempool_init_node+0x2d4/0x590 [ 2960.432888] should_failslab+0x5/0x20 [ 2960.433725] kmem_cache_alloc+0x5b/0x360 [ 2960.434635] ? mempool_free_pages+0x20/0x20 [ 2960.435627] ? mempool_free_pages+0x20/0x20 [ 2960.436587] mempool_init_node+0x2d4/0x590 [ 2960.437539] ? mempool_free_pages+0x20/0x20 [ 2960.438502] ? mempool_free+0x3b0/0x3b0 [ 2960.439397] mempool_init+0x38/0x50 [ 2960.440221] bioset_init+0x52c/0x800 [ 2960.441062] ? debug_mutex_init+0x33/0x70 [ 2960.441998] blk_alloc_queue+0xdc/0x670 [ 2960.442940] blk_mq_init_queue+0x44/0xd0 [ 2960.443856] loop_add+0x2cf/0x8b0 [ 2960.444644] loop_control_ioctl+0x170/0x480 [ 2960.445614] ? loop_lookup+0x1d0/0x1d0 [ 2960.446495] ? selinux_file_ioctl+0xb1/0x260 [ 2960.447491] ? loop_lookup+0x1d0/0x1d0 [ 2960.448365] __x64_sys_ioctl+0x19a/0x210 [ 2960.449277] do_syscall_64+0x33/0x40 [ 2960.450114] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2960.451265] RIP: 0033:0x7f3b305e3b19 [ 2960.452097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2960.456211] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2960.457907] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2960.459504] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2960.461091] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2960.462685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2960.464299] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2973.440077] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:50:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x4002000000000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:50:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xa00000000000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:50:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfff7ffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffff7ff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:10 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 38) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 2982.238170] EXT4-fs (loop5): unsupported inode size: 0 [ 2982.239460] EXT4-fs (loop5): blocksize: 2048 [ 2982.252353] FAULT_INJECTION: forcing a failure. [ 2982.252353] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.254971] CPU: 1 PID: 16455 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2982.256396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2982.258087] Call Trace: [ 2982.258628] dump_stack+0x107/0x167 [ 2982.259397] should_fail.cold+0x5/0xa [ 2982.260190] ? create_object.isra.0+0x3a/0xa20 [ 2982.261127] should_failslab+0x5/0x20 [ 2982.261907] kmem_cache_alloc+0x5b/0x360 [ 2982.262742] ? mark_held_locks+0x9e/0xe0 [ 2982.263587] create_object.isra.0+0x3a/0xa20 [ 2982.264476] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2982.265511] kmem_cache_alloc+0x159/0x360 [ 2982.266354] ? mempool_free_pages+0x20/0x20 [ 2982.267243] ? mempool_free_pages+0x20/0x20 [ 2982.268125] mempool_init_node+0x2d4/0x590 [ 2982.269003] ? mempool_free_pages+0x20/0x20 [ 2982.269882] ? mempool_free+0x3b0/0x3b0 [ 2982.270695] mempool_init+0x38/0x50 [ 2982.271466] bioset_init+0x52c/0x800 [ 2982.272231] ? debug_mutex_init+0x33/0x70 [ 2982.273086] blk_alloc_queue+0xdc/0x670 [ 2982.273907] blk_mq_init_queue+0x44/0xd0 [ 2982.274740] loop_add+0x2cf/0x8b0 [ 2982.275452] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 2982.276509] loop_control_ioctl+0x170/0x480 [ 2982.277387] ? loop_lookup+0x1d0/0x1d0 [ 2982.278186] ? selinux_file_ioctl+0xb1/0x260 [ 2982.279106] ? loop_lookup+0x1d0/0x1d0 [ 2982.279903] __x64_sys_ioctl+0x19a/0x210 [ 2982.280739] do_syscall_64+0x33/0x40 [ 2982.281501] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2982.282545] RIP: 0033:0x7f3b305e3b19 [ 2982.283319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2982.287077] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2982.288633] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2982.290095] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2982.291578] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2982.293043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2982.294503] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 2982.301046] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 2982.303938] EXT4-fs (loop6): get root inode failed [ 2982.305137] EXT4-fs (loop6): mount failed [ 2982.327798] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 2982.405070] EXT4-fs (loop4): unsupported inode size: 0 [ 2982.406394] EXT4-fs (loop4): blocksize: 2048 [ 2982.429270] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:50:10 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 39) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:50:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffff7ff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2982.524885] FAULT_INJECTION: forcing a failure. [ 2982.524885] name failslab, interval 1, probability 0, space 0, times 0 [ 2982.528340] CPU: 1 PID: 16481 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 2982.529788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2982.531484] Call Trace: [ 2982.532032] dump_stack+0x107/0x167 [ 2982.532783] should_fail.cold+0x5/0xa [ 2982.533566] ? bdi_alloc+0x44/0x380 [ 2982.534308] should_failslab+0x5/0x20 [ 2982.535111] kmem_cache_alloc_node_trace+0x59/0x380 [ 2982.536141] bdi_alloc+0x44/0x380 [ 2982.536858] blk_alloc_queue+0x100/0x670 [ 2982.537698] blk_mq_init_queue+0x44/0xd0 [ 2982.538534] loop_add+0x2cf/0x8b0 [ 2982.539275] loop_control_ioctl+0x170/0x480 [ 2982.540157] ? loop_lookup+0x1d0/0x1d0 [ 2982.540966] ? selinux_file_ioctl+0xb1/0x260 [ 2982.541877] ? loop_lookup+0x1d0/0x1d0 [ 2982.542681] __x64_sys_ioctl+0x19a/0x210 [ 2982.543534] do_syscall_64+0x33/0x40 [ 2982.544308] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2982.545362] RIP: 0033:0x7f3b305e3b19 [ 2982.546127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2982.549899] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2982.551461] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 2982.552924] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 2982.554381] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 2982.555860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2982.557319] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:50:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xffffff8c) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2982.610433] EXT4-fs (loop5): unsupported inode size: 0 [ 2982.611608] EXT4-fs (loop5): blocksize: 2048 19:50:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 2982.675417] EXT4-fs (loop4): unsupported inode size: 0 [ 2982.676687] EXT4-fs (loop4): blocksize: 2048 [ 2995.428195] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:50:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xffffff97) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x4002000000000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:50:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xffffff7f00000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:50:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xffffff8c) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:32 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 40) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:50:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3004.076277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3004.089898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3004.094463] FAULT_INJECTION: forcing a failure. [ 3004.094463] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.097119] CPU: 1 PID: 16515 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3004.098515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3004.100206] Call Trace: [ 3004.100745] dump_stack+0x107/0x167 [ 3004.101483] should_fail.cold+0x5/0xa [ 3004.102253] ? create_object.isra.0+0x3a/0xa20 [ 3004.103177] should_failslab+0x5/0x20 [ 3004.103954] kmem_cache_alloc+0x5b/0x360 [ 3004.104781] create_object.isra.0+0x3a/0xa20 [ 3004.105666] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3004.106695] kmem_cache_alloc_node_trace+0x16d/0x380 [ 3004.107735] bdi_alloc+0x44/0x380 [ 3004.108440] blk_alloc_queue+0x100/0x670 [ 3004.109263] blk_mq_init_queue+0x44/0xd0 [ 3004.110083] loop_add+0x2cf/0x8b0 [ 3004.110785] loop_control_ioctl+0x170/0x480 [ 3004.111671] ? loop_lookup+0x1d0/0x1d0 [ 3004.112459] ? selinux_file_ioctl+0xb1/0x260 [ 3004.113344] ? loop_lookup+0x1d0/0x1d0 [ 3004.114133] __x64_sys_ioctl+0x19a/0x210 [ 3004.114953] do_syscall_64+0x33/0x40 [ 3004.115713] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3004.116761] RIP: 0033:0x7f3b305e3b19 [ 3004.117519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3004.121267] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3004.122807] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3004.124270] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3004.125711] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3004.127168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3004.128622] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:50:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0xffffff7f00000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3004.139801] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3004.154809] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 3004.157777] EXT4-fs (loop6): get root inode failed [ 3004.158880] EXT4-fs (loop6): mount failed [ 3004.238106] EXT4-fs (loop5): unsupported inode size: 0 [ 3004.239385] EXT4-fs (loop5): blocksize: 2048 [ 3004.242861] EXT4-fs (loop4): unsupported inode size: 0 [ 3004.244068] EXT4-fs (loop4): blocksize: 2048 [ 3004.256202] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3017.265898] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:50:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:50:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:50:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xffffff97) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 41) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:50:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffff4) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3024.189203] FAULT_INJECTION: forcing a failure. [ 3024.189203] name failslab, interval 1, probability 0, space 0, times 0 [ 3024.191946] CPU: 1 PID: 16560 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3024.193329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3024.195035] Call Trace: [ 3024.195595] dump_stack+0x107/0x167 [ 3024.196368] should_fail.cold+0x5/0xa [ 3024.197163] ? create_object.isra.0+0x3a/0xa20 [ 3024.198099] should_failslab+0x5/0x20 [ 3024.198883] kmem_cache_alloc+0x5b/0x360 [ 3024.199735] create_object.isra.0+0x3a/0xa20 [ 3024.200639] kmemleak_alloc_percpu+0xa0/0x100 [ 3024.201555] pcpu_alloc+0x4e2/0x12f0 [ 3024.202333] __percpu_counter_init+0x10d/0x2d0 [ 3024.203264] fprop_local_init_percpu+0x22/0xb0 [ 3024.204201] wb_init.constprop.0+0x501/0x7c0 [ 3024.205095] bdi_alloc+0x21e/0x380 [ 3024.205818] blk_alloc_queue+0x100/0x670 [ 3024.206647] blk_mq_init_queue+0x44/0xd0 [ 3024.207471] loop_add+0x2cf/0x8b0 [ 3024.208198] loop_control_ioctl+0x170/0x480 [ 3024.209071] ? loop_lookup+0x1d0/0x1d0 [ 3024.209864] ? selinux_file_ioctl+0xb1/0x260 [ 3024.210757] ? loop_lookup+0x1d0/0x1d0 [ 3024.211553] __x64_sys_ioctl+0x19a/0x210 [ 3024.212371] do_syscall_64+0x33/0x40 [ 3024.213128] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3024.214162] RIP: 0033:0x7f3b305e3b19 [ 3024.214919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3024.218663] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3024.220215] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3024.221655] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3024.223100] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3024.224560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3024.226004] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3024.292436] EXT4-fs (loop5): unsupported inode size: 0 [ 3024.293788] EXT4-fs (loop5): blocksize: 2048 [ 3024.296221] EXT4-fs (loop4): unsupported inode size: 0 [ 3024.297464] EXT4-fs (loop4): blocksize: 2048 [ 3024.303668] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3024.305608] EXT4-fs (loop6): group descriptors corrupted! [ 3024.309336] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3024.312473] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:50:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffff4) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3024.516657] EXT4-fs (loop4): unsupported inode size: 0 [ 3024.517960] EXT4-fs (loop4): blocksize: 2048 19:50:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 42) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:50:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffff5) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3024.574488] FAULT_INJECTION: forcing a failure. [ 3024.574488] name failslab, interval 1, probability 0, space 0, times 0 [ 3024.577068] CPU: 0 PID: 16595 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3024.578490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3024.580199] Call Trace: [ 3024.580739] dump_stack+0x107/0x167 [ 3024.581503] should_fail.cold+0x5/0xa [ 3024.582280] ? create_object.isra.0+0x3a/0xa20 [ 3024.583219] should_failslab+0x5/0x20 [ 3024.584017] kmem_cache_alloc+0x5b/0x360 [ 3024.584833] ? mark_held_locks+0x9e/0xe0 [ 3024.585666] create_object.isra.0+0x3a/0xa20 [ 3024.586573] kmemleak_alloc_percpu+0xa0/0x100 [ 3024.587477] pcpu_alloc+0x4e2/0x12f0 [ 3024.588267] __percpu_counter_init+0x10d/0x2d0 [ 3024.589193] fprop_local_init_percpu+0x22/0xb0 [ 3024.590113] wb_init.constprop.0+0x501/0x7c0 [ 3024.591000] bdi_alloc+0x21e/0x380 [ 3024.591722] blk_alloc_queue+0x100/0x670 [ 3024.592543] blk_mq_init_queue+0x44/0xd0 [ 3024.593366] loop_add+0x2cf/0x8b0 [ 3024.594069] loop_control_ioctl+0x170/0x480 [ 3024.594934] ? loop_lookup+0x1d0/0x1d0 [ 3024.595744] ? selinux_file_ioctl+0xb1/0x260 [ 3024.596628] ? loop_lookup+0x1d0/0x1d0 [ 3024.597414] __x64_sys_ioctl+0x19a/0x210 [ 3024.598237] do_syscall_64+0x33/0x40 [ 3024.598991] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3024.600024] RIP: 0033:0x7f3b305e3b19 [ 3024.600777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3024.604477] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3024.606002] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3024.607431] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3024.608863] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3024.610286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3024.611722] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:50:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:50:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3024.754321] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3024.767049] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3024.795347] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3036.473102] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:51:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xa}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffff5) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xa}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffff6) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 43) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:51:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3043.217451] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3043.222900] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3043.224792] EXT4-fs (loop6): group descriptors corrupted! [ 3043.238703] EXT4-fs (loop4): unsupported inode size: 0 [ 3043.239275] FAULT_INJECTION: forcing a failure. [ 3043.239275] name failslab, interval 1, probability 0, space 0, times 0 [ 3043.239845] EXT4-fs (loop4): blocksize: 2048 [ 3043.243572] CPU: 1 PID: 16641 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3043.244999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3043.246685] Call Trace: [ 3043.247240] dump_stack+0x107/0x167 [ 3043.247995] should_fail.cold+0x5/0xa [ 3043.248774] ? create_object.isra.0+0x3a/0xa20 [ 3043.249698] should_failslab+0x5/0x20 [ 3043.250473] kmem_cache_alloc+0x5b/0x360 [ 3043.251304] create_object.isra.0+0x3a/0xa20 [ 3043.252229] kmemleak_alloc_percpu+0xa0/0x100 [ 3043.253148] pcpu_alloc+0x4e2/0x12f0 [ 3043.253922] __percpu_counter_init+0x10d/0x2d0 [ 3043.254855] wb_init.constprop.0+0x53a/0x7c0 [ 3043.255749] bdi_alloc+0x21e/0x380 [ 3043.256475] blk_alloc_queue+0x100/0x670 [ 3043.257303] blk_mq_init_queue+0x44/0xd0 [ 3043.258136] loop_add+0x2cf/0x8b0 [ 3043.258851] loop_control_ioctl+0x170/0x480 [ 3043.259733] ? loop_lookup+0x1d0/0x1d0 [ 3043.260528] ? selinux_file_ioctl+0xb1/0x260 [ 3043.261424] ? loop_lookup+0x1d0/0x1d0 [ 3043.262207] __x64_sys_ioctl+0x19a/0x210 [ 3043.263037] do_syscall_64+0x33/0x40 [ 3043.263817] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3043.264861] RIP: 0033:0x7f3b305e3b19 [ 3043.265614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3043.269359] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3043.270902] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3043.272353] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3043.273169] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3043.273783] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3043.273794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3043.273805] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3043.292059] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:51:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 44) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3043.494093] EXT4-fs (loop4): unsupported inode size: 0 [ 3043.495307] EXT4-fs (loop4): blocksize: 2048 19:51:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffb) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffff6) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3043.548497] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3043.550548] EXT4-fs (loop6): group descriptors corrupted! [ 3043.569349] FAULT_INJECTION: forcing a failure. [ 3043.569349] name failslab, interval 1, probability 0, space 0, times 0 [ 3043.571925] CPU: 1 PID: 16673 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3043.573309] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3043.574973] Call Trace: [ 3043.575512] dump_stack+0x107/0x167 [ 3043.576255] should_fail.cold+0x5/0xa [ 3043.577022] ? create_object.isra.0+0x3a/0xa20 [ 3043.577941] should_failslab+0x5/0x20 [ 3043.578706] kmem_cache_alloc+0x5b/0x360 [ 3043.579521] ? mark_held_locks+0x9e/0xe0 [ 3043.580358] create_object.isra.0+0x3a/0xa20 [ 3043.581246] kmemleak_alloc_percpu+0xa0/0x100 [ 3043.582144] pcpu_alloc+0x4e2/0x12f0 [ 3043.582910] __percpu_counter_init+0x10d/0x2d0 [ 3043.583856] wb_init.constprop.0+0x53a/0x7c0 [ 3043.584737] bdi_alloc+0x21e/0x380 [ 3043.585449] blk_alloc_queue+0x100/0x670 [ 3043.586272] blk_mq_init_queue+0x44/0xd0 [ 3043.587090] loop_add+0x2cf/0x8b0 [ 3043.587810] loop_control_ioctl+0x170/0x480 [ 3043.588686] ? loop_lookup+0x1d0/0x1d0 [ 3043.589476] ? selinux_file_ioctl+0xb1/0x260 [ 3043.590358] ? loop_lookup+0x1d0/0x1d0 [ 3043.591138] __x64_sys_ioctl+0x19a/0x210 [ 3043.591975] do_syscall_64+0x33/0x40 [ 3043.592727] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3043.593753] RIP: 0033:0x7f3b305e3b19 [ 3043.594495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3043.598206] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3043.599724] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3043.601158] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3043.602597] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3043.604092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3043.605565] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:51:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3043.735848] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3043.748314] EXT4-fs (loop4): unsupported inode size: 0 [ 3043.749482] EXT4-fs (loop4): blocksize: 2048 [ 3043.766629] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3043.779484] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3055.066149] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:51:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0x240}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0x240}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:32 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 45) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:51:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffb) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffd) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3064.080284] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3064.082182] EXT4-fs (loop6): group descriptors corrupted! [ 3064.086279] FAULT_INJECTION: forcing a failure. [ 3064.086279] name failslab, interval 1, probability 0, space 0, times 0 [ 3064.088708] CPU: 1 PID: 16707 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3064.090109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3064.091776] Call Trace: [ 3064.092329] dump_stack+0x107/0x167 [ 3064.093067] should_fail.cold+0x5/0xa [ 3064.093851] ? create_object.isra.0+0x3a/0xa20 [ 3064.094773] should_failslab+0x5/0x20 [ 3064.095540] kmem_cache_alloc+0x5b/0x360 [ 3064.096383] ? mark_held_locks+0x9e/0xe0 [ 3064.097203] create_object.isra.0+0x3a/0xa20 [ 3064.098096] kmemleak_alloc_percpu+0xa0/0x100 [ 3064.099000] pcpu_alloc+0x4e2/0x12f0 [ 3064.099769] __percpu_counter_init+0x10d/0x2d0 [ 3064.100698] wb_init.constprop.0+0x53a/0x7c0 [ 3064.101587] bdi_alloc+0x21e/0x380 [ 3064.102304] blk_alloc_queue+0x100/0x670 [ 3064.103128] blk_mq_init_queue+0x44/0xd0 [ 3064.103951] loop_add+0x2cf/0x8b0 [ 3064.104671] loop_control_ioctl+0x170/0x480 [ 3064.105536] ? loop_lookup+0x1d0/0x1d0 [ 3064.106323] ? selinux_file_ioctl+0xb1/0x260 [ 3064.107209] ? loop_lookup+0x1d0/0x1d0 [ 3064.107998] __x64_sys_ioctl+0x19a/0x210 [ 3064.108826] do_syscall_64+0x33/0x40 [ 3064.109575] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3064.110608] RIP: 0033:0x7f3b305e3b19 [ 3064.111357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3064.115056] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3064.116609] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3064.118045] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3064.119481] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3064.120929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3064.122367] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3064.181032] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 3064.246473] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3064.266226] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:51:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffd) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffe) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:32 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 46) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:51:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3064.418343] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3064.420255] EXT4-fs (loop6): group descriptors corrupted! [ 3064.429992] FAULT_INJECTION: forcing a failure. [ 3064.429992] name failslab, interval 1, probability 0, space 0, times 0 [ 3064.432799] CPU: 1 PID: 16741 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3064.434202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3064.435864] Call Trace: [ 3064.436423] dump_stack+0x107/0x167 [ 3064.437167] should_fail.cold+0x5/0xa [ 3064.437932] ? create_object.isra.0+0x3a/0xa20 [ 3064.438877] should_failslab+0x5/0x20 [ 3064.439672] kmem_cache_alloc+0x5b/0x360 [ 3064.440518] ? mark_held_locks+0x9e/0xe0 [ 3064.441381] create_object.isra.0+0x3a/0xa20 [ 3064.442295] kmemleak_alloc_percpu+0xa0/0x100 [ 3064.443237] pcpu_alloc+0x4e2/0x12f0 [ 3064.444048] __percpu_counter_init+0x10d/0x2d0 [ 3064.444996] wb_init.constprop.0+0x53a/0x7c0 [ 3064.445891] bdi_alloc+0x21e/0x380 [ 3064.446620] blk_alloc_queue+0x100/0x670 [ 3064.447461] blk_mq_init_queue+0x44/0xd0 [ 3064.448296] loop_add+0x2cf/0x8b0 [ 3064.449002] ? loop_add+0x2/0x8b0 [ 3064.449710] loop_control_ioctl+0x170/0x480 [ 3064.450593] ? loop_lookup+0x1d0/0x1d0 [ 3064.451396] ? selinux_file_ioctl+0xb1/0x260 [ 3064.452307] ? loop_lookup+0x1d0/0x1d0 [ 3064.453099] __x64_sys_ioctl+0x19a/0x210 [ 3064.453933] do_syscall_64+0x33/0x40 [ 3064.454692] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3064.455738] RIP: 0033:0x7f3b305e3b19 [ 3064.456510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3064.460265] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3064.461815] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3064.463269] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3064.464741] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3064.466195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3064.467648] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3064.474027] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:51:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x8000, 0x2) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3064.591371] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 3064.608899] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3064.718952] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3077.684481] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:51:54 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 47) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:51:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xa00}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xa00}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:54 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x8000, 0x2) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:54 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfffffffe) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3086.614162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3086.631989] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 3086.638102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3086.642288] FAULT_INJECTION: forcing a failure. [ 3086.642288] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.644893] CPU: 1 PID: 16785 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3086.646303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.647994] Call Trace: [ 3086.648541] dump_stack+0x107/0x167 [ 3086.649287] should_fail.cold+0x5/0xa [ 3086.650062] ? create_object.isra.0+0x3a/0xa20 [ 3086.650997] should_failslab+0x5/0x20 [ 3086.651773] kmem_cache_alloc+0x5b/0x360 [ 3086.652611] ? mark_held_locks+0x9e/0xe0 [ 3086.653453] create_object.isra.0+0x3a/0xa20 [ 3086.654363] kmemleak_alloc_percpu+0xa0/0x100 [ 3086.655284] pcpu_alloc+0x4e2/0x12f0 [ 3086.656065] __percpu_counter_init+0x10d/0x2d0 [ 3086.657010] wb_init.constprop.0+0x53a/0x7c0 [ 3086.657905] bdi_alloc+0x21e/0x380 [ 3086.658628] blk_alloc_queue+0x100/0x670 [ 3086.659458] blk_mq_init_queue+0x44/0xd0 [ 3086.660284] loop_add+0x2cf/0x8b0 [ 3086.661001] loop_control_ioctl+0x170/0x480 [ 3086.661880] ? loop_lookup+0x1d0/0x1d0 [ 3086.662681] ? selinux_file_ioctl+0xb1/0x260 [ 3086.663579] ? loop_lookup+0x1d0/0x1d0 [ 3086.664396] __x64_sys_ioctl+0x19a/0x210 [ 3086.665228] do_syscall_64+0x33/0x40 [ 3086.665988] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3086.667028] RIP: 0033:0x7f3b305e3b19 [ 3086.667763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.671510] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3086.673076] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3086.674531] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3086.675986] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3086.677454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3086.678910] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3086.712305] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3086.745681] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3086.791695] EXT4-fs (loop6): Unrecognized mount option "./file0" or missing value [ 3086.803344] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:51:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0x4002}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3086.820128] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:51:55 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 48) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:51:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0x4002}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3086.886601] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:51:55 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3086.895346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:51:55 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x8000, 0x2) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3086.926010] FAULT_INJECTION: forcing a failure. [ 3086.926010] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.928423] CPU: 0 PID: 16815 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3086.929793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.931484] Call Trace: [ 3086.932022] dump_stack+0x107/0x167 [ 3086.932780] should_fail.cold+0x5/0xa [ 3086.933554] ? create_object.isra.0+0x3a/0xa20 [ 3086.934591] should_failslab+0x5/0x20 [ 3086.935446] kmem_cache_alloc+0x5b/0x360 [ 3086.936397] ? mark_held_locks+0x9e/0xe0 [ 3086.937318] create_object.isra.0+0x3a/0xa20 [ 3086.938328] kmemleak_alloc_percpu+0xa0/0x100 [ 3086.939345] pcpu_alloc+0x4e2/0x12f0 [ 3086.940211] __percpu_counter_init+0x10d/0x2d0 [ 3086.941253] wb_init.constprop.0+0x53a/0x7c0 [ 3086.942259] bdi_alloc+0x21e/0x380 [ 3086.943062] blk_alloc_queue+0x100/0x670 [ 3086.943986] blk_mq_init_queue+0x44/0xd0 [ 3086.944911] loop_add+0x2cf/0x8b0 [ 3086.945680] ? loop_add+0x2/0x8b0 [ 3086.946398] loop_control_ioctl+0x170/0x480 [ 3086.947285] ? loop_lookup+0x1d0/0x1d0 [ 3086.948092] ? selinux_file_ioctl+0xb1/0x260 [ 3086.949021] ? loop_lookup+0x1d0/0x1d0 [ 3086.949827] __x64_sys_ioctl+0x19a/0x210 [ 3086.950672] do_syscall_64+0x33/0x40 [ 3086.951441] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3086.952498] RIP: 0033:0x7f3b305e3b19 [ 3086.953267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.957062] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3086.958631] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3086.960098] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3086.961579] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3086.963043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3086.964518] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3086.990756] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:51:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x100000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:51:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xa000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:51:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3087.136718] EXT4-fs (loop6): Unrecognized mount option "./file0" or missing value [ 3087.152883] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:51:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xa000000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3087.256231] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3087.278811] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3087.292771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3087.308327] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3087.361890] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3087.382590] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3087.400317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3097.880322] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:52:12 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x0, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0x40020000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:52:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0x40020000}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:52:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:12 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 49) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3104.396845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.397602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.418765] FAULT_INJECTION: forcing a failure. [ 3104.418765] name failslab, interval 1, probability 0, space 0, times 0 [ 3104.420228] CPU: 0 PID: 16877 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3104.420997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3104.421896] Call Trace: [ 3104.422189] dump_stack+0x107/0x167 [ 3104.422586] should_fail.cold+0x5/0xa [ 3104.423003] ? create_object.isra.0+0x3a/0xa20 [ 3104.423503] should_failslab+0x5/0x20 [ 3104.423921] kmem_cache_alloc+0x5b/0x360 [ 3104.424368] create_object.isra.0+0x3a/0xa20 [ 3104.424868] kmemleak_alloc_percpu+0xa0/0x100 [ 3104.425357] pcpu_alloc+0x4e2/0x12f0 [ 3104.425778] __percpu_counter_init+0x10d/0x2d0 [ 3104.426275] wb_init.constprop.0+0x53a/0x7c0 [ 3104.426783] bdi_alloc+0x21e/0x380 [ 3104.427170] blk_alloc_queue+0x100/0x670 [ 3104.427615] blk_mq_init_queue+0x44/0xd0 [ 3104.428075] loop_add+0x2cf/0x8b0 [ 3104.428457] ? loop_add+0x2/0x8b0 [ 3104.428861] loop_control_ioctl+0x170/0x480 [ 3104.429342] ? loop_lookup+0x1d0/0x1d0 [ 3104.429777] ? selinux_file_ioctl+0xb1/0x260 [ 3104.430264] ? loop_lookup+0x1d0/0x1d0 [ 3104.430690] __x64_sys_ioctl+0x19a/0x210 [ 3104.431149] do_syscall_64+0x33/0x40 [ 3104.431554] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3104.432129] RIP: 0033:0x7f3b305e3b19 [ 3104.432551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3104.434551] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3104.435400] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3104.436198] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3104.437004] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3104.437795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3104.438594] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3104.461518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.482919] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:52:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:52:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3104.523061] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3104.529200] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3104.531214] EXT4-fs (loop6): group descriptors corrupted! [ 3104.538449] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:52:12 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, 0x0) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3104.586862] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:52:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x0, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7ffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:13 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 50) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:52:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x8000, 0x2) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3104.690616] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.701419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.737273] FAULT_INJECTION: forcing a failure. [ 3104.737273] name failslab, interval 1, probability 0, space 0, times 0 [ 3104.740093] CPU: 1 PID: 16912 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3104.741663] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3104.743529] Call Trace: [ 3104.744137] dump_stack+0x107/0x167 [ 3104.744970] should_fail.cold+0x5/0xa [ 3104.745834] ? create_object.isra.0+0x3a/0xa20 [ 3104.746860] should_failslab+0x5/0x20 [ 3104.747712] kmem_cache_alloc+0x5b/0x360 [ 3104.748644] ? mark_held_locks+0x9e/0xe0 [ 3104.749550] create_object.isra.0+0x3a/0xa20 [ 3104.750509] kmemleak_alloc_percpu+0xa0/0x100 [ 3104.751486] pcpu_alloc+0x4e2/0x12f0 [ 3104.752316] __percpu_counter_init+0x10d/0x2d0 [ 3104.753318] wb_init.constprop.0+0x53a/0x7c0 [ 3104.754267] bdi_alloc+0x21e/0x380 [ 3104.755044] blk_alloc_queue+0x100/0x670 [ 3104.755942] blk_mq_init_queue+0x44/0xd0 [ 3104.756844] loop_add+0x2cf/0x8b0 [ 3104.757611] loop_control_ioctl+0x170/0x480 [ 3104.758563] ? loop_lookup+0x1d0/0x1d0 [ 3104.759430] ? selinux_file_ioctl+0xb1/0x260 [ 3104.760396] ? loop_lookup+0x1d0/0x1d0 [ 3104.761268] __x64_sys_ioctl+0x19a/0x210 [ 3104.762165] do_syscall_64+0x33/0x40 [ 3104.762976] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3104.764093] RIP: 0033:0x7f3b305e3b19 [ 3104.764918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3104.769095] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3104.770828] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3104.772456] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3104.774089] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3104.775660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3104.777163] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:52:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3104.811720] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:52:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044008) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3104.870306] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.895964] EXT4-fs (loop6): Unrecognized mount option "./file0" or missing value [ 3104.921092] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3104.941378] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3104.956843] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3104.964505] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3104.996357] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3116.655579] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:52:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x0, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044008) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:52:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x8000, 0x2) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) fcntl$addseals(r3, 0x409, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) 19:52:32 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 51) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3123.858359] FAULT_INJECTION: forcing a failure. [ 3123.858359] name failslab, interval 1, probability 0, space 0, times 0 [ 3123.859764] CPU: 0 PID: 16958 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3123.860513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3123.861421] Call Trace: [ 3123.861721] dump_stack+0x107/0x167 [ 3123.862116] should_fail.cold+0x5/0xa [ 3123.862539] ? blk_alloc_queue_stats+0x3c/0x110 [ 3123.863045] should_failslab+0x5/0x20 [ 3123.863458] kmem_cache_alloc_trace+0x55/0x360 [ 3123.863959] blk_alloc_queue_stats+0x3c/0x110 [ 3123.864443] blk_alloc_queue+0x138/0x670 [ 3123.864907] blk_mq_init_queue+0x44/0xd0 [ 3123.865349] loop_add+0x2cf/0x8b0 [ 3123.865720] loop_control_ioctl+0x170/0x480 [ 3123.866195] ? loop_lookup+0x1d0/0x1d0 [ 3123.866625] ? selinux_file_ioctl+0xb1/0x260 [ 3123.867108] ? loop_lookup+0x1d0/0x1d0 [ 3123.867535] __x64_sys_ioctl+0x19a/0x210 [ 3123.867977] do_syscall_64+0x33/0x40 [ 3123.868388] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3123.868711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3123.868958] RIP: 0033:0x7f3b305e3b19 [ 3123.868971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3123.868977] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3123.868990] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3123.869006] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3123.875889] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3123.876658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3123.877444] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3123.882111] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3123.902599] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3123.912430] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3123.937919] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3123.940018] EXT4-fs (loop6): group descriptors corrupted! [ 3123.974171] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3123.993440] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3124.003229] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3124.016315] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:52:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3135.092819] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:52:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x5e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x14044005) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:52:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 52) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:52:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$incfs(0xffffffffffffffff, 0x0, 0x8000, 0x2) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RCREATE(r3, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x6}, 0x5}}, 0x18) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) sendmmsg$inet6(r4, &(0x7f00000009c0)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x6, @local, 0x40}, 0x1c, &(0x7f0000000200), 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x140}}, {{&(0x7f00000003c0)={0xa, 0x4e20, 0x8, @empty, 0x6}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000400)="0bb9a86af3db26afd33ae8e5643643564b6ee480095c66492e4e22c4f653117cb43a7326c05ab41989499333667eda0a4a3f8739691def1e1a468f7a3c4b5f99e7202b710165d3753d6a210cda0eceaf102bda0ca11e8bf523f6721d2aa75299dc1c607bea8b7aef74e7fdab5d1d72b6478a9272575b501b250b65ce64375447e3949d77586ac32dd531338d371abba2ffef00", 0x93}, {&(0x7f00000004c0)="caa9048d69c38b11e6a80ce3e684a1b03db0ec5c5b7b3609ee6c53af1421452b922d484556845070fe71295bf865445b9eefb3005e7e0b92e566b9e6dd1325cc934c09b7cdf33b16dfe69874b967006b807fcbcbc8f010682d79657eaf98b65602ea61d5af23599fc59faef3e175", 0x6e}], 0x2, &(0x7f0000000a80)=[@tclass={{0x14, 0x29, 0x43, 0x9}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x32, 0x0, '\x00', [@ra={0x5, 0x2, 0x9}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @hopopts={{0x90, 0x29, 0x36, {0x5e, 0xe, '\x00', [@pad1, @calipso={0x7, 0x10, {0x2, 0x2, 0x6, 0x6, [0x8]}}, @ra={0x5, 0x2, 0x1}, @jumbo, @enc_lim={0x4, 0x1, 0x7f}, @calipso={0x7, 0x18, {0x2, 0x4, 0x9, 0x5, [0x8, 0x8]}}, @calipso={0x7, 0x30, {0x0, 0xa, 0x8, 0x3, [0x2, 0x1000, 0x100000000, 0x7fff, 0xffffffffffff8001]}}, @ra={0x5, 0x2, 0x1}]}}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x2d6fa6dac55bd412, 0x1, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x1, 0x4, '\x00', [@generic={0xaa, 0x1c, "ab3a2a5fb29299631e13a80aede8812ccace28a677818d75f219a930"}, @ra={0x5, 0x2, 0xff}, @padn={0x1, 0x1, [0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x10001}}, @hopopts={{0x20, 0x29, 0x36, {0x5e, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8b}, @ra={0x5, 0x2, 0x100}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4716}}], 0x198}}, {{&(0x7f00000005c0)={0xa, 0x4e23, 0xfffffffa, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8}, 0x1c, &(0x7f0000000880)=[{&(0x7f0000000600)="aa7a51636c2accf28503b401216a82ebd0d9e01b09f972f6535c7a14820439fc50444dc514565a06342287f773f318c74ef565cdf4f67c9f3ae035f0d561e2be61847538d11876536d8d42d6bdaed665214b116ab8f02ce78ff2bbcc9f944e954cc47cc568f01a9e468f94bfe517f832886a8f6599bccf7e8b1f4f2d07ba9aacf70b81", 0x83}], 0x1, &(0x7f00000008c0)=[@rthdr_2292={{0x68, 0x29, 0x39, {0xff, 0xa, 0x1, 0x9, 0x0, [@mcast1, @mcast1, @mcast2, @dev={0xfe, 0x80, '\x00', 0x19}, @rand_addr=' \x01\x00']}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7c}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @rthdr_2292={{0x68, 0x29, 0x39, {0xff, 0xa, 0x2, 0x7, 0x0, [@empty, @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x24}, @ipv4={'\x00', '\xff\xff', @empty}, @rand_addr=' \x01\x00']}}}], 0x100}}], 0x3, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) getpeername(0xffffffffffffffff, &(0x7f0000000780)=@rc={0x1f, @none}, &(0x7f0000000800)=0x80) r5 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r5, 0xc0389424, &(0x7f0000000740)={0x8, 0x38, '\x00', 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0), 0x4) r6 = open_tree(r4, &(0x7f0000000100)='./file0\x00', 0x1000) accept4$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x0, 0x800) 19:52:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7ffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3144.082104] FAULT_INJECTION: forcing a failure. [ 3144.082104] name failslab, interval 1, probability 0, space 0, times 0 [ 3144.085265] CPU: 1 PID: 17006 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3144.086835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3144.088714] Call Trace: [ 3144.089348] dump_stack+0x107/0x167 [ 3144.090202] should_fail.cold+0x5/0xa [ 3144.091070] ? create_object.isra.0+0x3a/0xa20 [ 3144.092111] should_failslab+0x5/0x20 [ 3144.092960] kmem_cache_alloc+0x5b/0x360 [ 3144.093894] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3144.095110] create_object.isra.0+0x3a/0xa20 [ 3144.096109] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3144.097284] kmem_cache_alloc_trace+0x151/0x360 [ 3144.098351] blk_alloc_queue_stats+0x3c/0x110 [ 3144.099356] blk_alloc_queue+0x138/0x670 [ 3144.100273] blk_mq_init_queue+0x44/0xd0 [ 3144.101230] loop_add+0x2cf/0x8b0 [ 3144.102007] loop_control_ioctl+0x170/0x480 [ 3144.102992] ? loop_lookup+0x1d0/0x1d0 [ 3144.103873] ? selinux_file_ioctl+0xb1/0x260 [ 3144.104873] ? loop_lookup+0x1d0/0x1d0 [ 3144.105765] __x64_sys_ioctl+0x19a/0x210 [ 3144.106709] do_syscall_64+0x33/0x40 [ 3144.107551] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3144.108693] RIP: 0033:0x7f3b305e3b19 [ 3144.109548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3144.113646] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3144.115352] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3144.116933] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3144.118538] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3144.120151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3144.121844] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:52:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0xfffffffc, @private2}, 0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000040)=0x6, 0x4) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r2) r5 = accept(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000180)=0x80) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000240)=0xfe6, 0x4) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e23, 0x8, @remote, 0x800}, 0x1c) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3144.210798] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3144.212778] EXT4-fs (loop6): group descriptors corrupted! [ 3144.240758] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3144.243191] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3144.259746] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3144.273131] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:52:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 53) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:52:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x100000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x0, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:52:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3144.440455] FAULT_INJECTION: forcing a failure. [ 3144.440455] name failslab, interval 1, probability 0, space 0, times 0 [ 3144.443251] CPU: 1 PID: 17045 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3144.444766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3144.446567] Call Trace: [ 3144.447148] dump_stack+0x107/0x167 [ 3144.447944] should_fail.cold+0x5/0xa [ 3144.448774] ? create_object.isra.0+0x3a/0xa20 [ 3144.449780] should_failslab+0x5/0x20 [ 3144.450601] kmem_cache_alloc+0x5b/0x360 [ 3144.451481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3144.452618] create_object.isra.0+0x3a/0xa20 [ 3144.453587] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3144.454692] kmem_cache_alloc_trace+0x151/0x360 [ 3144.455712] blk_alloc_queue_stats+0x3c/0x110 [ 3144.456681] blk_alloc_queue+0x138/0x670 [ 3144.457576] blk_mq_init_queue+0x44/0xd0 [ 3144.458463] loop_add+0x2cf/0x8b0 [ 3144.459216] ? loop_add+0x2/0x8b0 [ 3144.459974] loop_control_ioctl+0x170/0x480 [ 3144.460908] ? loop_lookup+0x1d0/0x1d0 [ 3144.461771] ? selinux_file_ioctl+0xb1/0x260 [ 3144.462729] ? loop_lookup+0x1d0/0x1d0 [ 3144.463587] __x64_sys_ioctl+0x19a/0x210 [ 3144.464470] do_syscall_64+0x33/0x40 [ 3144.465300] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3144.466407] RIP: 0033:0x7f3b305e3b19 [ 3144.467212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3144.471195] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3144.472853] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3144.474404] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3144.475948] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3144.477504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3144.479056] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3144.519190] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3144.520561] EXT4-fs (loop6): group descriptors corrupted! [ 3144.554618] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3144.569497] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3144.588722] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3144.603845] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:52:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3144.687464] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3144.688644] EXT4-fs (loop6): group descriptors corrupted! [ 3144.725049] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3158.955593] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:53:13 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 54) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:53:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="da8d92ce643d3d3848a8dda424b8446ae0cbf9bef4a9c032c3b2c450f9474e6a8d9948a6155e000cc76f447a63f75ed27764b322d1f0b14bd930a4e676208e466cb46c5b24462651e1aaa80f6645de3039ff85414350532b23c66f4ee1f2ca7f1b77a57ef926ab580f304641af3ac640b4d1", 0x72}, {&(0x7f0000000200)="f1100f70fb44b4a68235c0d4909c6de5de95c0548a19d2cbb21dabb6775b848f5709223201285535b9dcd2fd027b64c6deef5ea30aa1b8318b49777cda698c7787c89f5bf5202713b87b21ae771fd169bc45b8f5937306db7170e71257272e8dd619fcbcf99e1431fc07289fb82472b4ff5a68d0ccac2fff0aa8a0b89affa69bc7748d2e8f75a05fce8d84de29c818cfb36831b0b4c5811487c1f40ca027ba66c84410468f2c92a0ea77cf4a2e1a02ceff97adc8aee2fbcf7aa916d7d9589db48fd6f391ec0e3ccdf39be10a6cd91f57e399da6e1bfe7ae8a51064a9ab", 0xdd}, {&(0x7f0000000040)="2093a2790fd22446708b7c3df3fc796687c2b220e1c2b4216b76adbef25500a86000f06c5fd149f75a572117486fc2fa6c6c30c60d056a24c1002ebbc14cb5", 0x3f}], 0x3, &(0x7f0000000380)=[@hopopts_2292={{0x50, 0x29, 0x36, {0x33, 0x6, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @ra={0x5, 0x2, 0x200}, @generic={0xff, 0x10, "98eddf31013239e7dd10c4618245d521"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1d, 0x2, 0x1, 0x9, 0x0, [@mcast1]}}}], 0x78}, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:53:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x3c4, 0x81}}, './file0\x00'}) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) dup2(r1, r2) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r5, 0xf50f, 0x0) sendmsg$inet6(r4, &(0x7f00000006c0)={0x0, 0x4b, &(0x7f0000000540), 0x1, 0x0, 0xffee}, 0x10044001) r6 = dup2(r0, r3) accept4$inet6(r6, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:53:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:13 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x0, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:13 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3165.436269] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3165.438304] EXT4-fs (loop6): group descriptors corrupted! 19:53:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x200000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat$incfs(r0, 0x0, 0x8000, 0x2) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3165.463461] FAULT_INJECTION: forcing a failure. [ 3165.463461] name failslab, interval 1, probability 0, space 0, times 0 [ 3165.465766] CPU: 1 PID: 17092 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3165.466852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3165.468104] Call Trace: [ 3165.468519] dump_stack+0x107/0x167 [ 3165.469087] should_fail.cold+0x5/0xa [ 3165.469698] ? create_object.isra.0+0x3a/0xa20 [ 3165.470393] should_failslab+0x5/0x20 [ 3165.470972] kmem_cache_alloc+0x5b/0x360 [ 3165.471580] ? mark_held_locks+0x9e/0xe0 [ 3165.472203] create_object.isra.0+0x3a/0xa20 [ 3165.472861] kmemleak_alloc_percpu+0xa0/0x100 [ 3165.473558] pcpu_alloc+0x4e2/0x12f0 [ 3165.474137] ? blk_clear_pm_only+0x80/0x80 [ 3165.474748] percpu_ref_init+0x31/0x3d0 [ 3165.475394] blk_alloc_queue+0x455/0x670 [ 3165.476066] blk_mq_init_queue+0x44/0xd0 [ 3165.476711] loop_add+0x2cf/0x8b0 [ 3165.477259] loop_control_ioctl+0x170/0x480 [ 3165.477904] ? loop_lookup+0x1d0/0x1d0 [ 3165.478522] ? selinux_file_ioctl+0xb1/0x260 [ 3165.479227] ? loop_lookup+0x1d0/0x1d0 [ 3165.479850] __x64_sys_ioctl+0x19a/0x210 [ 3165.480485] do_syscall_64+0x33/0x40 [ 3165.481079] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3165.481926] RIP: 0033:0x7f3b305e3b19 19:53:13 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3165.482530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3165.485470] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3165.486676] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3165.487831] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3165.488983] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3165.490100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3165.491219] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3165.495374] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3165.499942] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:53:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = socket$inet6(0xa, 0x80000, 0x800) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x9, @mcast2, 0x40}, 0x1c) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3165.534100] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3165.550080] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3165.572976] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3165.596133] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:53:13 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 55) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3165.620079] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3165.621497] EXT4-fs (loop6): group descriptors corrupted! 19:53:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) recvmmsg(r2, &(0x7f0000007640)=[{{&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000200)=""/91, 0x5b}, {&(0x7f0000000280)=""/184, 0xb8}], 0x3, &(0x7f0000000380)=""/32, 0x20}, 0x9}, {{&(0x7f00000003c0)=@qipcrtr, 0x80, &(0x7f0000002b00)=[{&(0x7f0000000440)=""/229, 0xe5}, {&(0x7f0000000580)=""/141, 0x8d}, {&(0x7f0000000640)=""/125, 0x7d}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/251, 0xfb}, {&(0x7f0000001800)=""/243, 0xf3}, {&(0x7f0000001900)=""/134, 0x86}, {&(0x7f00000019c0)=""/221, 0xdd}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/58, 0x3a}], 0xa}, 0x1}, {{&(0x7f0000002bc0)=@nl, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002c40)=""/61, 0x3d}, {&(0x7f0000002c80)=""/106, 0x6a}], 0x2, &(0x7f0000002d40)=""/49, 0x31}, 0x1}, {{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000005400)=[{&(0x7f0000002e00)=""/46, 0x2e}, {&(0x7f0000002e40)=""/246, 0xf6}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/45, 0x2d}, {&(0x7f0000003f80)=""/4096, 0x1000}, {&(0x7f0000004f80)=""/251, 0xfb}, {&(0x7f0000005080)=""/141, 0x8d}, {&(0x7f0000005140)=""/207, 0xcf}, {&(0x7f0000005240)=""/252, 0xfc}, {&(0x7f0000005340)=""/170, 0xaa}], 0xa, &(0x7f00000054c0)=""/234, 0xea}, 0xffffffff}, {{&(0x7f00000055c0)=@nfc, 0x80, &(0x7f0000005640), 0x0, &(0x7f0000005680)=""/219, 0xdb}, 0x9}, {{&(0x7f0000005780)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000005ac0)=[{&(0x7f0000005800)=""/187, 0xbb}, {&(0x7f00000058c0)=""/214, 0xd6}, {&(0x7f00000059c0)=""/7, 0x7}, {&(0x7f0000005a00)=""/94, 0x5e}, {&(0x7f0000005a80)}], 0x5, &(0x7f0000005b40)=""/52, 0x34}, 0x9}, {{0x0, 0x0, &(0x7f0000006f40)=[{&(0x7f0000005b80)=""/4096, 0x1000}, {&(0x7f0000006b80)=""/96, 0x60}, {&(0x7f0000006c00)=""/123, 0x7b}, {&(0x7f0000006c80)=""/8, 0x8}, {&(0x7f0000006cc0)=""/40, 0x28}, {&(0x7f0000006d00)=""/252, 0xfc}, {&(0x7f0000006e00)=""/118, 0x76}, {&(0x7f0000006e80)=""/172, 0xac}], 0x8}, 0xf40}, {{&(0x7f0000006fc0)=@rc={0x1f, @none}, 0x80, &(0x7f0000007100)=[{&(0x7f0000007040)=""/131, 0x83}], 0x1}, 0x8864}, {{&(0x7f0000007140)=@nfc, 0x80, &(0x7f00000075c0)=[{&(0x7f00000071c0)=""/249, 0xf9}, {&(0x7f00000072c0)=""/97, 0x61}, {&(0x7f0000007340)=""/151, 0x97}, {&(0x7f0000007400)=""/227, 0xe3}, {&(0x7f0000007500)=""/60, 0x3c}, {&(0x7f0000007540)=""/15, 0xf}, {&(0x7f0000007580)=""/7, 0x7}], 0x7}, 0x1}], 0x9, 0x40000000, &(0x7f0000007880)={0x77359400}) setsockopt$inet6_tcp_int(r3, 0x6, 0x9, &(0x7f00000078c0)=0xdedd, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3165.686853] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:53:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x0, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat$incfs(r0, 0x0, 0x8000, 0x2) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3165.724121] FAULT_INJECTION: forcing a failure. [ 3165.724121] name failslab, interval 1, probability 0, space 0, times 0 [ 3165.725378] CPU: 0 PID: 17126 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3165.726125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3165.727003] Call Trace: [ 3165.727306] dump_stack+0x107/0x167 [ 3165.727694] should_fail.cold+0x5/0xa [ 3165.728096] ? create_object.isra.0+0x3a/0xa20 [ 3165.728580] should_failslab+0x5/0x20 [ 3165.728991] kmem_cache_alloc+0x5b/0x360 [ 3165.729440] ? mark_held_locks+0x9e/0xe0 [ 3165.729874] create_object.isra.0+0x3a/0xa20 [ 3165.730351] kmemleak_alloc_percpu+0xa0/0x100 [ 3165.730826] pcpu_alloc+0x4e2/0x12f0 [ 3165.731230] ? blk_clear_pm_only+0x80/0x80 [ 3165.731683] percpu_ref_init+0x31/0x3d0 [ 3165.732113] blk_alloc_queue+0x455/0x670 [ 3165.732548] blk_mq_init_queue+0x44/0xd0 [ 3165.732979] loop_add+0x2cf/0x8b0 [ 3165.733359] loop_control_ioctl+0x170/0x480 [ 3165.733858] ? loop_lookup+0x1d0/0x1d0 [ 3165.734290] ? selinux_file_ioctl+0xb1/0x260 [ 3165.734771] ? loop_lookup+0x1d0/0x1d0 [ 3165.735213] __x64_sys_ioctl+0x19a/0x210 [ 3165.735663] do_syscall_64+0x33/0x40 [ 3165.736076] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3165.736642] RIP: 0033:0x7f3b305e3b19 [ 3165.737053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3165.739067] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3165.739912] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3165.740699] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3165.741495] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3165.742283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3165.743076] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:53:14 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3165.757221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:53:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x40000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3165.822159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3165.833067] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3165.857887] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3165.858479] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:53:14 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 56) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3165.876418] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3165.877875] EXT4-fs (loop6): group descriptors corrupted! [ 3165.881108] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:53:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x300000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) write$selinux_attr(r3, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e21, 0xffff, @mcast1, 0x7ff}, 0x1c) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8800) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) r5 = dup2(r4, r1) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000100)=@in6={0xa, 0x4e21, 0x3, @mcast1, 0x3}, 0x80) [ 3165.929119] FAULT_INJECTION: forcing a failure. [ 3165.929119] name failslab, interval 1, probability 0, space 0, times 0 [ 3165.931184] CPU: 1 PID: 17152 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3165.932254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3165.933577] Call Trace: [ 3165.933999] dump_stack+0x107/0x167 [ 3165.934560] should_fail.cold+0x5/0xa [ 3165.935167] ? create_object.isra.0+0x3a/0xa20 [ 3165.935873] should_failslab+0x5/0x20 [ 3165.936471] kmem_cache_alloc+0x5b/0x360 [ 3165.937110] create_object.isra.0+0x3a/0xa20 [ 3165.937810] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3165.938601] kmem_cache_alloc_trace+0x151/0x360 [ 3165.939355] ? blk_clear_pm_only+0x80/0x80 [ 3165.940051] percpu_ref_init+0xd8/0x3d0 [ 3165.940695] blk_alloc_queue+0x455/0x670 [ 3165.941338] blk_mq_init_queue+0x44/0xd0 [ 3165.942016] loop_add+0x2cf/0x8b0 [ 3165.942573] loop_control_ioctl+0x170/0x480 [ 3165.943275] ? loop_lookup+0x1d0/0x1d0 [ 3165.943905] ? selinux_file_ioctl+0xb1/0x260 [ 3165.944609] ? loop_lookup+0x1d0/0x1d0 [ 3165.945227] __x64_sys_ioctl+0x19a/0x210 [ 3165.945910] do_syscall_64+0x33/0x40 [ 3165.946504] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3165.947331] RIP: 0033:0x7f3b305e3b19 [ 3165.947931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3165.950923] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3165.952158] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3165.953293] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3165.954438] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3165.955586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3165.956722] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3165.962359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3165.994472] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3166.058571] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3166.806086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3170.636696] Bluetooth: hci0: command 0x0409 tx timeout [ 3172.684648] Bluetooth: hci0: command 0x041b tx timeout [ 3174.733634] Bluetooth: hci0: command 0x040f tx timeout [ 3175.751800] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3175.753466] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3175.757683] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3175.790225] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3175.791945] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3175.794883] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3175.964461] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3176.009057] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3176.780603] Bluetooth: hci0: command 0x0419 tx timeout [ 3189.084075] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:53:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x100000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0xfffffffc}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:53:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat$incfs(r0, 0x0, 0x8000, 0x2) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 57) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:53:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x400000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:53:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3204.170263] FAULT_INJECTION: forcing a failure. [ 3204.170263] name failslab, interval 1, probability 0, space 0, times 0 [ 3204.172861] CPU: 1 PID: 17644 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3204.174315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3204.176014] Call Trace: [ 3204.176579] dump_stack+0x107/0x167 [ 3204.177339] should_fail.cold+0x5/0xa [ 3204.177916] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3204.178164] ? blk_stat_alloc_callback+0x54/0x290 [ 3204.181369] should_failslab+0x5/0x20 [ 3204.182187] kmem_cache_alloc_trace+0x55/0x360 [ 3204.183160] ? blk_mq_quiesce_queue+0x1d0/0x1d0 [ 3204.184152] ? blk_mq_has_request+0xc0/0xc0 [ 3204.185046] blk_stat_alloc_callback+0x54/0x290 [ 3204.186040] ? kasan_unpoison_shadow+0x33/0x50 [ 3204.186997] blk_mq_init_allocated_queue+0x94/0x13b0 [ 3204.188084] ? blk_queue_dma_alignment+0xc/0x50 [ 3204.189048] ? blk_set_default_limits+0x9/0x5d0 [ 3204.190033] ? blk_alloc_queue+0x4b7/0x670 [ 3204.190916] blk_mq_init_queue+0x81/0xd0 [ 3204.191765] loop_add+0x2cf/0x8b0 [ 3204.192510] loop_control_ioctl+0x170/0x480 [ 3204.193394] ? loop_lookup+0x1d0/0x1d0 [ 3204.194237] ? selinux_file_ioctl+0xb1/0x260 [ 3204.195161] ? loop_lookup+0x1d0/0x1d0 [ 3204.195963] __x64_sys_ioctl+0x19a/0x210 [ 3204.196821] do_syscall_64+0x33/0x40 [ 3204.197600] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3204.198672] RIP: 0033:0x7f3b305e3b19 [ 3204.199454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3204.203297] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3204.204867] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3204.206373] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3204.207875] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3204.209695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3204.211516] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3204.251226] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3204.252445] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3204.270940] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3204.272940] EXT4-fs (loop6): group descriptors corrupted! [ 3204.301046] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3204.315186] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:53:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0103ff0f000004cfdad11c"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r4, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x3f}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xff}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x3587}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) dup2(r0, r1) accept4$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="7f5e9b5342f3d4443e61b6cb59238d747da3909549054c3e16ef944c0cd1248c9ab2f29714692af6154052689e96c531b20f6f7f9f95bc93e5c5240cd1bb23a354002b84a7a80c977dc5a85f74a06121a74bf5944ee947524abc4ebe91e54140ee437d87d3db19c68762d3c737e5a18b4f379fe5e23445972f79ddd553e346f3c052a3fd51cbbe8352239a533d94b3f11f1d2b0cdc0949e135fed1139a16aee9c6fa7352a7d5476109197c944d1d342b12c464984e99f6a754ae8d11d092c61e0a259c991a1a680b5222e8629d0732fff8507d14f6a5249be03f8f84c94757ef2c0a0236b130c1e7f714dc8a53ba651f09", 0xf1}], 0x1, &(0x7f0000000180)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x5a32}}], 0x18}}], 0x1, 0x8080) r5 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r6 = dup2(r5, r5) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) write$selinux_attr(r6, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4e20, 0x200, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x23dc}, 0x1c) [ 3204.365663] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3204.371440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:53:52 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 58) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:53:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, 0x0, 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x500000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3204.510628] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3204.512782] EXT4-fs (loop6): group descriptors corrupted! [ 3204.542328] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3204.559141] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:53:52 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3204.589044] FAULT_INJECTION: forcing a failure. [ 3204.589044] name failslab, interval 1, probability 0, space 0, times 0 [ 3204.591944] CPU: 1 PID: 17682 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3204.593361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3204.595079] Call Trace: [ 3204.595636] dump_stack+0x107/0x167 [ 3204.596401] should_fail.cold+0x5/0xa [ 3204.597187] ? create_object.isra.0+0x3a/0xa20 [ 3204.598154] should_failslab+0x5/0x20 [ 3204.598938] kmem_cache_alloc+0x5b/0x360 [ 3204.599781] create_object.isra.0+0x3a/0xa20 [ 3204.600684] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3204.601731] kmem_cache_alloc_trace+0x151/0x360 [ 3204.602703] ? blk_mq_quiesce_queue+0x1d0/0x1d0 [ 3204.603643] ? blk_mq_has_request+0xc0/0xc0 [ 3204.604530] blk_stat_alloc_callback+0x54/0x290 [ 3204.605477] ? kasan_unpoison_shadow+0x33/0x50 [ 3204.606435] blk_mq_init_allocated_queue+0x94/0x13b0 [ 3204.607490] ? blk_queue_dma_alignment+0xc/0x50 [ 3204.608442] ? blk_set_default_limits+0x9/0x5d0 [ 3204.609396] ? blk_alloc_queue+0x4b7/0x670 [ 3204.610281] blk_mq_init_queue+0x81/0xd0 [ 3204.611119] loop_add+0x2cf/0x8b0 [ 3204.611835] loop_control_ioctl+0x170/0x480 [ 3204.612718] ? loop_lookup+0x1d0/0x1d0 [ 3204.613528] ? selinux_file_ioctl+0xb1/0x260 [ 3204.614436] ? loop_lookup+0x1d0/0x1d0 [ 3204.615237] __x64_sys_ioctl+0x19a/0x210 [ 3204.616075] do_syscall_64+0x33/0x40 [ 3204.616840] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3204.617887] RIP: 0033:0x7f3b305e3b19 [ 3204.618674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3204.622448] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3204.624010] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3204.625475] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3204.626950] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3204.628414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3204.629877] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:53:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x200000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:53:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e20, 0xffff, @private1, 0x7}, 0x1c) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3204.780741] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:53:53 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 59) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3204.810514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3204.831365] FAULT_INJECTION: forcing a failure. [ 3204.831365] name failslab, interval 1, probability 0, space 0, times 0 [ 3204.833949] CPU: 1 PID: 17709 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3204.835348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3204.837050] Call Trace: [ 3204.837607] dump_stack+0x107/0x167 [ 3204.838351] should_fail.cold+0x5/0xa [ 3204.839130] ? blk_stat_alloc_callback+0x85/0x290 [ 3204.840115] should_failslab+0x5/0x20 [ 3204.840903] __kmalloc+0x72/0x3f0 [ 3204.841611] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3204.842673] ? blk_mq_quiesce_queue+0x1d0/0x1d0 [ 3204.843609] ? blk_mq_has_request+0xc0/0xc0 [ 3204.844480] blk_stat_alloc_callback+0x85/0x290 [ 3204.845421] ? kasan_unpoison_shadow+0x33/0x50 [ 3204.846359] blk_mq_init_allocated_queue+0x94/0x13b0 [ 3204.847394] ? blk_queue_dma_alignment+0xc/0x50 [ 3204.848336] ? blk_set_default_limits+0x9/0x5d0 [ 3204.849279] ? blk_alloc_queue+0x4b7/0x670 [ 3204.850162] blk_mq_init_queue+0x81/0xd0 [ 3204.850993] loop_add+0x2cf/0x8b0 [ 3204.851703] loop_control_ioctl+0x170/0x480 [ 3204.852581] ? loop_lookup+0x1d0/0x1d0 [ 3204.853377] ? selinux_file_ioctl+0xb1/0x260 [ 3204.854280] ? loop_lookup+0x1d0/0x1d0 [ 3204.855072] __x64_sys_ioctl+0x19a/0x210 [ 3204.855906] do_syscall_64+0x33/0x40 [ 3204.856665] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3204.857702] RIP: 0033:0x7f3b305e3b19 [ 3204.858479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3204.862204] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3204.863749] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3204.865192] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3204.866640] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3204.868082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3204.869521] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3204.877740] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3204.894448] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3204.919093] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3204.941002] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3204.943023] EXT4-fs (loop6): group descriptors corrupted! 19:53:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x600000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3205.063156] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3205.067090] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3205.166062] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3215.777668] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:54:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x700000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, 0x0, 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000100)={'syzkaller1\x00', {0x2, 0x0, @empty}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0xd, @loopback, 0x6}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) finit_module(r0, &(0x7f0000000040)='\x18$\x9b]\',&*\xfb@^\x00', 0x0) r4 = dup2(r0, r2) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:54:10 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 60) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:54:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x0) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000100)=""/119, &(0x7f0000000180)=0x77) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000040)=0x8001, 0x4) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x80000) 19:54:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x300000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3222.624240] FAULT_INJECTION: forcing a failure. [ 3222.624240] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.626893] CPU: 0 PID: 17746 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3222.628349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3222.630093] Call Trace: [ 3222.630664] dump_stack+0x107/0x167 [ 3222.631445] should_fail.cold+0x5/0xa [ 3222.632267] ? create_object.isra.0+0x3a/0xa20 [ 3222.633225] should_failslab+0x5/0x20 [ 3222.634030] kmem_cache_alloc+0x5b/0x360 [ 3222.634893] create_object.isra.0+0x3a/0xa20 [ 3222.635798] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3222.636841] __kmalloc+0x16e/0x3f0 [ 3222.637577] ? blk_mq_quiesce_queue+0x1d0/0x1d0 [ 3222.638531] ? blk_mq_has_request+0xc0/0xc0 [ 3222.639414] blk_stat_alloc_callback+0x85/0x290 [ 3222.640370] ? kasan_unpoison_shadow+0x33/0x50 [ 3222.641311] blk_mq_init_allocated_queue+0x94/0x13b0 [ 3222.642368] ? blk_queue_dma_alignment+0xc/0x50 [ 3222.643320] ? blk_set_default_limits+0x9/0x5d0 [ 3222.644270] ? blk_alloc_queue+0x4b7/0x670 [ 3222.645141] blk_mq_init_queue+0x81/0xd0 [ 3222.645977] loop_add+0x2cf/0x8b0 [ 3222.646709] loop_control_ioctl+0x170/0x480 [ 3222.647591] ? loop_lookup+0x1d0/0x1d0 [ 3222.648398] ? selinux_file_ioctl+0xb1/0x260 [ 3222.649303] ? loop_lookup+0x1d0/0x1d0 [ 3222.650105] __x64_sys_ioctl+0x19a/0x210 [ 3222.650950] do_syscall_64+0x33/0x40 [ 3222.651713] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3222.652762] RIP: 0033:0x7f3b305e3b19 [ 3222.653527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3222.657310] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3222.658563] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3222.658875] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3222.658893] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3222.663452] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3222.664911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3222.666385] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3222.675440] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3222.768327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3222.787158] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3222.829424] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3222.846637] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:54:11 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 61) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3222.867760] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:54:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x3, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) write$selinux_attr(r3, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0xae, @mcast1, 0x9}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = dup2(r0, r1) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r7], 0x38}}], 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001a80)=[{{&(0x7f0000000140)={0xa, 0x4e23, 0x5, @empty, 0x4}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f0000000200)=[@dstopts_2292={{0x88, 0x29, 0x4, {0x88, 0xd, '\x00', [@enc_lim={0x4, 0x1, 0xb7}, @ra={0x5, 0x2, 0x3}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x48, {0x1, 0x10, 0xb6, 0x5, [0x8, 0x6, 0x0, 0x1ff, 0x9, 0x8001, 0x9, 0x3fe1]}}, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0x40}, @jumbo={0xc2, 0x4, 0x401}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8001}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7557}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x0, 0xa, 0x2, 0x0, 0x0, [@private0, @private1, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1]}}}], 0x120}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x6, @empty, 0x9}, 0x1c, &(0x7f0000000780)=[{&(0x7f00000003c0)="cc6c2f9a7355eecca9f5b5789e58f76ef6b2d303e87344eb0416ecd0d8dfe497934a19068c878066485cbe424858f42eb34951c37c2861e9c10c5eaf61f972c235c15062cbfc2ca1bee677d912f26d369e84adb4d314b424557484175627231a27143828aa3c73ad7fec376ababf", 0x6e}, {&(0x7f0000000440)="f8", 0x1}, {&(0x7f0000000580)="79ca2c3b01640798dadaed7225bce697434f0a4a9ec886a13bc7e3280908e4d889175bf96a51a115494fe54fe4804881977530384ccb568ad168af6100dc63126e4f6d1204e5b3e052fa5901d7e5a7d05ed709f4c96f85c7baeb6699c8a1bdb4c7475a69092cef2b168d03b29fe5d9a9f55105309a4c689ff4b8d1bc39116c5882a61a16fdec17cf29d3a2fd7e8113e80ad9a9da0b72207e6ecc6fe92825aca4a0b07c7361107c5cdc0734b8689e79040b857744ced6d3a1898f3517ffabec42bd2f057ac005e1d6e14c", 0xca}, {&(0x7f0000000480)="4a0886de8e6a5fb8da0fa6bdecf84a2453592928d70e454877a77800f8cf327873e5c98ed7ec557897096625906be589fe6b59f40854e6a015cca0878fc3a811a0dacccf9c5d0b375feb1981481f34ca57b36214bf5ffa3afd50994b52ab5918bfa063e073d6600b54e1a42b45b7dde1199b374f2fdaa532cae051efa8d6998eac691eeb63ea3e4065ea582d338da875dea1febcb802430a33616ba02f7bb18f9b5c", 0xa2}, {&(0x7f0000000700)="0efe2c78399fe2b8327246912415fa4701ad136ef73c64a4bd5c878c79e38c5787e053079406e880d3d2bdb63363b9db789a295f9bda20b84977b6b6ee7695d0ac6104de0b9ec6327e869a9ad0dfaa", 0x4f}], 0x5, &(0x7f0000000800)=[@flowinfo={{0x14, 0x29, 0xb, 0x80000001}}, @hoplimit={{0x14, 0x29, 0x34, 0x7f}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @rthdr={{0x58, 0x29, 0x39, {0x1d, 0x8, 0x2, 0x3, 0x0, [@private0, @ipv4={'\x00', '\xff\xff', @broadcast}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x13}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x84, 0x6, 0x2, 0x4, 0x0, [@private1, @remote, @mcast1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x17}, r7}}}], 0x160}}, {{&(0x7f0000000680)={0xa, 0x4e22, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c, &(0x7f0000000d80)=[{&(0x7f0000000980)="e1ca03b1214be677abb79432f1c3316ca30719f3d474d534bd9b0b1d2258f9b1be2c6496346fa493b8428921403a52222c987b0741f0e192b7aaa36020df632569d36e12dde4ea3c68f9a2b49cac0e54d957332f33b6977664799397cf094762b4848a40a224aefeaecc0be211ef6d8b074d4477c56e0b7ad2766c3285018e2d172bbac648fe9dedbfa674b2a90dc0501bf90a81d3bf1e2d6ee17dde4c4bee23cbdf923e50c150d6f38ed341", 0xac}, {&(0x7f0000000a40)="8eeb21d58d08ca685cf259d591f284e7056598f6f80729c5ad7046bc4ae7314f7c76cf0a5fce89b868bbffe66eeb0ccb1fa31455010912b25fd34f83851283c9fe66bb49aa4a42a90948e0e6b17b92f76d2e744375931bdf622e6586547a2ae3026d98c5b3f0c20754a6fcfd319b238c9935bcfcaa9b1370b12e99522c83ad6f318ca7557fdca8e489c8aaa3af28f74476697c0a97ea5976deadffb072a43e9b8b686a0b7f6812367fed8b5cfba51f2f2b2b85ef3ebc1bbf7c4aa46ff6566af7523d826baa4b43a647410b85d09a65b6015b963ef55da47bbf93bd9d43da6684e5704252f486bea9ab", 0xe9}, {&(0x7f0000000b40)="2a2dbae3a27d2f61a5654088687267d625774e1e652220192599", 0x1a}, {&(0x7f0000000b80)="d4019593d5dff804b7eea9adea18742668f3cc6801a9f91b38dceb7fe627fcf11b870f2cfeb19212a315af532ec284175ecce5d050774403bae34796c01a3f87e23488986a7e15b7cc1adf6df5e8e93ff8e73ea9a19129c45693d45a8984cc88a746e44306dbadf3fca2dea468d5349f61e5f93760713cc6c920ed1ed8c8f81bd196bed4669bee73c861412b8e68deaccc10f4f0536ec87c49c1cbd9630ff170be00a45fe644ea7d556c1b2ccb4f8ae13681bd4dbfd68bd2324478c4b292507d1855c2924f4f1cb57fa218a019f0d65f89ca2cc50bec87e39ad79d80e53f37326a361ebe223e8cedb8df5430d8", 0xed}, {&(0x7f0000000c80)="a445aab6d73c0fbdfab05f955bfcb7ede2", 0x11}, {&(0x7f0000000cc0)="2ebeb0d3e9ac60bb49485328bae0e3a782426b0052fc656e1bf692469cd42652698fd71047f2a2337e8414bc97903ab83abe01ae0cae9783134ceff2f8dcab321c3e9b0fe24c21975811f03215b675724f540d00d9a2a7e7375d45db98cd78302d89968f5d4c8cdc844e313cce6490cb75555824c30702ac2d213ef09f4754e5442b90e0da1e21f7308a28cc6b551cd0573099552f120b8b6e3872268db2c26f824adbf6f0", 0xa5}], 0x6, &(0x7f0000000e00)=[@hoplimit={{0x14, 0x29, 0x34, 0x54}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}], 0x30}}, {{&(0x7f0000000e40)={0xa, 0x4e20, 0x5, @local, 0x3b0}, 0x1c, &(0x7f0000000fc0)=[{&(0x7f0000000e80)="824540bf80a85cd521f448fe799f092d7a55bd4f63f15fa56f88da5c1de4321aa8c3fcbec9f558c35ebc430fefe79c014150d506673b42e9ef1cb11b79019152fc55102511ee555557acfef08f94343fb17e0c3944c79691f1c21396b62503391701b8ed7548529ae629f1", 0x6b}, {&(0x7f0000000f00)="b2b2bb68721d617fdd6e53fdc49bb5625ace0122803ba3bd2ffb71bbecd2fec533ab4a4b524858c5ee824f9200ac83adcf65367ada26a5cf6b48cc7303813f4dc4dd918f7d0768fb3a735a316eb1389dbc8518a45d882e4ac322b5e2116f120a00f3ed874f6ce8656f0e7f017457776a0ecb5b6401ac0f328ac5e7c0e4c1ca1966ba885bfa38be43faf4bf88e123720516d76a13caad1239e17c4cc7ddd03e1415d53fe8e02e3249099e00b05d26aa45b0fd1dcec485cc", 0xb7}], 0x2}}, {{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000001000)="ccdbe4d67a8f07e73b1e6173f02a0bcef026695a4f012761d9997fbbaea1ae0199925754e44ba52cdb90906df5709cd54f195f6105bc6b941cde9e3311d6024ac9215c22f73a3f45db2e27a6cabf9aec39d4fd5c6892a482db5b303d03affa7b889768587430e0310e8d6990b7bb0340fab9a61752cd8dbd48abc153f16b8992f22081f5b7a00ab137ecc10e7c4af8183dd7defe95cb4e7fb575a9d1f66e7d5ea4317a67b834e2f8981197e4b90df302a228c176653cdb5d6cc10717f6b75eb932103887fc88ee983c6c7e", 0xcb}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000001100)="31c1989c843d1ee4f90da7b20e85494b102a0bcde624c975c534a3bd42b0f02b2503a0b6d0c3731c86e3941c4b74593136dd483e00023d8cfd9084b7bdf5dc4a7e69cd615a0f743e7ae0dd60517ddc3421d7fd17149796df5c8b4be58603f45fb10c5eb57cd4df40ca3e7168a4c643ceb3035330ebfc857681c51edb76b682b31094f30cb7ebb06998d7074cdceef3546c1ada9b7e7e0ffd02b1814d3513b86c51d9f1a2451e7270f290d7", 0xab}], 0x3, &(0x7f0000002e00)=[@flowinfo={{0x14, 0x29, 0xb, 0x8000}}, @hopopts={{0x1020, 0x29, 0x36, {0x32, 0x200, '\x00', [@pad1, @generic={0xce, 0x1000, "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"}]}}}], 0x1038}}, {{&(0x7f0000001200)={0xa, 0x4e20, 0x3, @loopback, 0x38af2005}, 0x1c, &(0x7f00000012c0)=[{&(0x7f0000001240)="d116385c78a95f7eacb1c26e423e6bd4201bd93bbdb319b14b14445d35a67e89fbd8317351e050e94c641e6193b4bc13859597d2195925d2adf7e4387b8cc49c8a80012c3b6c0c7d623321467d94d0b31797b5d2e844afd6c6ac34c91148cf0046504c2b36f4ef1348584cbef51a8f5dd953577c8a4a", 0x76}], 0x1, &(0x7f0000001300)=[@hopopts_2292={{0x40, 0x29, 0x36, {0x2f, 0x5, '\x00', [@calipso={0x7, 0x20, {0x0, 0x6, 0x0, 0x7, [0x0, 0x7f, 0x8]}}, @pad1, @pad1]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x2c, 0x0, '\x00', [@pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @dstopts={{0x48, 0x29, 0x37, {0x33, 0x5, '\x00', [@jumbo={0xc2, 0x4, 0x7}, @pad1, @calipso={0x7, 0x20, {0x1, 0x6, 0x4, 0x8, [0x0, 0x20, 0x7]}}, @ra={0x5, 0x2, 0xfffa}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1ff}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @hoplimit={{0x14, 0x29, 0x34, 0x3}}], 0x108}}, {{&(0x7f0000001440)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00', 0x88}, 0x1c, &(0x7f0000001580)=[{&(0x7f0000001480)="bf474311370615b0bf39228f509a23b88b7cc1b194a9220e81e7ada7ea0678e7cc497ac7e48c5a6c47179f7c9fc406f23df712b71f754b2c7e23f4fe92d8c7cf8e9d831a90f491176a7eb376534132f34f13e1f40986d4d8a48a70362465789b348f41fdd09d9b6a0403fee231b2c142ff0515ec3ca93d917b57a95ee4038e55898cfbf388b7524f2ef4f123558e7343b5198e9b54c8fb215d624c8a7d8144549beee0a0c3113554bbf7d546038aa18ed7161812422c702166de32e202d6510242ad9ddd84d739ee", 0xc8}], 0x1, &(0x7f00000015c0)=[@rthdr_2292={{0x18, 0x29, 0x39, {0x3b, 0x0, 0x1, 0x4}}}, @dstopts={{0x20, 0x29, 0x37, {0x2e, 0x0, '\x00', [@enc_lim]}}}, @tclass={{0x14, 0x29, 0x43, 0x80}}], 0x50}}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001640)="046b023802c37181bb335e547046f51497663ee3f5c0754ca87a4512894b465f8a7749b4e9d65a8adc484709271882b10c14a73f8ddc2b52cda4bdcc23b464e8edfaa3e56d845491d2394e974edfc40f460a26107de3f9eca62cee8f14dd31230503a0358d7eb615255f109658a4218139aad5d1da0dcaf8a9ce0ebce553e82e95d123d6b3c12872d2400fabd57c7c0bdce8c7d11651977d09b87f8a9b016f8589afb9c04ae942b3ec7ecd0aa112225129b50e65e3bee0e7135e608ab0e6e98f5cd75f84f1a575ec9684edacb0238f4bccea4d6db0905793dfa96e4aeabde1e7514cf002c6fb548d0224d7a7b7f7ba05d16f18983592a6", 0xf7}, {&(0x7f0000003e40)="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", 0x1000}, {&(0x7f0000001740)="e211db8c190e95a7fa135d1a971faad4dca7b01c69024d35b8f1bfe5f05b64661e8f67b4a7e5817165be9205ff35661d2bcc8b21d464942a69c109a170099be36a4a7ee891a0d3a85b210326ea722f37d31ff6e5c9c925c9e3455cf6271cb5be432d597e757b1a56652e8e0b57a69c262969c962befaa2d0bb075b6063361680794f3c8ead4b328a5d57cb1ddcdf291d29d3f5", 0x93}, {&(0x7f0000001800)="11e45144293899573f752a4e382069ec7b0fec4a06c60fa4a0166583acef37d0553ec718f480c71bd9844ad8111fe90159ef45c20629c2d6fb6439b4ec8d4e8d65e18db118edbddee63992994abfff9abddfe4cadee3312f669d53dfe02210783f7527b1374e24ea475117cbef79d2103737176004bf0329560c0783526123b40c0b1d6536eab67d8398a8fd3dc16e807fa4e83a468a77729f726c85ca9351b9e9592b92151753315ff1fda6e21e6ed5e75e50728def601829d00bc5a4fdcbc9ce47976a9c00aad4a1", 0xc9}, {&(0x7f0000001900)="a9ec53a8e6e19c8c8fb50d618361dd4fe94ea58ae1685bf1adb8b0eaa9a7cf59cc09112b52ab3907ce6f967dc2fdb82068497466d9f01014a706839bfbbd1d892276df5d28360432e167931b075feb07bd0607b30150a676f7fdd766a53f9bab9bfd6a8279c1bb35f44fdd27ddd44d57185120bdbc1a6fc8cb6461fb6e449b2d03d4b8dd7d6326672ef9ad00ff8095147cf1a2fa53f1a3df072ffbe651a0f44387742d64e763a79091fc3f89d3cc79c2301a447b7ff9f042641b0aa7b5c0ad41612bf1842341491e96f1f04261b8cf0e6932a5bdc36acf9acbe6072481466b812b9a", 0xe2}], 0x5}}], 0x8, 0x4000000) [ 3222.927359] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:54:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, 0x0, 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3222.988276] FAULT_INJECTION: forcing a failure. [ 3222.988276] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.990808] CPU: 0 PID: 17784 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3222.992222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3222.993930] Call Trace: [ 3222.994501] dump_stack+0x107/0x167 [ 3222.995253] should_fail.cold+0x5/0xa [ 3222.996024] ? create_object.isra.0+0x3a/0xa20 [ 3222.996966] should_failslab+0x5/0x20 [ 3222.997735] kmem_cache_alloc+0x5b/0x360 [ 3222.998578] create_object.isra.0+0x3a/0xa20 [ 3222.999482] kmemleak_alloc_percpu+0xa0/0x100 [ 3223.000397] pcpu_alloc+0x4e2/0x12f0 [ 3223.001190] ? blk_mq_quiesce_queue+0x1d0/0x1d0 [ 3223.002130] ? blk_mq_has_request+0xc0/0xc0 [ 3223.003010] blk_stat_alloc_callback+0xc0/0x290 [ 3223.003952] ? kasan_unpoison_shadow+0x33/0x50 [ 3223.004880] blk_mq_init_allocated_queue+0x94/0x13b0 [ 3223.005914] ? blk_queue_dma_alignment+0xc/0x50 [ 3223.006871] ? blk_set_default_limits+0x9/0x5d0 [ 3223.007809] ? blk_alloc_queue+0x4b7/0x670 [ 3223.008669] blk_mq_init_queue+0x81/0xd0 [ 3223.009494] loop_add+0x2cf/0x8b0 [ 3223.010212] loop_control_ioctl+0x170/0x480 [ 3223.011084] ? loop_lookup+0x1d0/0x1d0 [ 3223.011879] ? selinux_file_ioctl+0xb1/0x260 [ 3223.012770] ? loop_lookup+0x1d0/0x1d0 [ 3223.013562] __x64_sys_ioctl+0x19a/0x210 [ 3223.014392] do_syscall_64+0x33/0x40 [ 3223.015146] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3223.016182] RIP: 0033:0x7f3b305e3b19 [ 3223.016935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3223.020671] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3223.022225] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3223.023670] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3223.025115] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3223.026576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3223.028024] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:54:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x400000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000180)=0x8f, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x4a0800, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="50001180", @ANYRES16=0x0, @ANYBLOB="00042dbd7000fddbdf2514000000080001007063690011000200303030303a30303a31302e3000000000080003000300000008000b00ec19ffff06001100020000000800150000040000"], 0x50}, 0x1, 0x0, 0x0, 0xc080}, 0x48050) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0xfff, 0x6, 0x3, 0x8000, 0x9]}, &(0x7f0000000040)=0x54) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:54:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3223.187154] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3223.251421] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3223.255587] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3223.295614] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3224.652638] Bluetooth: hci0: command 0x0401 tx timeout [ 3226.700595] Bluetooth: hci0: command 0x0401 tx timeout [ 3237.284213] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:54:34 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 62) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:54:34 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x500000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2000000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3245.774164] FAULT_INJECTION: forcing a failure. [ 3245.774164] name failslab, interval 1, probability 0, space 0, times 0 [ 3245.776805] CPU: 1 PID: 17829 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3245.778209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3245.779119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 3245.779898] Call Trace: [ 3245.779924] dump_stack+0x107/0x167 [ 3245.779947] should_fail.cold+0x5/0xa [ 3245.779969] ? create_object.isra.0+0x3a/0xa20 [ 3245.779990] should_failslab+0x5/0x20 [ 3245.780019] kmem_cache_alloc+0x5b/0x360 [ 3245.786340] ? mark_held_locks+0x9e/0xe0 [ 3245.787216] create_object.isra.0+0x3a/0xa20 [ 3245.788131] kmemleak_alloc_percpu+0xa0/0x100 [ 3245.789056] pcpu_alloc+0x4e2/0x12f0 [ 3245.789846] ? blk_mq_quiesce_queue+0x1d0/0x1d0 [ 3245.790816] ? blk_mq_has_request+0xc0/0xc0 [ 3245.791693] blk_stat_alloc_callback+0xc0/0x290 [ 3245.792651] ? kasan_unpoison_shadow+0x33/0x50 [ 3245.793590] blk_mq_init_allocated_queue+0x94/0x13b0 [ 3245.794652] ? blk_queue_dma_alignment+0xc/0x50 [ 3245.795604] ? blk_set_default_limits+0x9/0x5d0 [ 3245.796550] ? blk_alloc_queue+0x4b7/0x670 [ 3245.797422] blk_mq_init_queue+0x81/0xd0 [ 3245.798252] loop_add+0x2cf/0x8b0 [ 3245.798973] loop_control_ioctl+0x170/0x480 [ 3245.799853] ? loop_lookup+0x1d0/0x1d0 [ 3245.800652] ? selinux_file_ioctl+0xb1/0x260 [ 3245.801549] ? loop_lookup+0x1d0/0x1d0 [ 3245.802342] __x64_sys_ioctl+0x19a/0x210 [ 3245.803184] do_syscall_64+0x33/0x40 [ 3245.803942] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3245.804997] RIP: 0033:0x7f3b305e3b19 [ 3245.805770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3245.809140] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3245.809572] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3245.809593] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3245.809604] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3245.809614] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3245.809639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3245.818218] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:54:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) write$selinux_attr(r2, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000057000000080003007bf428a5864aa183daf002ee52f3d4e566442e3f17fbcac3245a5a5a1c2316394c457527842b55733c888a71a226e34803c8593202b50b7434c160def2991e58e1041f3d66bff141d6e7cf40e2d038e6390b5f61acaf1c810bdc3cfbd27381c61b5530a242972fcfb9a43b33aa6f4fd4462243fcfe8d8a2539594bb250de0d7356a7d901513b2cddaffa8e34fdb344daec1dd627b1ce596df43714139862632d947b45cc8afb5b9b4ce66e2acc73dc7dc8b9e2bfb4d06249c4cbd5c705987214d74980b9b5c858ce4ad47a7660cf12c468d1ed502b19a0cd26c5e1", @ANYRES32=r6, @ANYBLOB="0600950000000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x264c}, 0x1, 0x0, 0x0, 0x4800}, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x13) sendmsg$inet6(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r9 = dup2(r0, r7) accept4$inet6(r9, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:54:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x1ff, @mcast2, 0x401}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0xffffffffffffffff, 0x2) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r5, 0x8008f511, &(0x7f0000000040)) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r6, &(0x7f0000002040), 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000000580)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x2, @local}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000140)="054add4d07057c5679e9775604a62efa320958a2026cf2ec34d3c3b88ea69fae14e5661afe56b08701c39326e6c3980a16366a07aab79a76932abc6389", 0x3d}], 0x1, &(0x7f0000000700)=[@rthdr={{0x88, 0x29, 0x39, {0x3c, 0xe, 0x2, 0x62, 0x0, [@mcast2, @loopback, @local, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @local}]}}}, @rthdrdstopts={{0x138, 0x29, 0x37, {0xc, 0x23, '\x00', [@generic={0x1f, 0xdf, "6eb0b633a67e7e79db9862bf9d9e41be435ee46febef80f5ec5a75bcdc02d7d7b8da8d875ccd216049a71c786e878d37ba8c18225bb954cf571008cf0b7063205440873cdd79e3670db618acc1d1a1f961d7a35ca75c1139b9b54a2c19cf7c41bed4b80c6622beeee502f5f05f39f9955ab5adc383cf7e135cbd60e3629b2957d91560a400ed0d73f650b6535598103637f3f53db8aa354d7e1717aa080696d59d4b00430a005204aee35344aa41333481e99a24e1343a1097f18baf9af06471c5b91f098a27a831a99bfb9e07c751b7abb05350d8db4841228fb7a317dcc5"}, @ra={0x5, 0x2, 0x45bf}, @calipso={0x7, 0x18, {0x2, 0x4, 0x42, 0x8c, [0x7, 0x31f4]}}, @ra={0x5, 0x2, 0x6}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0xb}}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x5c, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0xeb}]}}}], 0x1e0}}, {{&(0x7f0000000200)={0xa, 0x4e23, 0x4d, @remote, 0x8a6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000240)="aba5caf826de3db4e88f6c6090ea2e54b115e01e31574b6c065344a8dc72b5b5bf741e565d3f2d46346de70679cb24335728cadd5b9cc4a018905f464e17b81753a6f907aed72e4c2ffec6ff0dc3dea1165bd0481c9d5a8f68964048029d12c51e9771d57a16a2abcaca7a4b4696185a4325a7b83e179cb91d599fc3ae7b795f93d828621221811b2e5faa389ed305f27cd88d66d057d4f452e6d1de85ed589bb5294f469fe6318d8f33ca82342002ee2fa360a26725cc534a7530e04903814d13d51b6cbeac4c55b96d6fce6a863f60fc4427733d4f39e17bb9e608a019d26abc980e6871fa6c909fdf", 0xea}, {&(0x7f0000000380)="a4fba79dbad588c39cb8b6aeef99781f4557dc71df9f721b9b3f42e1d3521607eb95eccd04f12c29b3b2794dc8fd1c", 0x2f}], 0x2, &(0x7f0000000900)=ANY=[@ANYBLOB="140000000001000000000000000b280169a01400000007000000290000003400000008000000000000001400000000000000290000003400000001000000000000009400000000000000290000000b000000000000020000000024000000000000002900000032000000ff010000000000000000000000000001", @ANYRES32=r8, @ANYBLOB="00000000140000000000000029000000080000000800000000000000380000000000000029000000360000005c04000000000000040122c910ff0100000000000000000000000000010502000305020008000100"], 0xd8}}], 0x2, 0x80) sendmsg$inet6(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) dup2(r0, r3) [ 3245.877975] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:54:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r5], 0x38}}], 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="67726574617030000000000095e20000", @ANYRES32=0x0, @ANYBLOB="008000010000000500000043483a00a0006500001f0090787f000001e0000001443c2923ac1414aa00000003ac1e010100000006ffffffff00000081ac1414aa0000dfc4ffffffff000000097f00000100010000ac1e0001000001014424e92164010100000000026401010000000001ffffffff000004006401010000000008861100000003000932de3257950bfd0502441477a3ac1e000100000004e00000010002b4dc01010001000000"]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r7, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r9], 0x38}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c010000", @ANYRES16=0x0, @ANYBLOB="00082cbd7000fddbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="0400028008000100", @ANYRES32=r6, @ANYBLOB="7401028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000100000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040008000000400001002400010071756575655f69641fe18c8a0000000000000000000000000000000000000000050003000300000008000400ff02000008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e0000000800040066e9000008000600", @ANYRES32=r10, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f616463617374000000"], 0x19c}}, 0x80) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3245.978754] EXT4-fs (loop4): Unrecognized mount option "./file0" or missing value [ 3246.029791] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3246.035488] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:54:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3f00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 63) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:54:34 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x600000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3246.318659] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3246.330919] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3246.332840] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3246.345057] FAULT_INJECTION: forcing a failure. [ 3246.345057] name failslab, interval 1, probability 0, space 0, times 0 [ 3246.347573] CPU: 0 PID: 17889 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3246.348980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3246.350693] Call Trace: [ 3246.351238] dump_stack+0x107/0x167 [ 3246.351983] should_fail.cold+0x5/0xa [ 3246.352758] ? blk_mq_init_allocated_queue+0xfe/0x13b0 [ 3246.353821] should_failslab+0x5/0x20 [ 3246.354597] kmem_cache_alloc_trace+0x55/0x360 [ 3246.355526] ? blk_stat_alloc_callback+0x1c3/0x290 [ 3246.356532] blk_mq_init_allocated_queue+0xfe/0x13b0 [ 3246.357578] ? blk_queue_dma_alignment+0xc/0x50 [ 3246.358531] ? blk_set_default_limits+0x9/0x5d0 [ 3246.359482] ? blk_alloc_queue+0x4b7/0x670 [ 3246.360355] blk_mq_init_queue+0x81/0xd0 [ 3246.361191] loop_add+0x2cf/0x8b0 [ 3246.361897] loop_control_ioctl+0x170/0x480 [ 3246.362793] ? loop_lookup+0x1d0/0x1d0 [ 3246.363593] ? selinux_file_ioctl+0xb1/0x260 [ 3246.364480] ? loop_lookup+0x1d0/0x1d0 [ 3246.365274] __x64_sys_ioctl+0x19a/0x210 [ 3246.366104] do_syscall_64+0x33/0x40 [ 3246.366869] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3246.367912] RIP: 0033:0x7f3b305e3b19 [ 3246.368671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3246.372398] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3246.373928] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3246.375374] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3246.376805] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3246.378238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3246.379676] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:54:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x12c, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_SYNPROXY={0xc, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8}]}, @CTA_LABELS_MASK={0x24, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @CTA_SEQ_ADJ_REPLY={0xc, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}]}, @CTA_TUPLE_ORIG={0x28, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_TUPLE_ORIG={0x78, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_LABELS={0x1c, 0x16, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x0, 0x0]}, @CTA_NAT_SRC={0x10, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}]}]}]}, 0x12c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="b400000032000100000000f2ff0000000b0000000a0000003a2329252d000000930001"], 0xb4}}, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RCREATE(r4, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x6}, 0x5}}, 0x18) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0xf7fffffc}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = dup2(r0, r2) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3246.445314] netlink: 135 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3246.447439] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3246.470967] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:54:34 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:54:34 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4000000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:34 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, 0x0, 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3246.559489] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3246.611072] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.7'. [ 3246.615332] FAULT_INJECTION: forcing a failure. [ 3246.615332] name failslab, interval 1, probability 0, space 0, times 0 [ 3246.618337] CPU: 0 PID: 17910 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3246.619853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3246.621631] Call Trace: [ 3246.622206] dump_stack+0x107/0x167 [ 3246.623006] should_fail.cold+0x5/0xa [ 3246.623830] ? create_object.isra.0+0x3a/0xa20 [ 3246.624821] should_failslab+0x5/0x20 [ 3246.625640] kmem_cache_alloc+0x5b/0x360 [ 3246.626540] create_object.isra.0+0x3a/0xa20 [ 3246.627484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3246.628584] kmem_cache_alloc_trace+0x151/0x360 [ 3246.629582] ? blk_stat_alloc_callback+0x1c3/0x290 [ 3246.630652] blk_mq_init_allocated_queue+0xfe/0x13b0 [ 3246.631749] ? blk_queue_dma_alignment+0xc/0x50 [ 3246.632748] ? blk_set_default_limits+0x9/0x5d0 [ 3246.633742] ? blk_alloc_queue+0x4b7/0x670 [ 3246.634669] blk_mq_init_queue+0x81/0xd0 [ 3246.635534] loop_add+0x2cf/0x8b0 [ 3246.636278] loop_control_ioctl+0x170/0x480 [ 3246.637190] ? loop_lookup+0x1d0/0x1d0 [ 3246.638026] ? selinux_file_ioctl+0xb1/0x260 [ 3246.638979] ? loop_lookup+0x1d0/0x1d0 [ 3246.639812] __x64_sys_ioctl+0x19a/0x210 [ 3246.640680] do_syscall_64+0x33/0x40 [ 3246.641472] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3246.642567] RIP: 0033:0x7f3b305e3b19 [ 3246.643360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3246.647256] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3246.648867] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3246.650371] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3246.651894] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3246.653388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3246.654881] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:54:35 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3246.729345] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3246.736647] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3246.755450] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3246.860454] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3261.558469] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:54:57 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 65) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:54:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000480)={0x16, 0x8, '\x00', [@hao={0xc9, 0x10, @private0}, @enc_lim={0x4, 0x1, 0xc1}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x1ff}, @enc_lim={0x4, 0x1, 0xfc}]}, 0x50) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000440), 0x4) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) getpeername$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000001700)={0x18c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r6}, {0x170, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x240400d3}, 0x20000800) ftruncate(r5, 0x8001) recvmmsg(r4, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000040)=""/9, 0x9}], 0x2, &(0x7f0000000140)=""/76, 0x4c}, 0x98}], 0x1, 0x102, &(0x7f0000000240)={0x77359400}) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:54:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4800000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:57 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:57 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, 0x0, 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x700000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000180)=0x1080, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) getsockname(r4, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000040)=0x80) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3269.341922] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3269.346029] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3269.361817] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3269.375056] FAULT_INJECTION: forcing a failure. [ 3269.375056] name failslab, interval 1, probability 0, space 0, times 0 [ 3269.377553] CPU: 1 PID: 17954 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3269.378063] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3269.378965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3269.378972] Call Trace: [ 3269.378997] dump_stack+0x107/0x167 [ 3269.379019] should_fail.cold+0x5/0xa [ 3269.379048] ? create_object.isra.0+0x3a/0xa20 [ 3269.385161] should_failslab+0x5/0x20 [ 3269.385938] kmem_cache_alloc+0x5b/0x360 [ 3269.386798] create_object.isra.0+0x3a/0xa20 [ 3269.387715] kmemleak_alloc_percpu+0xa0/0x100 [ 3269.388638] pcpu_alloc+0x4e2/0x12f0 [ 3269.389407] blk_mq_init_allocated_queue+0x122/0x13b0 [ 3269.390467] ? blk_queue_dma_alignment+0xc/0x50 [ 3269.391422] ? blk_set_default_limits+0x9/0x5d0 [ 3269.392370] ? blk_alloc_queue+0x4b7/0x670 [ 3269.393237] blk_mq_init_queue+0x81/0xd0 [ 3269.394072] loop_add+0x2cf/0x8b0 [ 3269.394807] loop_control_ioctl+0x170/0x480 [ 3269.395693] ? loop_lookup+0x1d0/0x1d0 [ 3269.396489] ? selinux_file_ioctl+0xb1/0x260 [ 3269.397370] ? loop_lookup+0x1d0/0x1d0 [ 3269.398168] __x64_sys_ioctl+0x19a/0x210 [ 3269.399018] do_syscall_64+0x33/0x40 [ 3269.399783] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3269.400899] RIP: 0033:0x7f3b305e3b19 [ 3269.401835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3269.406397] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3269.408130] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3269.409579] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3269.411037] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3269.412493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3269.413926] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3269.442490] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3269.521159] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:54:57 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340), 0x0, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3269.634179] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:54:58 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, 0x0, 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:58 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 66) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:54:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4c00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x800000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3269.754095] FAULT_INJECTION: forcing a failure. [ 3269.754095] name failslab, interval 1, probability 0, space 0, times 0 [ 3269.756772] CPU: 0 PID: 17985 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3269.758169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3269.759868] Call Trace: [ 3269.760406] dump_stack+0x107/0x167 [ 3269.761145] should_fail.cold+0x5/0xa [ 3269.761918] ? create_object.isra.0+0x3a/0xa20 [ 3269.762848] should_failslab+0x5/0x20 [ 3269.763619] kmem_cache_alloc+0x5b/0x360 [ 3269.764444] ? mark_held_locks+0x9e/0xe0 [ 3269.765276] create_object.isra.0+0x3a/0xa20 [ 3269.766173] kmemleak_alloc_percpu+0xa0/0x100 [ 3269.767107] pcpu_alloc+0x4e2/0x12f0 [ 3269.767878] blk_mq_init_allocated_queue+0x122/0x13b0 [ 3269.768934] ? blk_queue_dma_alignment+0xc/0x50 [ 3269.769878] ? blk_set_default_limits+0x9/0x5d0 [ 3269.770825] ? blk_alloc_queue+0x4b7/0x670 [ 3269.771690] blk_mq_init_queue+0x81/0xd0 [ 3269.772518] loop_add+0x2cf/0x8b0 [ 3269.773233] loop_control_ioctl+0x170/0x480 [ 3269.774098] ? loop_lookup+0x1d0/0x1d0 [ 3269.774909] ? selinux_file_ioctl+0xb1/0x260 [ 3269.775790] ? loop_lookup+0x1d0/0x1d0 [ 3269.776577] __x64_sys_ioctl+0x19a/0x210 [ 3269.777391] do_syscall_64+0x33/0x40 [ 3269.778143] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3269.779186] RIP: 0033:0x7f3b305e3b19 [ 3269.779938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3269.783633] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3269.785158] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3269.786591] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3269.788049] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3269.789487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3269.790935] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:54:58 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:54:58 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3269.916999] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3269.925953] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:54:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3269.960933] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3269.980148] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3270.034985] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3270.103817] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3271.373637] Bluetooth: hci0: command 0x0401 tx timeout [ 3273.421633] Bluetooth: hci0: command 0x0401 tx timeout [ 3275.468749] Bluetooth: hci0: command 0x0401 tx timeout [ 3277.517574] Bluetooth: hci0: command 0x0401 tx timeout [ 3279.565652] Bluetooth: hci0: command 0x0401 tx timeout [ 3281.988995] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:55:18 executing program 7: ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)={{}, 0x7, 0x6, 0x8}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x2, 0x240) sendmmsg$inet6(r3, &(0x7f0000000300)=[{{&(0x7f0000000140)={0xa, 0x4e23, 0x14d804e4, @private1, 0x6}, 0x1c, &(0x7f0000000800)=[{&(0x7f0000000200)="8ee42d4134227d4a2a85d464a7218b247369ee4760395763249abccf1d035b4e42c335b05168ea77319eec541e6827bb9f07ef354947659fedb52a8f2b30494c61156316d413b2af75c0ba01ef6985949394aee612192ccee7d3523065aedc40d72cc41094d4643ccc8881fbc6d4d64252b28212f4e627369d", 0x79}, {&(0x7f0000000280)="5b91dd1219f2a7fc960c877ef4b8026ef3a4d770d22e88719ee0ac44ca4b2fa1019ddb3d97a83b6230515a247dce339c9923ad34d8e912f9cc56db5a43ee2946a5d4b39ef4dee345e7adf6dac91406acc9cbf562f70d0cef709caaaa674f23caac80ddef99b2aa909345cc2b", 0x6c}, {&(0x7f0000000380)="34cdfee15106c0090b005efa1b7d4f73abbc6d97a0eedc2a893574bf41841d7eef2d55d2148070cf562f2cc6d099dce2f09056a907b7905c2605ea350baae8fe926caf108665c9caca2424bdc93b7e47375b8d294cb637b4809244dd3b7aadeb12ad5706d373ff7048ba7b3b5c91e84c7198d316e9394814e75d4c5892e6990342963e9746541a0bb95fc9d99fc1cbaef54ca51635d9242521d9c135ce3cc8d83ada2d18cb1cedeb36f7e15fb67bf6582b4a7115696f945f244b", 0xba}, {&(0x7f0000000440)="eaa1cb7b9dd45813834609f77391b81f373e2748f4a7b0c2488b8255422e51df6eaac29b278d003fc0d361e929ac5c232478d2caf5f9bfa2863283d84594e865ea576b4bb2e792df0d7346a57e1cf8626a67b547d2958baf845464006bb59325dbf8f2f33917da06a8ad38d635909ebfc1fce84e8b6cf0940242bb6d2039bb1173dc908a", 0x84}, {&(0x7f0000000580)="4b4e206e8749f6f38ae6c4931dd2758714eb5241686780fe506941cbd34ae9480771b8ba1cca92342726a098862570d094b7a141a46b37c565e1664cf49223f78952288f7520b4", 0x47}, {&(0x7f0000000180)="a3682145f28cd90a8aca5c214a400a3ead20cc5e7460b53dc8596e683f6023836657046a237a7ae07f04c049", 0x2c}, {&(0x7f0000000700)="7636f74794d006a8fd1d7b723d77dc2f573cd1302a79152f4047569dcbd8ce85a7b93aee1dcae90274ca9e773c6965eed715161d2d05a01a3267cff7f5b02b50dc27e6c56fcc6a91d00ea421b8f1d8b3b11af86de98d242a8748d577f7d94075309e044f6b7fc96498974e31574710d614043f98c7edb6cee58bf31f842b6a67d4c8a9b11a81cfe7a10e312c09cae4236197a63d0a8834e1fdf8b101cd15225610a0f8601cb3c68ed4f55d42c7619c7c9fdded8841e28936e49b41f09189d4b944a590c5dcf785510586f770d032085e41c356dd4a", 0xd5}, {&(0x7f0000000600)="19af4f946056c05a652b35d5d05579f2a3d555ef80df137c8986e57c5a88c017edf249ecb3467adbd06f78055b71f6ed7a50c8be3b840622bec3a7901babb940f01205d9be9609c3c95a7e686fc1c069494b00b666a4778f5056ae87933400c32699ec78387237a1b7af4ff04b46d0bc081e9dc7d95567a747345330378436d9263033ef2f0075c3547d95954141a0a77091404908aff878b458e6f9f61b4212f01bec9060a8267e80d6a06726c82d", 0xaf}], 0x8, &(0x7f0000000880)=[@rthdr={{0x98, 0x29, 0x39, {0x6c, 0x10, 0x2, 0x2, 0x0, [@loopback, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, @mcast2, @private0, @ipv4={'\x00', '\xff\xff', @loopback}]}}}, @rthdrdstopts={{0x50, 0x29, 0x37, {0x32, 0x6, '\x00', [@calipso={0x7, 0x30, {0x3, 0xa, 0x0, 0x7fff, [0x2, 0x5, 0xe8, 0xfff, 0x3b1d5e3c]}}, @pad1]}}}, @dontfrag={{0x14}}, @hopopts_2292={{0x78, 0x29, 0x36, {0x1a, 0xb, '\x00', [@calipso={0x7, 0x58, {0x3, 0x14, 0x0, 0x5, [0x5, 0x20, 0x2, 0x10000, 0x7fffffff, 0xce, 0x7ff, 0xa9, 0x1, 0x3]}}]}}}, @hopopts_2292={{0xa0, 0x29, 0x36, {0x2, 0x10, '\x00', [@generic={0xff, 0x3c, "0ddee7716a2bdddd3f7ce8003d2d33f7a2a271660c30ccff26aebf0f5670e1efc72f0c21d734a031ef4603c3e01eb6dd8e9329fac697fd9497f4ce6c"}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}}, @hao={0xc9, 0x10, @mcast2}, @ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x218}}], 0x1, 0x20004000) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x10044081) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3290.458233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3290.467499] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3290.483313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:55:18 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:18 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 67) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:55:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x900000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6800000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3290.505217] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3290.510068] FAULT_INJECTION: forcing a failure. [ 3290.510068] name failslab, interval 1, probability 0, space 0, times 0 [ 3290.512333] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3290.512892] CPU: 1 PID: 18033 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3290.515029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3290.516745] Call Trace: [ 3290.517291] dump_stack+0x107/0x167 [ 3290.518048] should_fail.cold+0x5/0xa [ 3290.518835] ? blk_mq_realloc_hw_ctxs+0x109/0x14f0 [ 3290.519851] should_failslab+0x5/0x20 [ 3290.520639] __kmalloc_node+0x76/0x4b0 [ 3290.521448] blk_mq_realloc_hw_ctxs+0x109/0x14f0 [ 3290.522424] ? lockdep_init_map_type+0x2c7/0x780 [ 3290.523425] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3290.524485] ? blk_queue_dma_alignment+0xc/0x50 [ 3290.525437] ? blk_set_default_limits+0x9/0x5d0 [ 3290.526383] ? blk_alloc_queue+0x4b7/0x670 [ 3290.527281] blk_mq_init_queue+0x81/0xd0 [ 3290.528147] loop_add+0x2cf/0x8b0 [ 3290.528877] loop_control_ioctl+0x170/0x480 [ 3290.529766] ? loop_lookup+0x1d0/0x1d0 [ 3290.530570] ? selinux_file_ioctl+0xb1/0x260 [ 3290.531493] ? loop_lookup+0x1d0/0x1d0 [ 3290.532291] __x64_sys_ioctl+0x19a/0x210 [ 3290.533140] do_syscall_64+0x33/0x40 [ 3290.533905] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3290.534964] RIP: 0033:0x7f3b305e3b19 [ 3290.535740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3290.539508] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3290.541072] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3290.542532] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3290.544022] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3290.545505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3290.546990] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x461e, 0x4, @loopback, 0x1}, 0x1c) listen(r0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RCREATE(r1, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x6}, 0x5}}, 0x18) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, '\x00', 0x21}, 0x3f}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200, 0x15) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r2) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3290.636756] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3290.639252] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3290.642950] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3292.428626] Bluetooth: hci0: command 0x0406 tx timeout [ 3305.465693] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:55:42 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:42 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) dup2(r0, r1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x80800) 19:55:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:55:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1000000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:42 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3313.696082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3313.705508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:55:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6c00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:42 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:55:42 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 68) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3313.759739] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3313.769621] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3313.769871] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3313.772292] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3313.777350] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3313.780001] FAULT_INJECTION: forcing a failure. [ 3313.780001] name failslab, interval 1, probability 0, space 0, times 0 [ 3313.782754] CPU: 1 PID: 18083 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3313.784258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3313.786010] Call Trace: [ 3313.786569] dump_stack+0x107/0x167 [ 3313.787332] should_fail.cold+0x5/0xa [ 3313.788158] ? blk_mq_realloc_hw_ctxs+0x109/0x14f0 [ 3313.789186] should_failslab+0x5/0x20 [ 3313.789982] __kmalloc_node+0x76/0x4b0 [ 3313.790813] blk_mq_realloc_hw_ctxs+0x109/0x14f0 [ 3313.791814] ? lockdep_init_map_type+0x2c7/0x780 [ 3313.792808] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3313.793861] ? blk_queue_dma_alignment+0xc/0x50 [ 3313.794809] ? blk_set_default_limits+0x9/0x5d0 [ 3313.795776] ? blk_alloc_queue+0x4b7/0x670 [ 3313.796655] blk_mq_init_queue+0x81/0xd0 [ 3313.797479] loop_add+0x2cf/0x8b0 [ 3313.798200] loop_control_ioctl+0x170/0x480 [ 3313.799074] ? loop_lookup+0x1d0/0x1d0 [ 3313.799883] ? selinux_file_ioctl+0xb1/0x260 [ 3313.800771] ? loop_lookup+0x1d0/0x1d0 [ 3313.801576] __x64_sys_ioctl+0x19a/0x210 [ 3313.802409] do_syscall_64+0x33/0x40 [ 3313.803178] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3313.804225] RIP: 0033:0x7f3b305e3b19 [ 3313.804996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3313.808769] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3313.809667] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3313.810335] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3313.810347] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3313.810358] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3313.810370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3313.810393] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3314.025869] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3314.582590] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3326.354070] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 3333.611222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3333.620049] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:56:01 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 69) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/235, 0xeb, 0x0, &(0x7f0000000100)=""/114, 0x72}, &(0x7f0000000300)=0x40) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:56:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7400000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2000000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x5, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = signalfd4(r0, &(0x7f0000000040), 0x8, 0x800) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast1, 0x1}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f00000003c0)={0xffff, 0x0, "2034ff"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000500)={'icmp6\x00'}, &(0x7f0000000680)=0x1e) fcntl$notify(r4, 0x402, 0x10) r5 = dup2(r0, r1) r6 = accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r6, &(0x7f0000000380)={&(0x7f0000000140)={0xa, 0x4e23, 0x2, @private0}, 0x1c, &(0x7f0000000880)=[{&(0x7f0000000200)="cdff683bc254684db76e863a908156f220a1b19894c966195d1314edfb6d94a0a2cd327982935a0ec3fca0e87b1b33276693491590482deaf8510b829974773a3582c63725267f48ec39440a494f483f3a725a53c9de9d81019a092a35f179daa50746cf4bb3e0a90543e4ac04", 0x6d}, {&(0x7f0000000280)="1f288095b7f4e987a3faba43fda63f624146efca8676bdbbcd8d81f658a6b2c408ee8431024c9def194e9cb1341ea740ccbadcb8203fb6e25d6e7c26a4659fce250e107d7493b3f8fb48bb239678861be89b165223e5596faf229d70b29ed9594bc0d0f5cb5d94e333217a8dea4dfdfbf2614a9aae844e0a5605e61206c92f9242b8bc4e936529c4c74c3246dc9c4841b8a3f8cd6af7", 0x96}, {&(0x7f0000000400)="b1a2e15e35525ca9e4dc20e4a3ac9ef10cc7ad5b44ec9788fe060d7f0e0a99426f3e80d53c6770b9d36e2eb23fd836bf2f981d8a101095d3a4006b4fec3d6a7f2059eecb072fbb9b6fb062c65d5731fe62b3", 0x52}, {&(0x7f0000000580)="7edd9d0db9e32efb033f52ada9e8eb2bc2606ad10eaa9c9ca0311582b8a0ccbf1bb5b0db650a3dc63eb88c8a263ba2be7c46e183da6be8bb4d211f96d2979369174555a61ed637ee4d11d30b3f721960e088211a013e700e6e4c51183521fe5d20ff4d51e3c63405b5fee1d2ae9bcf0cfd439e59da93dbf7cae3c11272379b566468e8428ed0260ad61fdc4e788968853e96c358df2c67c14218f80e7aa9ac667267f8275bfb614175daa0a883e3d217472524a55ca3af5bd215534a4afa13ce3fb5", 0xc2}, {&(0x7f0000000700)="607b9392e02cfeb751d3026a1d2fdfb1f0df88d163c278dd474b070e5df780fc85a0f03000"/49, 0x31}], 0x5, &(0x7f0000000900)=ANY=[], 0x70}, 0x200068c0) ioctl$EVIOCGBITKEY(r5, 0x80404521, &(0x7f0000000180)=""/4) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x4e20, @rand_addr=0x9}}, 0x0, 0x0, 0x20, 0x0, "0dbfaf19f9b1c9a7ba009167033a5b63a11ce7dba852b8affae8b4d5704fabdd357463923a868f68ea4cf251b7748f36c53a30c8f43f28cee69aba1d8c58f89c15ac410e6e3e898e24610999b3987143"}, 0xd8) 19:56:01 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:01 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:01 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3333.653171] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 3333.656802] EXT4-fs (loop6): get root inode failed [ 3333.657902] EXT4-fs (loop6): mount failed [ 3333.672963] FAULT_INJECTION: forcing a failure. [ 3333.672963] name failslab, interval 1, probability 0, space 0, times 0 [ 3333.675803] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3333.676671] CPU: 0 PID: 18129 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3333.678950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3333.680643] Call Trace: [ 3333.681188] dump_stack+0x107/0x167 [ 3333.681939] should_fail.cold+0x5/0xa [ 3333.682720] ? blk_mq_realloc_hw_ctxs+0x8e6/0x14f0 [ 3333.683758] should_failslab+0x5/0x20 [ 3333.684533] __kmalloc_node+0x76/0x4b0 [ 3333.685336] blk_mq_realloc_hw_ctxs+0x8e6/0x14f0 [ 3333.686336] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3333.687401] ? blk_queue_dma_alignment+0xc/0x50 [ 3333.688363] ? blk_set_default_limits+0x9/0x5d0 [ 3333.689314] ? blk_alloc_queue+0x4b7/0x670 [ 3333.690188] blk_mq_init_queue+0x81/0xd0 [ 3333.691026] loop_add+0x2cf/0x8b0 [ 3333.691752] ? __sanitizer_cov_trace_switch+0x2/0x80 [ 3333.692784] loop_control_ioctl+0x170/0x480 [ 3333.693682] ? loop_lookup+0x1d0/0x1d0 [ 3333.694477] ? selinux_file_ioctl+0xb1/0x260 [ 3333.695390] ? loop_lookup+0x1d0/0x1d0 [ 3333.696210] __x64_sys_ioctl+0x19a/0x210 [ 3333.697042] do_syscall_64+0x33/0x40 [ 3333.697803] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3333.698844] RIP: 0033:0x7f3b305e3b19 [ 3333.699601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3333.703373] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3333.704961] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3333.706414] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3333.707873] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3333.709330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3333.710775] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3333.743007] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3333.762229] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3333.773168] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3333.780153] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3333.819375] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:56:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) setsockopt$sock_int(r2, 0x1, 0x2b, &(0x7f0000000180)=0x866, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r4) setsockopt$inet6_tcp_int(r2, 0x6, 0x18, &(0x7f0000000200)=0x100, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) write$selinux_attr(r5, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) sendmmsg$inet6(r5, &(0x7f0000000140)=[{{0xfffffffffffffffc, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="e563417cb1ff8ee87046bc4f369d568670f772b477d37c9a728bcb8f173cc9407a5d8504473521849c21f02a6ecb2678295a296887a923f9", 0x38}], 0x1}}], 0x1, 0x810) 19:56:02 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3333.903398] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:56:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7a00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:02 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:02 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 70) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3f00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:02 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3334.010658] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3334.019139] FAULT_INJECTION: forcing a failure. [ 3334.019139] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.021844] CPU: 0 PID: 18169 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3334.023266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.024981] Call Trace: [ 3334.025530] dump_stack+0x107/0x167 [ 3334.026280] should_fail.cold+0x5/0xa [ 3334.027067] ? blk_mq_realloc_hw_ctxs+0x8e6/0x14f0 [ 3334.028095] should_failslab+0x5/0x20 [ 3334.028868] __kmalloc_node+0x76/0x4b0 [ 3334.029672] blk_mq_realloc_hw_ctxs+0x8e6/0x14f0 [ 3334.030659] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3334.031724] ? blk_queue_dma_alignment+0xc/0x50 [ 3334.032673] ? blk_set_default_limits+0x9/0x5d0 [ 3334.033615] ? blk_alloc_queue+0x4b7/0x670 [ 3334.034482] blk_mq_init_queue+0x81/0xd0 [ 3334.035318] loop_add+0x2cf/0x8b0 [ 3334.036054] loop_control_ioctl+0x170/0x480 [ 3334.036949] ? loop_lookup+0x1d0/0x1d0 [ 3334.037771] ? selinux_file_ioctl+0xb1/0x260 [ 3334.038661] ? loop_lookup+0x1d0/0x1d0 19:56:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$sock(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x678000}}, @txtime={{0x18, 0x1, 0x3d, 0x309d}}, @mark={{0x14, 0x1, 0x24, 0xb}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x7fff}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0xa8}, 0x4010) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r2, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3334.039465] __x64_sys_ioctl+0x19a/0x210 [ 3334.040416] do_syscall_64+0x33/0x40 [ 3334.041196] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3334.042277] RIP: 0033:0x7f3b305e3b19 [ 3334.043040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3334.046701] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3334.048291] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3334.049750] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3334.051223] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3334.052689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3334.054144] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3334.061289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:56:02 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3334.095303] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 3334.117702] EXT4-fs (loop6): get root inode failed [ 3334.119031] EXT4-fs (loop6): mount failed [ 3334.136044] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:56:02 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 71) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7f00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:56:02 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:02 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3334.309324] FAULT_INJECTION: forcing a failure. [ 3334.309324] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.312160] CPU: 0 PID: 18198 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3334.313682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.315419] Call Trace: [ 3334.315981] dump_stack+0x107/0x167 [ 3334.316749] should_fail.cold+0x5/0xa [ 3334.317547] ? blk_mq_realloc_hw_ctxs+0xbc7/0x14f0 [ 3334.318554] ? blk_mq_realloc_hw_ctxs+0xbc7/0x14f0 [ 3334.319563] should_failslab+0x5/0x20 [ 3334.320353] __kmalloc_node+0x76/0x4b0 [ 3334.321159] blk_mq_realloc_hw_ctxs+0xbc7/0x14f0 [ 3334.322149] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3334.323211] ? blk_queue_dma_alignment+0xc/0x50 [ 3334.324180] ? blk_set_default_limits+0x9/0x5d0 [ 3334.325131] ? blk_alloc_queue+0x4b7/0x670 [ 3334.326008] blk_mq_init_queue+0x81/0xd0 [ 3334.326843] loop_add+0x2cf/0x8b0 [ 3334.327556] loop_control_ioctl+0x170/0x480 [ 3334.328448] ? loop_lookup+0x1d0/0x1d0 [ 3334.329258] ? selinux_file_ioctl+0xb1/0x260 [ 3334.330159] ? loop_lookup+0x1d0/0x1d0 [ 3334.330958] __x64_sys_ioctl+0x19a/0x210 [ 3334.331812] do_syscall_64+0x33/0x40 [ 3334.332580] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3334.333628] RIP: 0033:0x7f3b305e3b19 [ 3334.334390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3334.338152] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3334.339717] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3334.341175] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3334.342632] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3334.344107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3334.345567] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3334.357850] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:56:02 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e24, 0x2, @mcast2, 0x80000000}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) dup2(r1, r0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="4c24b0803e4463c0b70388f7e21462984d8da1af8cc22001f008fead99e1f1a63ddda9194a1083d870fe61ca583a92c462f9e1d9293ee08ab7734be4ee2815484aeb5904bd01587b200cb8a8578f", 0x4e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r0, r3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) write$selinux_attr(r4, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3334.454494] EXT4-fs error (device loop6): ext4_fill_super:4973: inode #2: comm syz-executor.6: iget: root inode unallocated [ 3334.464058] EXT4-fs (loop6): get root inode failed [ 3334.465246] EXT4-fs (loop6): mount failed 19:56:02 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 72) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3334.468510] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3334.491336] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3334.505484] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:56:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7fffffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3334.525489] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:56:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4000000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3334.606484] FAULT_INJECTION: forcing a failure. [ 3334.606484] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.609104] CPU: 1 PID: 18227 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3334.610559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.612277] Call Trace: [ 3334.612845] dump_stack+0x107/0x167 [ 3334.613593] should_fail.cold+0x5/0xa [ 3334.614365] ? create_object.isra.0+0x3a/0xa20 [ 3334.615300] should_failslab+0x5/0x20 [ 3334.616091] kmem_cache_alloc+0x5b/0x360 [ 3334.616919] ? mark_held_locks+0x9e/0xe0 [ 3334.617738] create_object.isra.0+0x3a/0xa20 [ 3334.618633] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3334.619698] __kmalloc_node+0x1ae/0x4b0 [ 3334.620520] blk_mq_realloc_hw_ctxs+0xbc7/0x14f0 [ 3334.621499] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3334.622566] ? blk_queue_dma_alignment+0xc/0x50 [ 3334.623508] ? blk_set_default_limits+0x9/0x5d0 [ 3334.624451] ? blk_alloc_queue+0x4b7/0x670 [ 3334.625327] blk_mq_init_queue+0x81/0xd0 [ 3334.626156] loop_add+0x2cf/0x8b0 [ 3334.626876] loop_control_ioctl+0x170/0x480 [ 3334.627751] ? loop_lookup+0x1d0/0x1d0 [ 3334.628545] ? selinux_file_ioctl+0xb1/0x260 [ 3334.629455] ? loop_lookup+0x1d0/0x1d0 [ 3334.630255] __x64_sys_ioctl+0x19a/0x210 [ 3334.631089] do_syscall_64+0x33/0x40 [ 3334.631865] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3334.632914] RIP: 0033:0x7f3b305e3b19 [ 3334.633680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3334.637432] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3334.638979] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3334.640449] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3334.641916] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3334.643367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3334.644839] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:56:03 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) fsetxattr$security_selinux(r4, &(0x7f0000000040), &(0x7f0000000100)='system_u:object_r:xen_device_t:s0\x00', 0x22, 0x0) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3334.819028] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3334.836427] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:56:03 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 73) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3334.865216] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3334.869175] EXT4-fs (loop6): invalid first ino: 0 19:56:03 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3334.972252] FAULT_INJECTION: forcing a failure. [ 3334.972252] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.975850] CPU: 0 PID: 18249 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3334.977299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.979032] Call Trace: [ 3334.979583] dump_stack+0x107/0x167 [ 3334.980366] should_fail.cold+0x5/0xa [ 3334.981148] ? sbitmap_init_node+0x292/0x500 [ 3334.982061] should_failslab+0x5/0x20 [ 3334.982846] __kmalloc_node+0x76/0x4b0 [ 3334.983666] sbitmap_init_node+0x292/0x500 [ 3334.984536] ? kasan_unpoison_shadow+0x33/0x50 [ 3334.985474] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3334.986514] blk_mq_realloc_hw_ctxs+0xc38/0x14f0 [ 3334.987501] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3334.988572] ? blk_queue_dma_alignment+0xc/0x50 [ 3334.989522] ? blk_set_default_limits+0x9/0x5d0 [ 3334.990468] ? blk_alloc_queue+0x4b7/0x670 [ 3334.991334] blk_mq_init_queue+0x81/0xd0 [ 3334.992176] loop_add+0x2cf/0x8b0 [ 3334.992885] loop_control_ioctl+0x170/0x480 [ 3334.993766] ? loop_lookup+0x1d0/0x1d0 [ 3334.994565] ? selinux_file_ioctl+0xb1/0x260 [ 3334.995464] ? loop_lookup+0x1d0/0x1d0 [ 3334.996281] __x64_sys_ioctl+0x19a/0x210 [ 3334.997111] do_syscall_64+0x33/0x40 [ 3334.997867] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3334.998902] RIP: 0033:0x7f3b305e3b19 [ 3334.999665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3335.001554] audit: type=1400 audit(1670788563.366:54): avc: denied { relabelto } for pid=18241 comm="syz-executor.7" name="HCI" dev="sockfs" ino=74753 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:xen_device_t:s0 tclass=bluetooth_socket permissive=1 [ 3335.003406] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3335.003427] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3335.003447] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3335.012714] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3335.014168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3335.015648] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3335.018316] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3335.087815] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3336.076703] Bluetooth: hci0: command 0x0401 tx timeout [ 3338.124677] Bluetooth: hci0: command 0x0401 tx timeout [ 3348.002176] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:56:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setfsgid(0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept(r0, &(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, &(0x7f0000000040)=0x80) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002280)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0xe, &(0x7f0000002240)=[r0, 0xffffffffffffffff, r1], 0x3, 0x0, 0x1, {0x0, r3}}, 0x9) clock_gettime(0x0, &(0x7f0000002000)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000001f00)=[{{&(0x7f0000000200)=@l2tp, 0x80, &(0x7f0000000180)=[{&(0x7f0000000380)=""/213, 0xd5}, {&(0x7f0000000580)=""/237, 0xed}], 0x2, &(0x7f0000000280)=""/2, 0x2}}, {{&(0x7f00000002c0), 0x80, &(0x7f0000000b00)=[{&(0x7f0000000480)=""/40, 0x28}, {&(0x7f0000000700)=""/253, 0xfd}, {&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f00000004c0)=""/57, 0x39}, {&(0x7f0000000900)=""/87, 0x57}, {&(0x7f0000000980)=""/106, 0x6a}, {&(0x7f0000000a00)=""/194, 0xc2}], 0x7, &(0x7f0000000b80)=""/4096, 0x1000}, 0x400}, {{&(0x7f0000001b80)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000500)=""/39, 0x27}], 0x1, &(0x7f0000001c00)=""/237, 0xed}, 0xff}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001d00)=""/63, 0x3f}, {&(0x7f0000001d40)=""/56, 0x38}, {&(0x7f0000001d80)=""/97, 0x61}, {&(0x7f0000001e00)=""/119, 0x77}], 0x4, &(0x7f0000001ec0)=""/22, 0x16}, 0x7}], 0x4, 0x2032, &(0x7f0000002040)={r4, r5+60000000}) listen(r0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r7, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000002200)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r7, 0x0, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000002080)=""/43, 0x2b}, {&(0x7f00000020c0)=""/91, 0x5b}], 0x2, &(0x7f0000002180)=""/46, 0x2e}, 0x0, 0x0, 0x1, {0x3}}, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x4e20, 0x8a7e3, @loopback}, 0x1c) sendmsg$inet6(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r9 = dup2(r0, r6) accept4$inet6(r9, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x40800) 19:56:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8cffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 74) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4800000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3354.784317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3354.799114] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3354.802244] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3354.809981] FAULT_INJECTION: forcing a failure. [ 3354.809981] name failslab, interval 1, probability 0, space 0, times 0 [ 3354.812552] CPU: 0 PID: 18278 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3354.814080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3354.815921] Call Trace: [ 3354.816513] dump_stack+0x107/0x167 [ 3354.817325] should_fail.cold+0x5/0xa [ 3354.818173] ? create_object.isra.0+0x3a/0xa20 [ 3354.819198] should_failslab+0x5/0x20 [ 3354.820078] kmem_cache_alloc+0x5b/0x360 [ 3354.820992] create_object.isra.0+0x3a/0xa20 [ 3354.821986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3354.823110] __kmalloc_node+0x1ae/0x4b0 [ 3354.824023] sbitmap_init_node+0x292/0x500 [ 3354.824970] ? kasan_unpoison_shadow+0x33/0x50 [ 3354.826008] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3354.827163] blk_mq_realloc_hw_ctxs+0xc38/0x14f0 [ 3354.828249] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3354.829419] ? blk_queue_dma_alignment+0xc/0x50 [ 3354.830463] ? blk_set_default_limits+0x9/0x5d0 [ 3354.831476] ? blk_alloc_queue+0x4b7/0x670 [ 3354.832450] blk_mq_init_queue+0x81/0xd0 [ 3354.833375] loop_add+0x2cf/0x8b0 [ 3354.834171] loop_control_ioctl+0x170/0x480 [ 3354.835148] ? loop_lookup+0x1d0/0x1d0 [ 3354.836039] ? selinux_file_ioctl+0xb1/0x260 [ 3354.837023] ? loop_lookup+0x1d0/0x1d0 [ 3354.837894] __x64_sys_ioctl+0x19a/0x210 [ 3354.838803] do_syscall_64+0x33/0x40 [ 3354.839635] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3354.840776] RIP: 0033:0x7f3b305e3b19 [ 3354.841535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3354.845275] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3354.846825] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3354.848290] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3354.849743] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3354.851201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3354.852674] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:56:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={&(0x7f0000000140)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="7f14756839c8b4c9cc431a27972df989a3502691b95f8fa9716b4458939f4fccf18c12b4d63f7b58ed457f72afd238dfe66c91cb810a9d26e6f211a164f57e90a415d3fb9342338b089cf4a34b6e3c5bf5eb8a705c41493de97f9e1abd50bc643101b62a3b025c84e0dcf788fba92e4d1ca21b9705c5189589d085bf2e42de006f059a6d50c7a69f9d842a5c3d8d", 0x8e}, {&(0x7f0000000380)="777eace76c5091ef91f923a2dfb4ddcd735bdb74c90be4c82d75bc6d7d0eb765fed69c3838de59e006c7b8b65bbc4cdebf0f154ad1a5a47b630d78c5d9efc79481604f80cd8994e1a59bd92d870dd6e4a38ce9bfca548552141463ec392771b8e3654b725a6411a684f7c6936f38bafed5c8a992b770bb0b5106ae9403b27ff500cd6afd090104739babaec8675957294a2c813a3c9e83aac3b9eeb5f7f0095b29a9e40ea4", 0xa5}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000440)="a5b6e03d133a51d11feda94fcb3f4ac0fd876bdb7cb060bc007fcc6b5bb748c7697d2cebd4125574a9d470fcb600964377b48afa7cfefba560da57944abc78192d4725860297a29eb50ab12414d8f457730648dfdfdd6ca5a2b1839d91cf4bb36e4df3279cca1f147169a9a86b63c002d1a1f17bd1319b5b1deb08fcb7bb4fe5c0ef1d5972398ee922cf00b249cd8df983130a33aa4069ce7caf77811996233449416fe104ed64a62cbd031490d4c899b3bd3937845a7d149149714d889c635ade8698b5de7bc8", 0xc7}, {&(0x7f00000002c0)="c5b962e8c19c33d53f430cc1591d36af7bae1d", 0x13}], 0x6, &(0x7f0000000600)=[@txtime={{0x18, 0x1, 0x3d, 0x7b6}}, @mark={{0x14, 0x1, 0x24, 0xfffffffc}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x48}, 0x44040) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=0x10) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3355.041058] EXT4-fs (loop6): invalid first ino: 0 [ 3355.047117] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3355.049840] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3355.053136] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:56:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3355.205570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:56:23 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x97ffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 75) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4c00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3355.310350] EXT4-fs (loop6): invalid first ino: 0 19:56:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3355.401485] FAULT_INJECTION: forcing a failure. [ 3355.401485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3355.404198] CPU: 1 PID: 18326 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3355.405659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3355.407391] Call Trace: [ 3355.407963] dump_stack+0x107/0x167 [ 3355.408726] should_fail.cold+0x5/0xa [ 3355.409530] __alloc_pages_nodemask+0x182/0x680 [ 3355.410507] ? stack_trace_consume_entry+0x160/0x160 [ 3355.411567] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 3355.412854] alloc_pages_current+0x187/0x280 [ 3355.413770] allocate_slab+0x26f/0x380 [ 3355.414587] ___slab_alloc+0x470/0x700 [ 3355.415397] ? create_object.isra.0+0x3a/0xa20 [ 3355.416362] ? find_held_lock+0x2c/0x110 [ 3355.417218] ? create_object.isra.0+0x3a/0xa20 [ 3355.418172] ? kmem_cache_alloc+0x343/0x360 [ 3355.419072] kmem_cache_alloc+0x343/0x360 [ 3355.419957] create_object.isra.0+0x3a/0xa20 [ 3355.420879] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3355.421943] __kmalloc_node+0x1ae/0x4b0 [ 3355.422776] blk_mq_realloc_hw_ctxs+0xbc7/0x14f0 [ 3355.423777] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3355.424855] ? blk_queue_dma_alignment+0xc/0x50 [ 3355.425811] ? blk_set_default_limits+0x9/0x5d0 [ 3355.426772] ? blk_alloc_queue+0x4b7/0x670 [ 3355.427649] blk_mq_init_queue+0x81/0xd0 [ 3355.428508] loop_add+0x2cf/0x8b0 [ 3355.429237] loop_control_ioctl+0x170/0x480 [ 3355.430124] ? loop_lookup+0x1d0/0x1d0 [ 3355.430937] ? selinux_file_ioctl+0xb1/0x260 [ 3355.431851] ? loop_lookup+0x1d0/0x1d0 [ 3355.432673] __x64_sys_ioctl+0x19a/0x210 [ 3355.433516] do_syscall_64+0x33/0x40 [ 3355.434293] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3355.435356] RIP: 0033:0x7f3b305e3b19 [ 3355.436149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3355.439954] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3355.441521] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3355.442991] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3355.444471] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3355.445929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3355.447400] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3355.523635] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3355.534429] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3355.662428] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3355.785363] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3356.812610] Bluetooth: hci0: command 0x0401 tx timeout [ 3358.860570] Bluetooth: hci0: command 0x0401 tx timeout [ 3366.505193] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:56:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6800000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r3 = syz_open_dev$vcsu(&(0x7f0000000040), 0x7ff, 0x601) getsockopt$IP_SET_OP_GET_BYINDEX(r3, 0x1, 0x53, &(0x7f0000000100)={0x7, 0x7, 0x1}, &(0x7f0000000140)=0x28) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e23, 0x8390, @empty, 0x100}, 0x1c) 19:56:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xb3fcdd9d00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 76) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:43 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = signalfd(r1, &(0x7f0000000040)={[0x5]}, 0x8) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0x4, @remote, 0x20}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3374.773282] EXT4-fs (loop6): unsupported inode size: 0 [ 3374.774418] EXT4-fs (loop6): blocksize: 2048 [ 3374.797995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3374.811782] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3374.840239] FAULT_INJECTION: forcing a failure. [ 3374.840239] name failslab, interval 1, probability 0, space 0, times 0 [ 3374.842939] CPU: 0 PID: 18361 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3374.843703] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3374.844336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3374.844349] Call Trace: [ 3374.848118] dump_stack+0x107/0x167 [ 3374.848871] should_fail.cold+0x5/0xa [ 3374.849634] ? create_object.isra.0+0x3a/0xa20 [ 3374.850549] should_failslab+0x5/0x20 [ 3374.851306] kmem_cache_alloc+0x5b/0x360 [ 3374.852117] create_object.isra.0+0x3a/0xa20 [ 3374.853004] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3374.854019] kmem_cache_alloc_node_trace+0x16d/0x380 [ 3374.855057] blk_alloc_flush_queue+0x97/0x3c0 [ 3374.855964] ? __raw_spin_lock_init+0x36/0x110 [ 3374.856918] blk_mq_realloc_hw_ctxs+0xda3/0x14f0 [ 3374.857875] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3374.858946] ? blk_queue_dma_alignment+0xc/0x50 [ 3374.859900] ? blk_set_default_limits+0x9/0x5d0 [ 3374.860867] ? blk_alloc_queue+0x4b7/0x670 [ 3374.861741] blk_mq_init_queue+0x81/0xd0 [ 3374.862581] loop_add+0x2cf/0x8b0 [ 3374.863302] loop_control_ioctl+0x170/0x480 [ 3374.864193] ? loop_lookup+0x1d0/0x1d0 [ 3374.865005] ? selinux_file_ioctl+0xb1/0x260 [ 3374.865912] ? loop_lookup+0x1d0/0x1d0 [ 3374.866720] __x64_sys_ioctl+0x19a/0x210 19:56:43 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3374.867562] do_syscall_64+0x33/0x40 [ 3374.868523] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3374.869565] RIP: 0033:0x7f3b305e3b19 [ 3374.870322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3374.874075] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3374.875625] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3374.877098] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3374.878550] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3374.880000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3374.881465] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:56:43 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r2 = dup2(r0, r1) accept4$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3374.981490] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3374.991069] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3375.006351] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3375.046189] EXT4-fs (loop6): unsupported inode size: 0 [ 3375.047388] EXT4-fs (loop6): blocksize: 2048 [ 3375.048645] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:56:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1288, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e21, 0x4, @mcast2, 0x80}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e23, 0xfffff99a, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8b7}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback, 0x40000}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x5, @mcast2, 0xfff}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="cf", 0x1}, {&(0x7f0000000200)="371f6fe35f4ff3aab4b0cc5610ba6a52597736c7382e7f44d3be54c9e86460a2259775bb0dd891da6d1d34778e4c102e74a12a1479e4dc5470114b", 0x3b}], 0x2}, 0x0) r5 = dup2(r2, r3) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:56:43 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 77) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:56:43 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:56:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf4ffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3375.198964] FAULT_INJECTION: forcing a failure. [ 3375.198964] name failslab, interval 1, probability 0, space 0, times 0 [ 3375.199826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3375.201762] CPU: 1 PID: 18396 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3375.204737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3375.206447] Call Trace: [ 3375.206999] dump_stack+0x107/0x167 [ 3375.207768] should_fail.cold+0x5/0xa [ 3375.208576] ? blk_alloc_flush_queue+0x129/0x3c0 [ 3375.209540] should_failslab+0x5/0x20 [ 3375.210311] __kmalloc_node+0x76/0x4b0 [ 3375.211105] blk_alloc_flush_queue+0x129/0x3c0 [ 3375.212033] ? __raw_spin_lock_init+0x36/0x110 [ 3375.212974] blk_mq_realloc_hw_ctxs+0xda3/0x14f0 [ 3375.213951] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3375.215003] ? blk_queue_dma_alignment+0xc/0x50 [ 3375.215957] ? blk_set_default_limits+0x9/0x5d0 [ 3375.216905] ? blk_alloc_queue+0x4b7/0x670 [ 3375.217764] blk_mq_init_queue+0x81/0xd0 [ 3375.218592] loop_add+0x2cf/0x8b0 [ 3375.219299] loop_control_ioctl+0x170/0x480 [ 3375.220189] ? loop_lookup+0x1d0/0x1d0 [ 3375.221004] ? selinux_file_ioctl+0xb1/0x260 [ 3375.221894] ? loop_lookup+0x1d0/0x1d0 [ 3375.222690] __x64_sys_ioctl+0x19a/0x210 [ 3375.223514] do_syscall_64+0x33/0x40 [ 3375.224280] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3375.225316] RIP: 0033:0x7f3b305e3b19 [ 3375.226066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3375.229784] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3375.231314] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3375.232759] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3375.234197] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3375.235630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3375.237077] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3375.255397] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3375.289249] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3375.309644] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3375.384978] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3389.819026] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:57:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) flock(r0, 0x8) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x58, r2, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x100, 0x18}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x600, 0x10) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:57:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x6c00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000180)={0x47, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x60}, @jumbo={0xc2, 0x4, 0x9}, @enc_lim={0x4, 0x1, 0x40}, @pad1]}, 0x18) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x8000, @mcast1, 0x3}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x20000, 0x90) r6 = dup2(0xffffffffffffffff, r5) accept4$inet6(r6, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:57:05 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:05 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:05 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 78) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:57:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, 0x0, 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf5ffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3397.225518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3397.232017] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3397.251030] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3397.267236] FAULT_INJECTION: forcing a failure. [ 3397.267236] name failslab, interval 1, probability 0, space 0, times 0 [ 3397.269992] CPU: 1 PID: 18433 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3397.271431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3397.273177] Call Trace: [ 3397.273735] dump_stack+0x107/0x167 [ 3397.274504] should_fail.cold+0x5/0xa [ 3397.275303] ? create_object.isra.0+0x3a/0xa20 [ 3397.276259] should_failslab+0x5/0x20 [ 3397.277063] kmem_cache_alloc+0x5b/0x360 [ 3397.277921] create_object.isra.0+0x3a/0xa20 [ 3397.278840] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3397.279899] __kmalloc_node+0x1ae/0x4b0 [ 3397.280756] blk_alloc_flush_queue+0x129/0x3c0 [ 3397.281706] ? __raw_spin_lock_init+0x36/0x110 [ 3397.282658] blk_mq_realloc_hw_ctxs+0xda3/0x14f0 [ 3397.283662] blk_mq_init_allocated_queue+0x333/0x13b0 [ 3397.284749] ? blk_queue_dma_alignment+0xc/0x50 [ 3397.285711] ? blk_set_default_limits+0x9/0x5d0 [ 3397.286675] ? blk_alloc_queue+0x4b7/0x670 [ 3397.287568] blk_mq_init_queue+0x81/0xd0 [ 3397.288422] loop_add+0x2cf/0x8b0 [ 3397.289160] ? loop_add+0x2/0x8b0 [ 3397.289888] loop_control_ioctl+0x170/0x480 [ 3397.290774] ? loop_lookup+0x1d0/0x1d0 [ 3397.291579] ? selinux_file_ioctl+0xb1/0x260 [ 3397.292503] ? loop_lookup+0x1d0/0x1d0 [ 3397.293309] __x64_sys_ioctl+0x19a/0x210 [ 3397.294158] do_syscall_64+0x33/0x40 [ 3397.294928] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3397.295985] RIP: 0033:0x7f3b305e3b19 [ 3397.296781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3397.300625] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3397.302195] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3397.303668] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3397.305147] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3397.306614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3397.308081] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3397.362182] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3397.372494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3397.383197] EXT4-fs (loop6): unsupported inode size: 0 [ 3397.384497] EXT4-fs (loop6): blocksize: 2048 [ 3397.405210] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3397.408215] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:57:05 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 79) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:57:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, 0x0, 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3397.583183] FAULT_INJECTION: forcing a failure. [ 3397.583183] name failslab, interval 1, probability 0, space 0, times 0 [ 3397.585883] CPU: 1 PID: 18471 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3397.587291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3397.588998] Call Trace: [ 3397.589549] dump_stack+0x107/0x167 [ 3397.590297] should_fail.cold+0x5/0xa [ 3397.591079] ? __alloc_disk_node+0x69/0x390 [ 3397.591962] should_failslab+0x5/0x20 [ 3397.592760] kmem_cache_alloc_node_trace+0x59/0x380 [ 3397.593781] __alloc_disk_node+0x69/0x390 [ 3397.594636] loop_add+0x38c/0x8b0 [ 3397.595346] loop_control_ioctl+0x170/0x480 [ 3397.596220] ? loop_lookup+0x1d0/0x1d0 [ 3397.597026] ? selinux_file_ioctl+0xb1/0x260 [ 3397.597933] ? loop_lookup+0x1d0/0x1d0 [ 3397.598741] __x64_sys_ioctl+0x19a/0x210 [ 3397.599583] do_syscall_64+0x33/0x40 [ 3397.600347] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3397.601405] RIP: 0033:0x7f3b305e3b19 [ 3397.602167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3397.605934] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3397.607523] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3397.609005] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3397.610474] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3397.611931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3397.613433] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3397.679689] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3397.702945] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3398.070282] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3399.437570] Bluetooth: hci0: command 0x0401 tx timeout [ 3401.484610] Bluetooth: hci0: command 0x0401 tx timeout [ 3410.338728] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:57:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000100)}, {&(0x7f0000000140)="01dab2c896d0212246173858affeb45b9e03d56d5cf36ea16ca090a76be8e5a0d565a9332408a6cd671bcdeaaf457b4bf0", 0x31}, {&(0x7f0000000180)="7727ea76329eef166aa6297d98a34746a0a08a90b18a684e5fbb197fba91", 0x1e}], 0x3, &(0x7f00000003c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0xd8, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x78, 0x1, 0xd, [{@dev={0xac, 0x14, 0x14, 0x26}, 0x8000}, {@private=0xa010100, 0x81}]}, @cipso={0x86, 0x6e, 0xffffffffffffffff, [{0x1, 0x7, "38f4604fdc"}, {0x1, 0xa, "076f840a5c86c28f"}, {0x1, 0xf, "836947efea4387bc3caf11a6bf"}, {0x2, 0x7, "1b7ca2717c"}, {0x0, 0xc, "93cc6781c8dc873efe12"}, {0x1, 0x7, "f338186ab1"}, {0x7, 0x10, "6979bfeeca19cf19f9735190d741"}, {0x2, 0xc, "22508bf73a248c485d3c"}, {0x0, 0x12, "daed32fb9c03a676c70afc21228b94da"}]}, @generic={0x44, 0x10, "de523fbd21b9908fa53678156fc3"}, @noop, @cipso={0x86, 0x32, 0x1, [{0x7, 0x6, "e40f233f"}, {0x4c0726e4965da306, 0x5, "caa8ab"}, {0x7, 0x6, "2d3038cd"}, {0x1, 0xf, "b1f617be57d019bd53ff91ec3c"}, {0x2, 0xc, "ab466bed200b3332788a"}]}]}}}], 0xf0}, 0x40) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @local}, 0xffffffffffffff45) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:57:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7400000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, 0x0, 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e00, 0x5, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @private1, 0x31}, 0x1c) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:57:24 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 80) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xf6ffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:24 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3416.545364] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:57:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) listen(r1, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) dup2(r0, r2) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RCREATE(r4, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x6}, 0x5}}, 0x18) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x80800) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) [ 3416.555457] FAULT_INJECTION: forcing a failure. [ 3416.555457] name failslab, interval 1, probability 0, space 0, times 0 [ 3416.558126] CPU: 0 PID: 18504 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3416.559819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3416.561523] Call Trace: [ 3416.562177] dump_stack+0x107/0x167 [ 3416.562932] should_fail.cold+0x5/0xa [ 3416.563867] ? create_object.isra.0+0x3a/0xa20 [ 3416.564823] should_failslab+0x5/0x20 [ 3416.565752] kmem_cache_alloc+0x5b/0x360 [ 3416.566589] create_object.isra.0+0x3a/0xa20 [ 3416.567655] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3416.568686] kmem_cache_alloc_node_trace+0x16d/0x380 [ 3416.569947] __alloc_disk_node+0x69/0x390 [ 3416.570799] loop_add+0x38c/0x8b0 [ 3416.571652] loop_control_ioctl+0x170/0x480 [ 3416.572527] ? loop_lookup+0x1d0/0x1d0 [ 3416.573490] ? selinux_file_ioctl+0xb1/0x260 [ 3416.574391] ? loop_lookup+0x1d0/0x1d0 [ 3416.575344] __x64_sys_ioctl+0x19a/0x210 [ 3416.576196] do_syscall_64+0x33/0x40 [ 3416.577014] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3416.578105] RIP: 0033:0x7f3b305e3b19 [ 3416.578901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3416.582826] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3416.584446] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3416.585997] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3416.587562] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3416.589109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3416.590627] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3416.670635] EXT4-fs (loop6): unsupported inode size: 0 [ 3416.671982] EXT4-fs (loop6): blocksize: 2048 [ 3416.689023] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3416.695658] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3416.700063] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:57:25 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:25 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 81) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3416.938178] FAULT_INJECTION: forcing a failure. [ 3416.938178] name failslab, interval 1, probability 0, space 0, times 0 [ 3416.941031] CPU: 1 PID: 18538 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3416.942473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3416.944170] Call Trace: [ 3416.944744] dump_stack+0x107/0x167 [ 3416.945495] should_fail.cold+0x5/0xa [ 3416.946289] ? create_object.isra.0+0x3a/0xa20 [ 3416.947229] should_failslab+0x5/0x20 [ 3416.948020] kmem_cache_alloc+0x5b/0x360 [ 3416.948906] create_object.isra.0+0x3a/0xa20 [ 3416.949828] kmemleak_alloc_percpu+0xa0/0x100 [ 3416.950810] pcpu_alloc+0x4e2/0x12f0 [ 3416.951595] __alloc_disk_node+0x8e/0x390 [ 3416.952451] loop_add+0x38c/0x8b0 [ 3416.953197] loop_control_ioctl+0x170/0x480 [ 3416.954077] ? loop_lookup+0x1d0/0x1d0 [ 3416.954913] ? selinux_file_ioctl+0xb1/0x260 [ 3416.955827] ? loop_lookup+0x1d0/0x1d0 [ 3416.956652] __x64_sys_ioctl+0x19a/0x210 [ 3416.957504] do_syscall_64+0x33/0x40 [ 3416.958308] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3416.959360] RIP: 0033:0x7f3b305e3b19 [ 3416.960132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3416.963912] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3416.965479] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3416.966941] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3416.968399] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3416.969884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3416.971349] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3431.397078] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:57:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0)=""/196, &(0x7f0000000040)=0xc4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000000700)={{r0}, "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"}) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:57:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100)=0x1b843870, 0x4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x65c, @dev={0xfe, 0x80, '\x00', 0x17}, 0x1f}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) accept$inet6(r3, 0x0, &(0x7f00000002c0)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) recvfrom$inet6(r1, &(0x7f0000000200)=""/85, 0x55, 0x12001, &(0x7f0000000280)={0xa, 0x4e21, 0xffffffff, @mcast1, 0x400}, 0x1c) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r2}}, './file0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000180), 0x4) 19:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7a00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfbffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:57:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3439.968233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3439.981122] FAULT_INJECTION: forcing a failure. [ 3439.981122] name failslab, interval 1, probability 0, space 0, times 0 [ 3439.983930] CPU: 1 PID: 18556 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3439.985456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3439.987262] Call Trace: [ 3439.987843] dump_stack+0x107/0x167 [ 3439.988646] should_fail.cold+0x5/0xa [ 3439.989496] ? create_object.isra.0+0x3a/0xa20 [ 3439.990514] should_failslab+0x5/0x20 [ 3439.991362] kmem_cache_alloc+0x5b/0x360 [ 3439.992256] ? mark_held_locks+0x9e/0xe0 [ 3439.993153] create_object.isra.0+0x3a/0xa20 [ 3439.994133] kmemleak_alloc_percpu+0xa0/0x100 [ 3439.995117] pcpu_alloc+0x4e2/0x12f0 [ 3439.995961] __alloc_disk_node+0x8e/0x390 [ 3439.996889] loop_add+0x38c/0x8b0 [ 3439.997669] loop_control_ioctl+0x170/0x480 [ 3439.998612] ? loop_lookup+0x1d0/0x1d0 [ 3439.999475] ? selinux_file_ioctl+0xb1/0x260 [ 3440.000452] ? loop_lookup+0x1d0/0x1d0 [ 3440.001310] __x64_sys_ioctl+0x19a/0x210 [ 3440.002207] do_syscall_64+0x33/0x40 [ 3440.003030] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3440.004145] RIP: 0033:0x7f3b305e3b19 [ 3440.004963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3440.009012] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3440.010666] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3440.012212] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3440.013767] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3440.015331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3440.016889] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3440.039927] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3440.046878] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:57:48 executing program 2: semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)={{0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0x0, 0x6}, 0x400, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000200)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3440.148088] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3440.151058] EXT4-fs (loop4): Unrecognized mount option "./file0" or missing value [ 3440.153837] EXT4-fs (loop6): unsupported inode size: 0 [ 3440.154977] EXT4-fs (loop6): blocksize: 2048 [ 3440.174416] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3440.197389] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:57:48 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 83) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3440.213955] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value 19:57:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3440.296161] FAULT_INJECTION: forcing a failure. [ 3440.296161] name failslab, interval 1, probability 0, space 0, times 0 [ 3440.298870] CPU: 0 PID: 18585 Comm: syz-executor.0 Not tainted 5.10.158 #1 19:57:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfc01000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:57:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3440.300267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3440.302082] Call Trace: [ 3440.302622] dump_stack+0x107/0x167 [ 3440.303363] should_fail.cold+0x5/0xa [ 3440.304137] ? disk_expand_part_tbl+0x17c/0x3a0 [ 3440.305088] ? disk_expand_part_tbl+0x17c/0x3a0 [ 3440.306032] should_failslab+0x5/0x20 [ 3440.306815] __kmalloc_node+0x76/0x4b0 [ 3440.307604] ? lockdep_init_map_type+0x2c7/0x780 [ 3440.308569] disk_expand_part_tbl+0x17c/0x3a0 [ 3440.309490] __alloc_disk_node+0x112/0x390 [ 3440.310349] loop_add+0x38c/0x8b0 [ 3440.311054] loop_control_ioctl+0x170/0x480 [ 3440.311919] ? loop_lookup+0x1d0/0x1d0 [ 3440.312721] ? selinux_file_ioctl+0xb1/0x260 [ 3440.313621] ? loop_lookup+0x1d0/0x1d0 [ 3440.314417] __x64_sys_ioctl+0x19a/0x210 [ 3440.314800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3440.315244] do_syscall_64+0x33/0x40 [ 3440.318447] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3440.319472] RIP: 0033:0x7f3b305e3b19 [ 3440.320232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3440.323936] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3440.325500] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3440.326943] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3440.328389] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3440.329851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3440.331300] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:57:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7f00000000000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3440.426222] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000700)={0x2, 0x4, @status={[0x9, 0x3, 0x1, 0x9, 0x1000, 0x9]}, [0xffffffffffff0000, 0x7, 0x58, 0x9, 0x5, 0x3, 0xc81, 0x4, 0x20, 0xe710, 0xffffffff80000001, 0x7, 0x1, 0x31, 0x3ff, 0x4, 0xc9, 0xffffffffffffffe0, 0x80000000, 0x9e, 0x2, 0x400, 0x100000000, 0xff, 0x8000, 0x80000000, 0x1, 0xfffffffffffffff9, 0x7, 0x7, 0x80000001, 0xffff, 0x5, 0x8, 0x0, 0x1, 0x6, 0x62759a8, 0x6, 0xfffffffffffff6f8, 0x0, 0x1000000000000, 0x5, 0x5, 0x2, 0x800, 0x1, 0x100000000, 0x9, 0x9, 0x8, 0x8000, 0x2, 0x3, 0xfff, 0x3ff, 0x1000, 0x8, 0x800, 0x0, 0x0, 0x2, 0x0, 0x2]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0/file0\x00'}) bind$inet6(r2, &(0x7f0000000440)={0xa, 0x4e21, 0xfffffffa, @private1, 0x5}, 0x1c) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/cgroups\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000480)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept(r1, &(0x7f0000000100)=@phonet, &(0x7f0000000040)=0x80) recvfrom$inet6(r0, &(0x7f0000000200)=""/195, 0xc3, 0x120, &(0x7f0000000300)={0xa, 0x4e21, 0x3, @private0, 0xff}, 0x1c) sendmsg$inet6(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) dup2(r0, r1) accept4$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x80000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0x403, 0x5}}, './file0/file0\x00'}) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0xc) dup2(r5, r5) [ 3440.493731] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3440.525877] EXT4-fs (loop6): unsupported inode size: 0 [ 3440.527200] EXT4-fs (loop6): blocksize: 2048 [ 3440.530403] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3440.555838] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3440.604060] EXT4-fs (loop3): Unrecognized mount option "./file0" or missing value [ 3440.619315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3453.396877] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:58:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'gre0\x00'}) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7f, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000100), 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x23, &(0x7f0000000180)=0x1000, 0x4) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = dup2(r0, r1) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:58:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfdffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7fffffffffffffff) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RCREATE(r3, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x6}, 0x5}}, 0x18) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, &(0x7f0000000380)=0x3, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = fcntl$dupfd(r2, 0x406, r1) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f00000003c0)={0x0, 0x0, "2034ff"}) ioctl$sock_netdev_private(r5, 0x89ff, &(0x7f0000000200)="1893285f3c351c509b202e71f84cb81f5eacb22dc2f83d89d41770ef6e9c3b97f6d75189d62e9195597edce597099c2d07f49113efc2ddc03f68d3bf809c032a738fbd0a30a48226bf2f2e2cfc85b442ae02772ee1c76aeea8c4012191954a7b5d053fdc42aef31c4ab44f467e0054874f826c04864b5283a26a2f6d47511843037168b0da2e4e0d818d55dfd542e10d665d6f644c032c608a107fb01ee209fef8a6104c48fa748705de07b4ad3fd353aad0f5491874989c00ef6d847a8ceda558b1c9c0e39a374d6f2ec99eca64b87b8e78434d1cf00bef2eaaf697a01fcca23506c25b2fcd") r6 = dup2(r0, r1) r7 = accept4$inet6(r6, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) write$binfmt_elf64(r7, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x46c) 19:58:10 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 84) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3461.837862] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3461.863390] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 3461.877907] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3461.879293] FAULT_INJECTION: forcing a failure. [ 3461.879293] name failslab, interval 1, probability 0, space 0, times 0 [ 3461.882985] CPU: 0 PID: 18636 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3461.884431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3461.886169] Call Trace: [ 3461.886724] dump_stack+0x107/0x167 [ 3461.887499] should_fail.cold+0x5/0xa [ 3461.888302] ? disk_expand_part_tbl+0x17c/0x3a0 [ 3461.889250] should_failslab+0x5/0x20 [ 3461.890025] __kmalloc_node+0x76/0x4b0 [ 3461.890847] ? lockdep_init_map_type+0x2c7/0x780 [ 3461.891834] disk_expand_part_tbl+0x17c/0x3a0 [ 3461.892720] __alloc_disk_node+0x112/0x390 [ 3461.893616] loop_add+0x38c/0x8b0 [ 3461.894354] loop_control_ioctl+0x170/0x480 [ 3461.895226] ? loop_lookup+0x1d0/0x1d0 [ 3461.896021] ? selinux_file_ioctl+0xb1/0x260 [ 3461.896916] ? loop_lookup+0x1d0/0x1d0 [ 3461.897730] __x64_sys_ioctl+0x19a/0x210 [ 3461.898562] do_syscall_64+0x33/0x40 [ 3461.899318] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3461.900361] RIP: 0033:0x7f3b305e3b19 [ 3461.901122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3461.904854] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3461.906416] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3461.906504] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3461.907874] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3461.907885] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3461.907896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3461.907907] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3461.956285] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3461.970934] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3461.975148] EXT4-fs (loop6): unsupported inode size: 0 [ 3461.976454] EXT4-fs (loop6): blocksize: 2048 19:58:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8cffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 85) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:58:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfeffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x97ffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x18440, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x80000000, @rand_addr=' \x01\x00', 0x1}}, 0x0, 0x0, 0x47, 0x0, "6a347204d21f70fdf5abec5b269ffcac892371a0c1426c4fd38eeea9a72804628a9c2ee873d125812788023fe3cc246b2ba3f171ac1fbf7532263e5748c4f3f6df7a673ceb157f55c51e9a2aaffcab5b"}, 0xd8) sendmsg$inet6(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="cf", 0x1}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3462.230330] FAULT_INJECTION: forcing a failure. [ 3462.230330] name failslab, interval 1, probability 0, space 0, times 0 [ 3462.233440] CPU: 0 PID: 18675 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3462.234882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3462.236587] Call Trace: [ 3462.237132] dump_stack+0x107/0x167 [ 3462.237896] should_fail.cold+0x5/0xa [ 3462.238686] ? create_object.isra.0+0x3a/0xa20 [ 3462.239636] should_failslab+0x5/0x20 [ 3462.240410] kmem_cache_alloc+0x5b/0x360 [ 3462.241238] create_object.isra.0+0x3a/0xa20 [ 3462.242152] kmemleak_alloc_percpu+0xa0/0x100 [ 3462.243072] pcpu_alloc+0x4e2/0x12f0 [ 3462.243852] ? part_alignment_offset_show+0x220/0x220 [ 3462.244916] percpu_ref_init+0x31/0x3d0 [ 3462.245751] hd_ref_init+0x22/0x50 [ 3462.246475] __alloc_disk_node+0x17f/0x390 [ 3462.247340] loop_add+0x38c/0x8b0 [ 3462.248051] loop_control_ioctl+0x170/0x480 [ 3462.248925] ? loop_lookup+0x1d0/0x1d0 [ 3462.249825] ? selinux_file_ioctl+0xb1/0x260 [ 3462.250725] ? loop_lookup+0x1d0/0x1d0 [ 3462.251513] __x64_sys_ioctl+0x19a/0x210 [ 3462.252343] do_syscall_64+0x33/0x40 [ 3462.253120] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3462.254177] RIP: 0033:0x7f3b305e3b19 [ 3462.254937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3462.258705] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3462.260263] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3462.261757] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3462.263202] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3462.264666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3462.266144] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:58:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet6(r2, 0x0, &(0x7f0000000040), 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r4) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000200)={0x800080, {{0xa, 0x4e21, 0x20, @local, 0x7fff}}}, 0x88) write$P9_RCREATE(r3, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x6}, 0x5}}, 0x18) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e21, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = dup2(r0, r1) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) listen(r2, 0x4) [ 3462.295837] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3462.343447] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3462.374353] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3462.395147] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3462.418350] EXT4-fs (loop4): Unrecognized mount option "./file0" or missing value [ 3462.428934] EXT4-fs (loop6): unsupported inode size: 0 [ 3462.430110] EXT4-fs (loop6): blocksize: 2048 [ 3462.456367] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3462.478910] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:58:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup2(r4, r4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) write$selinux_attr(r5, &(0x7f00000000c0)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e) setsockopt$inet6_tcp_int(r5, 0x6, 0x6, &(0x7f0000000040)=0x5, 0x4) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:58:10 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 86) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3462.649815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3462.654323] FAULT_INJECTION: forcing a failure. [ 3462.654323] name failslab, interval 1, probability 0, space 0, times 0 [ 3462.656764] CPU: 0 PID: 18710 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3462.658109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3462.659659] Call Trace: [ 3462.660177] dump_stack+0x107/0x167 [ 3462.660877] should_fail.cold+0x5/0xa [ 3462.661630] ? create_object.isra.0+0x3a/0xa20 [ 3462.662514] should_failslab+0x5/0x20 [ 3462.663244] kmem_cache_alloc+0x5b/0x360 [ 3462.664033] create_object.isra.0+0x3a/0xa20 [ 3462.664887] kmemleak_alloc_percpu+0xa0/0x100 [ 3462.665775] pcpu_alloc+0x4e2/0x12f0 [ 3462.666517] ? part_alignment_offset_show+0x220/0x220 [ 3462.667506] percpu_ref_init+0x31/0x3d0 [ 3462.668266] hd_ref_init+0x22/0x50 [ 3462.668967] __alloc_disk_node+0x17f/0x390 [ 3462.669798] loop_add+0x38c/0x8b0 [ 3462.670440] loop_control_ioctl+0x170/0x480 [ 3462.671248] ? loop_lookup+0x1d0/0x1d0 [ 3462.671988] ? selinux_file_ioctl+0xb1/0x260 [ 3462.672825] ? loop_lookup+0x1d0/0x1d0 [ 3462.673576] __x64_sys_ioctl+0x19a/0x210 [ 3462.674345] do_syscall_64+0x33/0x40 [ 3462.675048] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3462.676004] RIP: 0033:0x7f3b305e3b19 [ 3462.676697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3462.680207] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3462.681655] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3462.683015] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3462.684374] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3462.685735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3462.687064] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3462.769888] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3463.884585] Bluetooth: hci0: command 0x0401 tx timeout [ 3465.932584] Bluetooth: hci0: command 0x0401 tx timeout [ 3467.980637] Bluetooth: hci0: command 0x0401 tx timeout [ 3474.657815] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:58:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = accept4$inet6(r1, 0x0, &(0x7f0000000180), 0x80c00) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x4e20, 0x43b89612, @dev={0xfe, 0x80, '\x00', 0x2b}, 0x4}, 0x1c) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000700)={0x270, 0x2f, 0x100, 0x70bd25, 0x25dfdbfe, {0x1f}, [@typed={0x4, 0xc}, @nested={0x82, 0x58, 0x0, 0x1, [@generic="30c3c406470ed1a7d5a993ea8462ff1135ac724cc7c8e2ceea7d10eb0cfbfe46ac776b1a312b7980359e846b593ea6230d8eefc401af0875b55f5e22e34687c53580f07cd63f04cad72fb982e9f2754653f0724b1297b15943de11ed32a993e2d141b1aa7fecc8c316a4fa10fc683368efd8d2c71cec9c2123c183035e56"]}, @nested={0x84, 0x22, 0x0, 0x1, [@typed={0x5, 0x8c, 0x0, 0x0, @str='\x00'}, @generic="5417a7a613da50b3d8c991a25d51cf14c06f91f11c3e0c3da252bf60b2b7d0ee2611ff387f8cfc7c778933e8f6a3c3a4355d63c30cb3a885b725fa0653c1e78073e4b9ec4a516d616eb09f81180f1545ec0e108df2dea104c5601234402d7ffce5f81a1c40dc257bb51b6dd57e14a8392df6ad19e16a93b3"]}, @nested={0x13a, 0x7e, 0x0, 0x1, [@generic="8ea274ebd552c42559aab0a3c3a60b40e8c443e5a2ff69fd17e0ccf748ccae30a7d8bf300a1e2fb3f4c0fa43baacbef90a", @typed={0x8, 0x44, 0x0, 0x0, @u32=0x6}, @generic="27c19cc7906d5fc8cd9abd9221c94cc1", @typed={0x8, 0x68, 0x0, 0x0, @uid=r4}, @generic="a0c0740adddbf1184610309b102e2907035e11506e5a6f9413f4bed885a9ccbc26b3fad4a78c89d65146375ca2eb3fd9be7ec53aca405b83f1419a7306ea042dd9fafb9005c3d1e5a840516dcb2b1d6a18747277da812caf2b467e1cfebbccf84ecc72296254c772317ded911ec1eba30f651e2ef0540e31a42b9016d7171adeef8a13010af1c2875ca3f513ca5e340ffdc37742baa305c9e1661362e7c22ea0876f1dfa8fb77abf32a15e872db280d33167ad5b5160d2347d4fde9fb9c1dcfc69cfc69b2751839006e7d6ff35f0f3c10ba1e555f10ddcfa3bbe2cd91d21c79bd2f6663750"]}, @typed={0x14, 0x12, 0x0, 0x0, @ipv6=@mcast1}]}, 0x270}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 19:58:29 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 87) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) 19:58:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x8, @ipv4={'\x00', '\xff\xff', @empty}, 0x3400}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r3 = dup2(r0, r1) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:58:30 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xfff7ffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:30 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3481.673437] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 19:58:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xb3fcdd9d00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3481.686226] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3481.715173] FAULT_INJECTION: forcing a failure. [ 3481.715173] name failslab, interval 1, probability 0, space 0, times 0 [ 3481.717857] CPU: 0 PID: 18723 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3481.719238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3481.720982] Call Trace: [ 3481.721511] dump_stack+0x107/0x167 [ 3481.722314] should_fail.cold+0x5/0xa [ 3481.723070] ? percpu_ref_init+0xd8/0x3d0 [ 3481.723937] should_failslab+0x5/0x20 [ 3481.724731] kmem_cache_alloc_trace+0x55/0x360 [ 3481.725728] ? part_alignment_offset_show+0x220/0x220 [ 3481.726773] percpu_ref_init+0xd8/0x3d0 [ 3481.727581] hd_ref_init+0x22/0x50 [ 3481.728297] __alloc_disk_node+0x17f/0x390 [ 3481.729155] loop_add+0x38c/0x8b0 [ 3481.729869] loop_control_ioctl+0x170/0x480 [ 3481.730736] ? loop_lookup+0x1d0/0x1d0 [ 3481.731531] ? selinux_file_ioctl+0xb1/0x260 [ 3481.732423] ? loop_lookup+0x1d0/0x1d0 [ 3481.733211] __x64_sys_ioctl+0x19a/0x210 [ 3481.734055] do_syscall_64+0x33/0x40 [ 3481.734806] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3481.735847] RIP: 0033:0x7f3b305e3b19 [ 3481.736604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3481.740318] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3481.741877] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3481.743315] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3481.744756] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3481.746218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3481.747657] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3481.778936] EXT4-fs (loop6): unsupported inode size: 0 [ 3481.780226] EXT4-fs (loop6): blocksize: 2048 [ 3481.785972] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 3481.832150] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3481.881419] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 19:58:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:30 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 88) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3481.925456] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:58:30 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000040)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000240)={0x3, 0xffff, 0x8001, 0x2, 0x40, 0x3}) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r5 = dup2(r0, r1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff}}, './file0\x00'}) accept$packet(r6, &(0x7f0000000140), &(0x7f0000000180)=0x14) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) 19:58:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002080)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/118, 0x76}, {&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000002200)=""/174, 0xae}, {&(0x7f0000000480)=""/171, 0xab}, {&(0x7f0000000040)=""/35, 0x23}, {&(0x7f0000000580)=""/173, 0xad}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x7, &(0x7f0000001700)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0x68}}, {{&(0x7f00000017c0)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000001840)=""/191, 0xbf}, {&(0x7f0000000180)=""/31, 0x1f}], 0x2, &(0x7f0000001940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001980)=@abs, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001a00)=""/8, 0x8}, {&(0x7f0000001a40)=""/112, 0x70}, {&(0x7f0000001ac0)=""/63, 0x3f}, {&(0x7f0000001b00)=""/215, 0xd7}, {&(0x7f0000001c00)=""/187, 0xbb}], 0x5, &(0x7f0000001d40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001d80), 0x6e, &(0x7f0000002040)=[{&(0x7f0000001e00)=""/121, 0x79}, {&(0x7f0000001e80)}, {&(0x7f0000001ec0)=""/111, 0x6f}, {&(0x7f0000001f40)=""/204, 0xcc}], 0x4}}], 0x4, 0x10000, &(0x7f0000002180)={0x0, 0x3938700}) connect$inet6(r3, &(0x7f00000021c0)={0xa, 0x4e22, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, 0x1c) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) r4 = dup2(r0, r1) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) [ 3481.985265] FAULT_INJECTION: forcing a failure. [ 3481.985265] name failslab, interval 1, probability 0, space 0, times 0 [ 3481.987867] CPU: 0 PID: 18762 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3481.989302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3481.991068] Call Trace: [ 3481.991612] dump_stack+0x107/0x167 [ 3481.992362] should_fail.cold+0x5/0xa [ 3481.993134] ? create_object.isra.0+0x3a/0xa20 [ 3481.994081] should_failslab+0x5/0x20 [ 3481.994861] kmem_cache_alloc+0x5b/0x360 [ 3481.995705] create_object.isra.0+0x3a/0xa20 [ 3481.996601] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3481.997657] kmem_cache_alloc_trace+0x151/0x360 [ 3481.998607] ? part_alignment_offset_show+0x220/0x220 [ 3481.999664] percpu_ref_init+0xd8/0x3d0 [ 3482.000481] hd_ref_init+0x22/0x50 [ 3482.001197] __alloc_disk_node+0x17f/0x390 [ 3482.002080] loop_add+0x38c/0x8b0 [ 3482.002835] loop_control_ioctl+0x170/0x480 [ 3482.003860] ? loop_lookup+0x1d0/0x1d0 [ 3482.004707] ? selinux_file_ioctl+0xb1/0x260 [ 3482.005663] ? loop_lookup+0x1d0/0x1d0 [ 3482.006474] __x64_sys_ioctl+0x19a/0x210 [ 3482.007316] do_syscall_64+0x33/0x40 [ 3482.008076] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3482.009114] RIP: 0033:0x7f3b305e3b19 [ 3482.009897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3482.013673] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3482.015208] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3482.016649] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3482.018114] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3482.019552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3482.020998] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 19:58:30 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat$incfs(r0, 0x0, 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x12000440) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) 19:58:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000340)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x179) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000440) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xffffffff00000000) syz_open_dev$tty1(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) [ 3482.175886] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 3482.180173] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 3482.194685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3482.222595] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 19:58:30 executing program 0: socket$netlink(0x10, 0x3, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x1c, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x88}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (fail_nth: 89) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)=0x1) r1 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0xc2083) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x19}}, './file0\x00'}) [ 3482.290626] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 3482.347997] FAULT_INJECTION: forcing a failure. [ 3482.347997] name failslab, interval 1, probability 0, space 0, times 0 [ 3482.350746] CPU: 0 PID: 18789 Comm: syz-executor.0 Not tainted 5.10.158 #1 [ 3482.352109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3482.353796] Call Trace: [ 3482.354326] dump_stack+0x107/0x167 [ 3482.355045] should_fail.cold+0x5/0xa [ 3482.355797] ? rand_initialize_disk+0x46/0xa9 [ 3482.356682] should_failslab+0x5/0x20 [ 3482.357435] kmem_cache_alloc_trace+0x55/0x360 [ 3482.358364] rand_initialize_disk+0x46/0xa9 [ 3482.359218] __alloc_disk_node+0x1ca/0x390 [ 3482.360058] loop_add+0x38c/0x8b0 [ 3482.360749] loop_control_ioctl+0x170/0x480 [ 3482.361609] ? loop_lookup+0x1d0/0x1d0 [ 3482.362385] ? selinux_file_ioctl+0xb1/0x260 [ 3482.363254] ? loop_lookup+0x1d0/0x1d0 [ 3482.364025] __x64_sys_ioctl+0x19a/0x210 [ 3482.364833] do_syscall_64+0x33/0x40 [ 3482.365580] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3482.366593] RIP: 0033:0x7f3b305e3b19 [ 3482.367329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3482.370961] RSP: 002b:00007f3b2db59188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3482.372445] RAX: ffffffffffffffda RBX: 00007f3b306f6f60 RCX: 00007f3b305e3b19 [ 3482.373850] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000005 [ 3482.375243] RBP: 00007f3b2db591d0 R08: 0000000000000000 R09: 0000000000000000 [ 3482.376640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3482.378037] R13: 00007ffe34d3211f R14: 00007f3b2db59300 R15: 0000000000022000 [ 3496.031462] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800e146280 (size 64): comm "syz-executor.0", pid 18723, jiffies 4298148774 (age 21.292s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000d082149e>] disk_expand_part_tbl+0x17c/0x3a0 [<0000000005e651b9>] __alloc_disk_node+0x112/0x390 [<00000000c546cfb1>] loop_add+0x38c/0x8b0 [<0000000024803a20>] loop_control_ioctl+0x170/0x480 [<0000000067ca4806>] __x64_sys_ioctl+0x19a/0x210 [<00000000ba0a109d>] do_syscall_64+0x33/0x40 [<00000000d857cbd1>] entry_SYSCALL_64_after_hwframe+0x61/0xc6 BUG: leak checking failed VM DIAGNOSIS: 19:58:51 Registers: info registers vcpu 0 RAX=ffffffff83e1f810 RBX=ffffffff84e322c0 RCX=ffffffff83e0755c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbd3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f81e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6941794020 CR3=000000000e6f6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=3a29343620657a697328203038323634 XMM03=383120646970202c22302e726f747563 XMM04=2e2e2e2e2e2e2e2e2020303020303020 XMM05=30203030203030203030203030203030 XMM06=73657479622032332074737269662820 XMM07=2e313220656761282034373738343138 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1f810 RBX=ffff88800852b300 RCX=ffffffff83e0755c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbd3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670688 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f81e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff2bea4dc8 CR3=0000000032422000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=00000000ff0000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=78652d7a797322206d6d6f6320200a3a XMM08=0a366378302f313678302b656d617266 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000