000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(r0) 20:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0t\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:56 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) dup2(r0, r0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) close(r0) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0z\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 1: r0 = timerfd_create(0x9, 0x800) ftruncate(r0, 0x5) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x2, @dev={[], 0xd}, 'lo\x00'}}) close(r0) 20:36:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x900000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) accept$netrom(r0, 0x0, &(0x7f0000000000)) r1 = timerfd_create(0x9, 0x0) close(r1) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x03\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xca5, 0x800) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}}, 0x84) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x22801) io_setup(0xc00, &(0x7f0000000040)=0x0) dup3(r4, r1, 0x0) io_submit(r5, 0x1400, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x2}]) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) close(r6) 20:36:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:56 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 20:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x05\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xa00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:56 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r2, 0x30, 0x1, @ib={0x1b, 0x20, 0x4, {"09e26b1540e254680aebdcca0360e35d"}, 0x0, 0x401, 0x2}}}, 0xa0) close(r0) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x06\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:56 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) mq_timedreceive(r1, &(0x7f00000000c0)=""/91, 0x5b, 0xffffffff, &(0x7f0000000140)) 20:36:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:56 executing program 1: r0 = timerfd_create(0x9, 0x80000) read(r0, &(0x7f0000000000)=""/4096, 0x1000) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000001000)) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\a\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xb00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:56 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) rt_sigreturn() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 20:36:56 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\t\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:57 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 20:36:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\n\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xc00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:57 executing program 1: r0 = timerfd_create(0x0, 0x800) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r2, &(0x7f0000000180)=0x4) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000240)) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000200)) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x7, 0x9}, {0x0, 0x5}, {0x1f, 0x20}, {0x1, 0x6102}, {0x5, 0x170}]}) iopl(0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) close(r0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000001c0)={0x1, {0x77359400}, 0x1f, 0x7ff}) 20:36:57 executing program 2: io_setup(0x101, &(0x7f0000000000)=0x0) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0xc00, 0x0) io_cancel(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0xffff, r1, &(0x7f0000000100)="4bcf142d27218ff40667b142f31b3b8b7bde2688766072fa6c2a29be4a3816a7853b4b620df08cf2545aca66e8c0225a9c9fa5a5e8e5ab7684999ae6ce8054c532d1c08a74a7d58564c149479990dd0a37295d29abef10bac1d3d375d2342e8632c4be1a314c07228eda5110a5e391b57eb8188488b7a51927245a6ce0a9537390caaf4e7a2e12dd7c5757014371d4890e06f4b479e478d2fcbc4ee196aa7ac23c6fc40076118056292932f0b5a3912a3277aa1ec9e9580091dfe61c019862e97298f270c36baa880238323fbd2e003664f765d07a64", 0xd6, 0x2, 0x0, 0x2, r2}, &(0x7f0000000280)) recvfrom$ax25(r2, &(0x7f00000002c0)=""/192, 0xc0, 0x2, &(0x7f0000000380)={{0x3, @default, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default, @bcast, @null, @null]}, 0x48) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) 20:36:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\v\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xd00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\f\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\r\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xe00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:57 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = syz_open_dev$usb(&(0x7f00000005c0)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x20000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000840)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000880)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000000940)={&(0x7f0000000600), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=@newtclass={0x2c, 0x28, 0x200, 0x70bd2b, 0x25dfdbfc, {0x0, r2, {0x0, 0x9}, {0xb}, {0x1, 0x1}}, [@TCA_RATE={0x8, 0x5, {0x9, 0x5dab}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4000) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x8000, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20100400}, 0xc, &(0x7f0000000540)={&(0x7f0000000140)={0x3e0, 0x2d, 0x10, 0x70bd2c, 0x25dfdbfb, {0xd}, [@generic="f50d67a1bc1af611fb893585b6d2813c170462430b894875558fa2d38a1290e00fe659a76117640434ad4dee4c26b60e742da4b8e5831ba888845724aa40be00969ca29604825a636aab572cc1f5c3bd2938ecefadadc6fe2ce511616148b4669aa4a344cc064b27cf04102f6a9b096961765277b714b182993c03220edef14e2fc293d4eb802798d7cd4e2cc1d8ddcd", @nested={0x104, 0x56, [@generic="789d04f6e9fde522c34fa79592eae57c6a9751cdb09eadb5ed3a22c672215edcaedc1390f0e6323063f24c59954bdbcfc7008aa5948b66733038a76025215b8e69a1d481a2e00aaa9e840bf3f307a162a17a3f4a810c6a72f1c8ec8414c7c42d5a40768b3723eb40e88aa1bb33989d6342bb5dbee410a90f0a1544a68aac17e2a22d7734633df46f67f96aaf22c7ac247f5dc46ac0a8d00b449f77103be8a4ea1d0a6e0ea8ad7d0154a60c13f7a155031c498b9f488ef542942cf39e4d7eb2c79c1a1c6af5414a99922c70f3db18de41632b3cf8d33189333a5d3e4c466ffaf14809a22610b077c5f774e3b6b326888b4332d05627f2a6ea2204ebebda01", @generic]}, @typed={0x100, 0x7d, @binary="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"}, @typed={0xc, 0x29, @u64=0xffffffffffffb2f0}, @generic, @generic="5255da7981f5b49323079563329e08d75f146027dd8c8bbcfaf10b71b637237e6ab8f81ff92ef240aee226005476578b6025f850f61a5a9a33abac299953cdbcb0ef41253ef49e3e4549aa6c59992dac204268778ee29ab414089af883c81c8f7db8a2349f930338ec1194a46883b69eacf7afe0cfb2ea6dd2e799cf8bfa98c262584f51754b574f6caa3cbd9eef359766187649cffcabd4a96a807013eab61e68c44ee75a0c3e8eaad3aa311e7be437d682092c3e6500ad4355adb1b0b95565f5a3ff", @generic="0b870fca97adf58f390f90e07cc6d8c5cfcf0d62fd2b25ded9f3ac7c695e183fa9d6b78e872c953a9af6c1233a5fe2072969e242accd084df6d8d83153e6b063862635eb59d6a5227ca8ff4b290b02b42f12d1704e045e23e612798625119fa383009fb1a532f9427b"]}, 0x3e0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000040)={0x20, 0x0, 0x7}) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r3) close(r0) 20:36:57 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x0e\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:57 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffa, 0x600043) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x1}}, 0x0, 0x0, r0, 0x0) close(r1) 20:36:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 1: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001480)=0xffffffcc) fdatasync(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x8}}, 0x18) ftruncate(0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x0, 0x1, 0x1001000200000000}) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000, 0x3, &(0x7f0000001200)=[{&(0x7f0000000140)="b6fb068f2c74077a351f6374168662e1db7d5b94ceb919f9bb", 0x19, 0x4}, {0x0}, {&(0x7f00000011c0)}], 0x200002, 0x0) nanosleep(0x0, &(0x7f0000000640)) writev(r0, &(0x7f0000000200), 0x0) r1 = open(&(0x7f0000000700)='./file0\x00', 0x40002, 0x8) write$FUSE_ENTRY(r1, &(0x7f0000000380)={0x90}, 0x90) r2 = open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7ffffff0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) ioprio_get$pid(0x0, 0x0) r3 = timerfd_create(0x9, 0x0) close(r3) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x11\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf86}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000100)=""/172) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x300000, 0x4, 0x0, 0x0, 0xa, 0x88d0, 0x101, 0x40, 0x4, 0x7fff, 0x7, 0x7fffffff}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000001c0)=0x5) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0xac) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) close(r0) 20:36:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xf00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x12\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1722.855360][T23194] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000180)) close(r0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) fsmount(r2, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00%\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x1000000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) [ 1723.122994][T23259] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 20:36:58 executing program 1: r0 = timerfd_create(0x8, 0x800) close(r0) pipe(&(0x7f00000002c0)) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00@\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000000c0)=""/117) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 20:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x1100000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00H\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:58 executing program 2: pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/208) getpeername$llc(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) alarm(0x400000007ffb) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r2 = gettid() fcntl$lock(r1, 0x25, &(0x7f0000000240)={0x3, 0x0, 0x4, 0x1, r2}) 20:36:58 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x4e24, @multicast1}}) 20:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00L\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x1200000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\\\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:58 executing program 1: r0 = timerfd_create(0x3, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10040, 0x0) close(r0) 20:36:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x6, 0x2) close(r0) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:59 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = socket$kcm(0x29, 0x7, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = socket(0x9, 0x5, 0x3) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x80}, 0x8) close(r0) 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00h\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000000)=0x80) sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffffffff8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) fsetxattr$security_evm(r0, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@sha1={0x1, "bb91351ed047c07e88da41e3291db6be36bbc7a6"}, 0x15, 0x3) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000180)=0x2000, 0x4) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfc, 0x40000040}, 0xc) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000240)='security.evm\x00', 0xd) 20:36:59 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x800, 0x0) getsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fspick(r1, &(0x7f0000000000)='./file0\x00', 0x1) close(r0) 20:36:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x2000000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00l\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000000c0)=0x10001) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000000)=""/168) r2 = timerfd_create(0x7, 0x80800) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) close(r2) 20:36:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00t\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:59 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x85a529ef9fc256d3, &(0x7f0000ffc000/0x4000)=nil) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x66b02, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x0) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x2500000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x20000) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(r1, &(0x7f00000001c0)="4f78a2cc05afe4541fd1a62adeabc07d2316fffd57b4b3425a2ae954838748cdcb02a805664590c90e99041121b44386d5112f9513ad388d26347ac957d7e2108869c55d16207c711962ccb2fbfab81754a01515b381abc9e692d0b3677f51bba1e42fcda713aa1c46adeb95f830c5cb9a555ef3a74c164a73375083396a458c6a155cded4616aefeab54e9e5d33e7f21c07794b5bdfc590c9eaf948a845c41e32d1cb05c59a9d7cc3166bccff02c1423bbac08e0fe90d259b38de0c09ece36584f93ca8cc74823d6fe5c22a36d1650820f39fcef54cc8d57303101e1b3e9d1c97536ce2ad1d13708300e33a146c4fc8dc15c61918c1b0bd2beb", 0xfa, 0x7f, &(0x7f0000000140)={r2, r3+30000000}) r4 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f00000000c0)) close(r0) fcntl$setsig(r0, 0xa, 0x6) 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00z\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 1: r0 = timerfd_create(0x9, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) close(r0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x400, 0x800) fanotify_mark(r1, 0x0, 0x40000001, r2, &(0x7f00000000c0)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)={0x7, 0xc, [0x1, 0x9e7, 0x6]}) 20:36:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8200, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000000c0)={[0x294ea1, 0x7fffffff, 0xfffffffffffffff8, 0x5, 0x9, 0x3, 0xfff, 0x1ff, 0x7, 0x8, 0x101, 0x8001, 0x2, 0x7, 0xffff, 0xfa], 0x6000, 0xc201}) 20:36:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x3f00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:36:59 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x9) close(r0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4000, &(0x7f00000002c0)={'trans=unix,', {[{@mmap='mmap'}], [{@obj_user={'obj_user', 0x3d, '/dev/cec#\x00'}}, {@uid_lt={'uid<', r3}}, {@measure='measure'}]}}) 20:36:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = timerfd_create(0x9, 0x0) close(r1) 20:36:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80800) ioctl$sock_ifreq(r1, 0x0, &(0x7f00000001c0)={'hsr0\x00', @ifru_hwaddr=@dev={[], 0x21}}) close(r0) rt_sigsuspend(&(0x7f0000000140)={0x3}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200000, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') 20:36:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:36:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x4000000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:00 executing program 1: r0 = timerfd_create(0x9, 0x80800) close(r0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x50000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000040)={{0x101, 0x4}, 'port1\x00', 0x8, 0x1, 0x0, 0x8, 0x7ff, 0x4, 0x3ff, 0x0, 0x4, 0xfffffffffffffffa}) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000003440)={0x0, 0x400}, &(0x7f0000003480)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000034c0)={0x0, 0xda, "f441ec2511f18584eb195a2e4e439a628ddda56b84da971581a78bb9e24e5a48206045cf0b41ef05b1e9f21927fcaae76de496e84485edda4ecdc929400b7f4cd3b97fad90750a900e0d0820777ae87c9472eca85dad661b81b4072a44d125b0d7c960799926ed054451dd320a94b277ce391a1fe451c1192b35244f7711f68bc0632fee8f0beef0630a9b9b3c3f88192144c1b0ddf69666fe75b52b38d684775a087e678e565a228c597fb7154566063e3af93cfc06f5729cb35289f1ebf1e8baf7f8e37aa87641adaa79c48ec10c558913b699d97798154683"}, &(0x7f00000035c0)=0xe2) sendmsg$inet_sctp(r1, &(0x7f00000036c0)={&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x1a}, 0x7}, 0x1c, &(0x7f00000033c0)=[{&(0x7f0000000100)="6f965388e960fecfc984364715ae634cf557c5cf1a74", 0x16}, {&(0x7f0000000140)="67294c2f9073da4b82f46c6f8f66c901706dc15de61a1fb616c49ebc05669d818254e69255c42ace409d6dbdc0528b4cd8a864a7e1a0cffd32ff5c59621710c10c9e73e5fe77f7a7556d6aed682b46d55f01e42a8338eb5974e69efad5f9fe0635a0c959b52811e7590d58619b2b8c3c4b", 0x71}, {&(0x7f00000001c0)="2c80923e463eed83a135d6cf85336c5c84ad67a5a2eb3549426178bc7881505d5c8e49477237128bd37fce9b7001ac661edaaf6f445945ff32221cfecb7d3470daf2647fee41d45471be6c3f20fbfd8190d78eea12b1e1aba4950e3af7135418aba3b58a8d51b47d68f13ff3918e24e3a10518265cdc9874b8fd66b954e4365ad5826c366236227e3528d342cd955563544b7fe349c3a77c388856e2714b63609ce03cb660490e84304024f4ed91f792b059752c41ba857544d0cd2e7fc90c3ac3fba4b66f61e044371f9d41c6ad9f38e1593bc0c34a0f0664bcc71e9b8aa49b069ea3b2db274301735250d90ef5f4e4c9dfe58911bbbb85132e0b00e8a6e6e08833f00c88121fc698c8328e76147b5743069c929c47ec515108178beee7aa9b865f002c0a290dd1c70927758e815045c1e0f0ff515a5fd4fcb480f39b71def2677dcaf76b8fd4f41a550a94c3c2affcebc4988d57bd615e625ab1d0f81400592d94944a53b5e199081a61a4f55b401e9659c08daa71d71d00902af01cbf42ba06a634158d87ad50a1cd13944f688b42cd396834bf5cc81b5aaa5dd5f8a6e068d20c8c66bf2fcd9f0eaf69fe6b8af545d3ebb3cddccec8f29e8899d40bc747184553bc161ce9feff9e8e3fee3aa3cd2a9dda6a3b0af84a414206e821770ec34d9c2e4e9285926584ecc42e2f47e7ba350fe0ea26a74796d3683c53c146cf53dafee896fc4eaf78c1ebb1af8d55cf383ca5b30130a9f5cfe01823150b36dbbc5cf81204cf91f9a04f6861c9232961cda9137d07569a741776fc0edf877772acd37dad3a64e6f05434cefbbbb59465ca931b78642305c4f07020a79155d93ab5dc7d7d02decc4540039339293704657084069439373589ff23fa80d7d92545b89daddfa132c5bdfdab9ccf2b9af1c9256095b615786fd386e073beccdf1183d9663431b9577593b139d9c7ea7ed1f527703f61f79f18a1da72351dea6012c0a3a0e98876401e904b31e3de7c2b6330abe81d5e7919f3b55db7fd054794d371fea3ac0a11cd722c7680691649b5b7cd7117991b1198562c0f9d0c43a69f7bab4856154b974a6fb5ccc7138c3041533d6204337315d7b6d324bd91b8df2e566209fc384a697192893907ffb564dcb8d5139eb634d2c819a1ff050b308064aecefdd348b730e37ddd768ac84de7ed7c6b5676b362374b20a1756862d9fba45c7a4653c70b84ec36258a88385235086a5492f8e31a109f26b896910baac4171faf01f6e406c14360435ac62c22f6665b758a7a7d9edff28c2492f95f1dc3c60cd0bb8cde5fae800744c8a1357d538fa1c17fc42bccbf1014d7f113938a98e292d14f5504d4ac4a54f93ae28c96c1e0bc52de39f9a91621b1f6ae4cc10ecf98eaa5eab28f527307a0a106ff84109996fc5fb3cbdc153ed0293a47d12bc7ec415c973544242681d1c724cc1e4d7542122a70f11b42c818741838a76b50ad613c089a56a857f08a31c1b5d3c34bd1a71ad2248ca7d7a3857369ddca7b0de7d7dcea7c23b0cc04c7575b7e26ecc9395fc74c68030cb432ddd72b14b1dfc71c0e2ebdcf45555f495f85fb9963601a1266507394b7eb06c83c2de20505a3ac4e5e6be327b18b0ae7e9a299c708fef3d5ceee79ed581574eb5c5bb878b957d40ca96dd808490727b803c5e2e15960f41ad3572cd764d7054283b444f8b4e848c7d32cca569dfc422dab8b5655db854cbdc29c48025555e93d0ce1d3531c35636370e62575ef8c199adcdbdfafa14a1beca9c16210067f68a4cbe2da278179be50efab19d5c5e8fd956cb464da7321991545bd37840875a61bc59973a296023b37d654d2ce10dba4b908360464698b49ccd9c46db3827406d0097de71f6cd0c892657a8bd0c738b1e870f7a0e05d3492579d8faa5c94bdcbde9d1d846a1c333070d9db7395bf18574b7d4d8cf7dbc46cf85d616c1fd379c8742115592056f519f941bdb27d91ef36703acfb71b0c0459112a1641f7c667bfddaf034498cc132e73397cbc76c0a0cca4cfda392f0282a4bbf926d92f7efc6a5e042467574abc39f0be2fd2722a2be2892fb9d9cf81ec3b7ecf3e815c4f811753cdd144ece7e73011d5e14c49f93a5cab816d252e1a49585ac9cc5cb0ef6d2af98d680071a80068deb3b5911d9de5df1725d326a2c8b7f711e0916d999af0b5bca6818c56ee07ac31f7d88e86d90c4a52661a92ae852299fd1792a6b0080a84badbba2cb2b02a991965c46a576511c67ad8aa1eed1ef1e1622862da3f9ca44ef0b89932e8b188fc7e98fa27dfa1b8e44daf6441518869a97282044b65b102e170bf958534622b72cd3566fbc2c82b6952a6e2cb2ce3a1c6c01314e13e256892bce3a3ac82971aec30ed159365a7926c86350a816a85964d8e3b86e5c08275d3aa7bfaeeea0eca9eb3eab7f51e85dd46c9e4ffbdcab864cfa04032c4895d31f41fb711bfde722d3b99e9b26633e75a6800f566984cebdbbcfeff4ecea45e6d25b90739e5de86ee5502c8a2d5a5b817262ebe6f4a59d19d1a3b35df8cf6f4a22862cb6acbda8b117ecb3eaae80a96dd1e6048fcd768db3ac46ece40dae4dcc34a56343a6dafe4e98609e43d07963d21a56095ba69cefdcb1642dac7d471d7ceb6925cb2d1a066dc41d10e42389f27993abba41d74a5094a9e423bd07e2f5547d4aae72306d753c4a17fc654d25c4055bce9a7c4f9eec0acf84b92a21a7e36cefb73d08d0138fdac342c3b9fe5a977d65003b484840ab72a7189c098712722727109a4ba759d9eb506276aaf1ca4d8dac150f708f1caaf7ac2fc1556d7c9984d5268df3d1f13c0d15d105ef3af557994a22eee6e2dcce3cb3e65b02ba92c9aa737180339ff65601a4ff67bbcc58f452b11f5944069e8602baa4e28a1d253a222762a5226c795160b8dd96a0751b721d72c571ca5394cc7c68f4e09c007378cad30ec318ce9bf4f0c4c99501a89d41f396ecbc3596887f83c4350d640edf703681b32c9962b12ce65a9caf86ce57257b6e5dc6583559a575eee22627bdcd390dd56e13c317362adb57c961aca56573ca0993bc479d18cfaedc1b9126d05db67c40f97a4d477aa185ac55d10fdfa8090fd48d41dee7a2029de0e5d8f16de814ec5c6099de66c3593b3a80a83e77713e006c0206ee60cfd074728882bb614cda7b94b80e57d3d54f62148f76210189ff402a0f84aab6a03b5879271244032d4be0c5085d29bf1c5e7cffc2c7a439050bf062e6d2285a485fbada98a7d617c480518d58def832b77b2ffde94061dc05731e8ec5b2a0ff17ff9e5abce0b2e91afe916f7e368db83ac7a026078006ff3ee91f4ae2553cad9d49a0c0b4be81fbee84145f27505a837ef764d3e0bf3abe5a50f2996daa214f0fdb0e9a1dfa98562da147f18b146305ee1abd6292ccc4b8672b1af3d9ede14994f9d72234ad6f5af331b86f7ce753229b57580f7a6f6190342fd0d25a5520da275752f9ca024e56fd14e4790a586ef8fe1fd6baf1c9fc8b5061a88816b26118c758031f5e4da0216cd5ab5b0a74374be60c2a8c6eeddfe13542263a3f245df6cfd01ee6ddb9a7d8f4f6ef07571854ce367afeab3ce1009e9a9ab0f0f040a57a5a8ef5859bcc4ec6bb3c33010d2279723423b01d5133999065522c668cd96e14ddaf274fbf3eadde758a58350cc984a23b15157f50ac2bb840a438b45e55296a76678b96810a4aa9c8d96c90cb15f532f39efe9028708adaf0313533a87b66e90981a219c66adc5ff88c88654e80069a906083ec20be7fb3c84b141d63556807d26a83a2432ecd382121fe19b6f2bc7d3e85be90c74645fc9ce6c8a52ba27deba21f1b9d1cde6e41107aa183fef3b7e2070da1ff9950c0957c6873423f529dc89e73feb8d12987c9c46e3706abd9d9a74392bfdc70faf315a536df4f074211501b84d8362d85ce3da7a1932fb47c6bc8a8557c74b7ed994fd204db6c49360006d0d46be4743e4ef8b376f7219acea768c385c9763dca43cff4cb983517eb933952a8a638a00c94e66ad0e6d474e4bd33643fc3b6c5e04037cdc5b467c9b77034dd938e3c91a4af490421694111780445b8e3674e6e25435fb5b94c4362f3704d82ae798747fe884f6b41ce9e1290ae1e64397f8b5a2846d1d3071b5e17ef8f1e9a3ebb40dce3978ab269aa8243f10da2cf72908b325a2dfc21406cd07ee39049c6df56635f49323480a145f0057635ecd306f30c4c479cc8a213141f2e2032b7bd05a7cffa31a6fe36c46a0e5692687bd34bd69185a5d1eee4df5210f48d136e911ac4f479d045f6475d964c266a74aca7639442a58f25f26d7873ed74d54683100b4f4676f6349654c67dd5c4b82efe26a79f6dbe70c9af5a5c0f0de40be76ec0d69517c3ddfbb0a59016a2b95f3779357d3505168ffdca28910b1608c2eb7d137316a1706dc9452eacdd1b701e85b6bfdc4ecb2d924339e3c5226981b6e25ec4ae78f31abcec0e8bf8ca4965ec75a46132cbcabad19eed9187a84b7770a57bbd9b793eca07f6cc5c3b4c2817ac81ca33afae0becf89bd83efb1e08e77d5b841a5b1911957d03f6d58de137f6641683e8b57f7ee3da242275b5e4ee6b6c6f4f7e7510b96728a785453a78529f24bad32830e1c87e69f57f395ad1cd53ce9a3ad666ee29c052ee0300e2e90903a0fa51f45fbb8c3acfdcd2ed0ff2b1fe944616bbc2f0a11103d0467d1efc72e13cb74d90c1fae8a7479ba0fed808bd385280cd6225607097363a8e1d9162aae7bda32b0180a31612b6e390e784ef2df4caaf430e1db3529ad4bd956bbbb0bf92649b83c29fe7de8f09ad9b4a0a1926417025668b1bb0c3097c9af6b0dae6bd28292fb5e49e24b6cd5e8cd0da243dd2350925d85d077b7bd74fb809be886c1d3024b419bb71424f2f0a3fc492109305df97e16f6db1ec4fb08c31a009983c2f70fbb3147771997736d8ccc9b021c1443b76a1a932623cb77d6c298f743453f78f097ac378fe007ae1bdfa7a9c508890422e434501d381beac15e4b7d8e3ed25ce616169bd66e22083ee4f0f537dc367fc93fab1314ac30ad57d045d8422fff8383481292daecf4cf8bddc8259812e1a9323f474533881e52a4e35c26558d66f4f90ce640948b6e61669152f5d6fb257380b1c4445d6752cf668ad3afe7dd11588696746b6925058e1c0d71b1defa93594e8f7ab8f11e66ec4b3900251c7dfddee706e5c1e2a896f43c32bf552cfe8dab90f97e09c89b5e884b91f2270f0c6e7216c726b45921c91fbd509e0aac9ae74e01ba1c78cd212c2ace84f5e616f2c1324654e913bac8d09d203c615652c01bde6635a87c2f064b42422e758b27a7b3730a11b12ebfe3ce7991c49cb171c8fcb682485385ef23cca72e87a56b5e888904cd3f876f4bfef6ea747fe23a2e6ecc4a319e57bb4c688779d97e5249d34b5c9dc1327e376a0c9a6e5099f8a1379016b6497840f9e4e683665903321bcd1d3cd4f5df71ca53501005f2fbd6f1d47263a3de9dba4caf7627748f47c26024678b608225d10a3f152bffcc34b8a3ae13fcfb9de802309b743716cc217443a0a529a624c26987d8a0a8da660549eea6a7508306f4dd0717e9b10a57e413986c57ad0886c3aa9714f9fc8af7849f6a7501ebba1d0bf707908f4b766a97a75ac5b8930d97b9f646774a0a1cc5a8399688a957d8359cbd9acfc7f86866d0a86f04bd929e706293f25f7a72212a0f3b17cf04ca0305689782a576a0437511608438339bff01c4e40b9a1415bc4a2ad1c6758ee6", 0x1000}, {&(0x7f00000011c0)="35638d0ffaffae8e7f7cbef166db0563e6ced5e4dbf506a5195465e88e1308dcc5a45a36837030e9903ce67608074df6b0cfdaeb949e4600adf82357215eb82a308e036f3bd1643d786530a6ce49b9f53891bad17f6659803cfa3d5ae7549f2e38e5b670c382cf120cfad3ae968043af7adc1d9043c2f394460c55824f5be56c089d10f7f24cbdc22c9f7c0d9c4a90ec357193864a179caadaea9391ca2dba4a0707fe67c86314ca338747875a72519176612c961e6884dc4886555911e19d1272e864dd375556c6ce561385873fdf1a5d9f4265bb349a2625d46e91692398ef6c5b8d", 0xe3}, {&(0x7f00000012c0)="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", 0x1000}, {&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="03636638ba7ef7152638a2ebd4c5f01165ecefafa055", 0x16}, {&(0x7f0000003300)="4b4245e5b907c1289cc7a2a6653618c1e6ccb817d04f426e53b52810d3d1596f64f11d97221aee2be815d06346156e6c9f8725d0be425ac4bdb2deb59e5a02dc6449155a80b8dec3f418031548fc2c11443cb7e88da35ad7d5ad859e84f39f3d52f6416163593f7599e9de4e825486a57fef5a2f32dc5a3caf6050dcc989385c4924242e2a7a9827e48b", 0x8a}], 0x8, &(0x7f0000003600)=[@dstaddrv6={0x20, 0x84, 0x8, @loopback}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x8, 0x2, 0x9, r2}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x8}}, @sndrcv={0x30, 0x84, 0x1, {0xc7e8, 0x4, 0x8000, 0x0, 0x6, 0x8, 0x2a0e0a38, 0x4, r3}}], 0x88, 0x4000}, 0x20004000) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') write$P9_RLINK(r1, &(0x7f0000000200)={0x7, 0x47, 0x2}, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x0, 0x7fa4b084, "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", 0x4d, 0x0, 0x6, 0x93, 0x9, 0x64c7, 0x2, 0x1}, r2}}, 0x120) ioctl$TCFLSH(r1, 0x540b, 0x0) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x5c00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:00 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x80000) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x81, 0x2000) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x5c, r2, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="b48e9cadac0af0cfbacb22ac7e37c2f3"}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x5c}, 0x1, 0x0, 0x0, 0x81}, 0x11) ftruncate(r0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) r3 = timerfd_create(0x9, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000200)) close(r3) 20:37:00 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 2: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) fremovexattr(r0, &(0x7f0000000180)=@random={'trusted.', 'GPLvmnet0\x00'}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0xc, &(0x7f0000000000)='ppp0trusted\x00'}, 0x30) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xfffffffffffffffd, 0x2, 0x13, 0x75, 0x0, 0x9, 0x10000, 0xc, 0x0, 0x20, 0x7, 0x1, 0x5, 0x9, 0x5, 0x1, 0xfffffffffffffe01, 0x3, 0xff, 0xa9d8, 0x4, 0xfffffffffffff2a3, 0x9, 0x6, 0x5, 0x4, 0x81, 0x1, 0x800, 0x563a, 0x20, 0xf7, 0x9, 0x500000000, 0x0, 0x80, 0x0, 0x7, 0x4, @perf_config_ext={0x6, 0xffffffffffffffe0}, 0x20000, 0xffff, 0x4, 0x6, 0x9, 0x7, 0x7f}, r2, 0x0, r1, 0xa) 20:37:00 executing program 1: r0 = timerfd_create(0x9, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040)=0xffffffffffffffff, 0x4) close(r0) 20:37:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x8000000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) recvmsg(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000080)=""/175, 0xaf}, {&(0x7f0000000140)=""/243, 0xf3}, {&(0x7f0000000240)=""/116, 0x74}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001300)=""/61, 0x3d}, 0x20) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001380)) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xb4c7a764e4f11a16, 0x0) r0 = pkey_alloc(0x0, 0x1) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, r0) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 1: r0 = timerfd_create(0x3, 0x80000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0x200000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="040025bd7000fedbdf250100000000000b000000000c001473797a31000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4000) close(r0) 20:37:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xc000000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:00 executing program 1: timerfd_create(0x9, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x800) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x101000) close(r0) 20:37:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:37:00 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xdbf, 0x408001) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x0, 0x3, 0x23, &(0x7f0000ffe000/0x2000)=nil, 0x101}) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCEXCL(r2, 0x540c) close(r0) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:01 executing program 1: r0 = timerfd_create(0x6, 0x800) close(r0) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xe5ffffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:01 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x2800, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r2, 0x400, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) close(r0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x80) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r2, 0x10, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0xc000) r4 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f00000000c0)={{0x9, 0x5, 0x8, 0x0, '\x00', 0xd0}, 0x5, 0x100, 0x1, r4, 0x7, 0x8, 'syz0\x00', &(0x7f0000000040)=['\v-+-\x00', '-\x00', 'securitybdev!%vboxnet1)\\\x00', 'cgroup@system/\x00', 'md5sum[\x00', 'ppp0md5sum\x00', '\x00'], 0x43, [], [0x4, 0x1, 0xcf5b, 0x6]}) 20:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@loopback, @loopback, @dev={0xfe, 0x80, [], 0x18}, 0x3c52069e, 0x6, 0x7, 0x400, 0x5, 0x40000, r3}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_names\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000040)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 20:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x38b, 0x32000) ioctl$RTC_PIE_ON(r2, 0x7005) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x100000001, 0x7fffffff, 0x0, 0x6, 0x0, 0x400, 0x21000, 0xd2b888382e9ba5ce, 0xfff, 0x9, 0x9, 0x5, 0x9a6b, 0xffffffff7fffffff, 0x1, 0xadbb, 0x0, 0x9, 0x6, 0x8, 0x10000, 0xc68, 0x4d5, 0x1, 0x9, 0x6, 0x1, 0x8d1, 0x1, 0x5728, 0x66b8, 0x200, 0x80000000, 0x0, 0x5, 0x7fff, 0x0, 0xff, 0x6, @perf_config_ext={0xabd9, 0x7}, 0x10, 0x0, 0x9ce, 0x9, 0x1, 0x5178}, r1, 0xf, 0xffffffffffffffff, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0xffff, 0x3, 0x3f, 0x1, 0x9, 0x2, 0x3, {0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x1, 0x3, 0x1, 0xffff}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000380)={0x6, 0x208, 0x80, 0xc1, r3}, &(0x7f00000003c0)=0x10) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x0, 0x4000) 20:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:01 executing program 1: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10, 0x80000) pwrite64(r0, &(0x7f0000000140)="9dce0583526495aaa1f4abb00494bbef3ca17ebfcd06a66cf1e5cb9d687fdc94c38f962dbce4e1917f7476e48433d15332a14e6ce05c1ad2747c64e3d8946148c9dd4e52b9fa9c1b10514ec29e035c055d6d2ce9b8151ef89e74151d8232a909a007da6f5d429e1400357b54b7619f0a4a1528cdfd5b0c2e3355f842b90df34eb1aaa273c0606be3f767109f9f7d317b709697e18ed9532aa20eef325ceddea9e195cffbf652f9212816f419e26cf3a27bca8775add6901908357f33119fb8655e45ce1224", 0xc5, 0x0) r1 = timerfd_create(0x9, 0x0) close(r1) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x2) 20:37:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xfeffffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x208001, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) r1 = timerfd_create(0x9, 0x0) close(r1) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x4) close(r0) 20:37:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xff00000000000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:01 executing program 1: r0 = timerfd_create(0x8, 0x80000) close(r0) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x2) getsockname$netrom(r1, &(0x7f0000000100)={{0x3, @null}, [@netrom, @remote, @remote, @null, @default, @netrom, @rose, @netrom]}, &(0x7f0000000180)=0x48) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace(0x11, r2) close(r0) 20:37:01 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x7, 0x4) 20:37:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xfffdffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:02 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x40000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x80000000) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 20:37:02 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80040, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) close(r0) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:02 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000100)) 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xf9a61f79c52d920b, 0x20010, 0xffffffffffffffff, 0x100000000) prctl$PR_GET_TIMERSLACK(0x1e) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x3, {0x8}}, 0x18) 20:37:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xffffffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:02 executing program 1: r0 = timerfd_create(0xf, 0x800) close(r0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffa2f, 0x80040) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000040)={0x6, 0x34363248, 0x2, @stepwise={0x7, 0x2, 0x1, 0x7, 0x4, 0x3}}) ioctl$VT_RELDISP(r1, 0x5605) 20:37:02 executing program 2: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000002c0)="3d3b615192f560eb947eebc1db73e7fdcf353c44471211789a15766d676c568ff9eb5b331ea6b6444f58411bb9e36beee95691e475669a0fa17547ffbb9ca7a9d57114b0520283b4dc970f59b480fda758538136e7cf42d242be7784f909bb8c0a764023a25cf4422c731f6f7e32dd3804afea03caa323f1862500a730aab9cc5d0524dcfef3d5368b7076c425b7fb8ec46bb20ca522d8fe20a6a4929986ce67013baae49e12d3658a59138e11d814e814350ea1f1230bce9bdfbd2ece2a4c2420fc3afb24dfaf71edb12598727bd1b6187915612b46e1e2106837bfadb5f95dd2", 0xe1, r0}, 0x68) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="e80006fba7d5b2426063c489b1feeb6573ef98fe5025085d1809e50583bdf26d734c2d6089f29d059c9255c1bcff1a4e63ce9c8d053d327f2942ec2636f6051cde054a53ee23f6b89316552c8365444c2177206f60a53533706e03da61d724768d2142f9a30abe637e5a6bb85d5f0e5102c258b503935a4009a880d011216d44d8771b8a1ca5ed9fc4f21e6f2010aa127e5d376b958d75e785fc944ed6f8c1a8c32b465e61b125b61533413f9b07a98cff89e17be80c899e01032490d2e5d0f4434ca887f8d5653d445530196ea1", @ANYRES16=r2, @ANYBLOB="040025bd7000fbdbdf250e0000001c000300080007004e230000080003000100000008000500ac1414aa0c000100080005000200000008000400010000003000010008000200ff00000008000b00736970000c0006006c626c6300000000080001000a00000008000b007369700008000600040000002400020008000600ffffff7f08000700090000000800050000000080080002004e22000048000100080004004e200000080001000a0000200800050001000000080006007772720008000b0073697000080009000100000008000800400800000c0007000200000000000000"], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400100, 0x0) write$binfmt_script(r1, &(0x7f0000000600)={'#! ', './file0', [{0x20, 'selinux!!GPLlo({md5sum^posix_acl_access'}, {0x20, '^'}, {}, {0x20, 'IPVS\x00'}, {0x20, '/dev/snd/pcmC#D#c\x00'}, {}, {0x20, '/dev/snd/pcmC#D#c\x00'}, {0x20, 'wlan0'}, {0x20, '/dev/mixer\x00'}], 0xa, "8f8916e09b8701fb50ec67068dd7add48e5a5e0980ef50609f4a950669c3af80d7606e5985edc59703fbe2b0717cb24c8ffa0c72776f87c87740bc9e137d117819d678b5c1e564e5324a7c29"}, 0xc1) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:02 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x42f1e175, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x9, 0x8, 0x100, 0x626, r1}, 0x10) r2 = timerfd_create(0x9, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0xc2) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "c7e7d3dff79a21d0", "e6c4ccf7bd2be9ebd9e290e9384a34f7", "cd2afddb", "23bfb4c3b2856fce"}, 0x28) r4 = shmget(0x1, 0x1000, 0x800, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/92) close(r2) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x1, 0xc, 0x1}) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f0000000000)="77f10b0a059457274b70c0a67e59647755d26e754217adc02fe1d8f56eaf11a6589b1044d86e0446a43f82f5e9e519e879991d7ca03808dd1944ad77a62a9911753928") 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f00000002c0)={0x100, 0x8000, 0x0, 0x7, 0x100}) close(r0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xc0) ioctl$TCSBRKP(r2, 0x5425, 0x8) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000001c0)={r3, 0x3}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) sendto$llc(r2, &(0x7f0000000040)="46176f3386d95f540d002362dd574ffb0bccbeac1e4da873276db3d766031c82937b3b353ca7ffe1c121689a7e3b4a8a27097f49b4cfe45262b5acac9235c2b55400490ba91f0be4049c88b3f0215e198b663336f43ec826349efe387e28d2d50959412fdb4e4ff50a7df4fa2b79e8b0464fcd4da007fa2ea734679d3cd08bf7b4f773337313ab94767408bb96cfe77b4d415324759f1d43a4f1306e999cf29c8096d4abcd422ed8b2d46705936a187b38cf48ac75adbee5da30cb84e55475c9f96a7a38e8d81eff9360332be1140ba742387230602835d5244a9027e3900a827c053f", 0xe3, 0x4008005, &(0x7f0000000140)={0x1a, 0x30b, 0x2, 0x20, 0x10c00, 0x40, @local}, 0x10) 20:37:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) close(r0) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='}\x00', 0x2, 0x3) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:02 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) 20:37:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:03 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x90400, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x1) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r0, r1, r1], 0x3) 20:37:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x80080, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x0, {0xa, 0x4e23, 0xfffffffffffffffe, @empty, 0x9c}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) close(r0) 20:37:03 executing program 1: r0 = timerfd_create(0x9, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xe8280, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xb15}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}}}, 0x84) accept4$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0xa, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fffffff}, [@exit, @call={0x85, 0x0, 0x0, 0x4b}, @jmp={0x5, 0x40, 0x1, 0xa, 0x1, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x237}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000280)='GPL\x00', 0xfffffffffffff3f8, 0x9e, &(0x7f00000002c0)=""/158, 0x41000, 0x5, [], r4, 0x12, r2, 0x8, &(0x7f0000000400)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x0, 0x0, 0x9}, 0x10}, 0x70) syz_open_procfs(r1, &(0x7f0000000040)='maps\x00') close(r0) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000500)={0x6, "2a09d697390790f9d5a00e47cc017c72e116a03b1ed9db48bfe499bfd4312d80", 0x3, 0x1}) 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 1: r0 = timerfd_create(0x9, 0x80800) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x10000) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x72) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000140)={0x1, 0x0, 0x1, 0x1, {0x1f, 0x4, 0x200, 0x8}}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000080)={0x1}) close(r0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x40, 0x6, 0x1, 0x0, 0x0, [{r1, 0x0, 0x7}]}) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f00000000c0)=0x6bcc) 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x6, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000100)={0x5e, @dev={0xac, 0x14, 0x14, 0x2a}, 0x4e22, 0x2, 'lblcr\x00', 0x4, 0xfffffffffffffffa, 0x73}, 0x2c) 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380), 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0xd, 0x1, 0xffffffffb370f388, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}, 0x20) write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:03 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r1 = timerfd_create(0x9, 0x80800) getsockname$tipc(r0, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10) close(r1) 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 1: r0 = timerfd_create(0x9, 0x0) ioctl(r0, 0x1, &(0x7f0000000000)="e00942c9dbaa7902199b6c1a65fe5ee381a0b6fd26fff782cd0e004beca12da0e9a81b1dbbb47c709032aac6fa71cc0cea1dd14ebeacb4e766787046092c35289002b0affed92c231030e8") r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PDEATHSIG(0x15, 0x0) r3 = socket(0x9, 0x589e9c9fe4e66f90, 0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000140)={0x0, 0xffff}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000001c0)={r4, 0x2}, 0x8) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f00000000c0)={'bcsh0\x00', 0x3}) [ 1728.077060][T31101] FAT-fs (loop5): bogus number of reserved sectors 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x200000) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000000c0)=0x210020, 0x4) close(r0) [ 1728.134024][T31101] FAT-fs (loop5): Can't find a valid FAT filesystem 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)=0x0) sched_getattr(r2, &(0x7f0000000280)={0x30}, 0x30, 0x0) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="64fbb2bdcc470e140fd318ec4d91400473ecc473a95eb50f67f7", 0x1a, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000140)="3649420bab29b66bf952b47a29698a5797c2310752c0010ef5c97c94a57fa1790d83068a68bf0ac1314fd9c6fed45a09119affa5e9f1a884bf4a7e1b269c4c57047129d444e106da7483dacddd32f252f652847983aa8959bb2acc18ee1668db516ccd5f9c3f0d49e229f6886c92c8d0d8fe72db3643de52abe596fa50002219327242f094ca465c1a81e04722ba1eec6c29b081b76c17a50a2e73a05e890d1569500b9798f55680b74714aac105570127afdcdae93f3d0820052bc24f6a94c07efbe3c25ad1faa6c3cb4290d56a476228ed269a400d03ac4144749057442a5c16c1", 0xe2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x1f) 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000140)=[0xffffffffffffffff]) r5 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010003000000000002000200", @ANYRES32=r1, @ANYBLOB="02000700", @ANYRES32=r2, @ANYBLOB="040004000000000008000200", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="d0002000", @ANYRES32=r5, @ANYBLOB="10000400000000002000020000000000"], 0x4c, 0x2) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:03 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x703c91c1caf659d9, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x100000001) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x20) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000000c0)=[r1, r1], 0x2) 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x40, 0x400000) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') r1 = timerfd_create(0x2, 0x80000) close(r1) 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:03 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = dup2(r0, r0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000000)={0x1000, 0x2}) 20:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mlockall(0x7) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x7fff, 0x93260f89fe40901d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e22, 0x6, @rand_addr="4348baa4252f450713caa9095dc4e693", 0x4}}, 0x1b, 0xd1, 0x2, 0xffffffffffffffff, 0x40}, &(0x7f0000000580)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000005c0)={r2, 0x2, 0x100000000, 0x3f}, 0x10) write$P9_RSYMLINK(r1, &(0x7f0000000500)={0x14, 0x11, 0x1, {0xe8, 0x0, 0x8}}, 0x14) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x80000, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18000080}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x248}, 0x1, 0x0, 0x0, 0x20040000}, 0x5) bind$bt_sco(r3, &(0x7f0000000540)={0x1f, {0x3, 0x8, 0xfffffffffffffff9, 0x8, 0x100000000, 0x31}}, 0x8) fsetxattr$security_selinux(r3, &(0x7f00000003c0)='security.selinux\x00', &(0x7f00000004c0)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x2) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={r2, 0x4000000000000000, 0x4, 0x9, 0x0, 0x100, 0x5, 0x82a8, {r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x4, 0x2, 0xcf, 0x2}}, &(0x7f0000000300)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0x1, 0x6, 0x3, 0x5, r4}, &(0x7f0000000380)=0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xd8000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f00000000c0)=0x90000, 0x4) 20:37:04 executing program 1: r0 = timerfd_create(0x0, 0x800) close(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r2 = dup(r0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000000)='syz1\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) socket$nl_crypto(0x10, 0x3, 0x15) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 1: r0 = timerfd_create(0x3, 0x0) close(r0) 20:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) 20:37:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x3, @empty, 'syz_tun\x00'}}, 0x1e) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 1: r0 = timerfd_create(0x9, 0x800) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x4000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000010c0)=0x0) r3 = fcntl$getown(r1, 0x9) sendmsg$nl_netfilter(r1, &(0x7f0000001380)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001340)={&(0x7f0000001100)={0x208, 0x12, 0x9, 0x20, 0x70bd28, 0x25dfdbfd, {0x1, 0x0, 0x3}, [@generic="9551d0c3ff92cb08b92f1368590a3749c4ddfbf1d90515f0aa9025eb11b9132b511ef8da083bad74ed8acd54aac097010f4d87ed2f461f7c0190164e555e5793490b90a3c291b19f11a5ab76d74583079a2a05fd5b01f8117d72df92a04dfcf5b9d14ee8dab8b53ecdfa4231ef0f57e21403a55d6520e98c858494d83bb6387da75074bce2353f83418f8ab4367d84f884af7012fcf7f236ef3bc4d3a0ab0d409b40d46dc11a16acdfd18f6500f9cae5333e9b5d69949fdfcd83e1870916617019cbb2e3522eda2db1b948c10089db680c", @nested={0x7c, 0x68, [@generic="beb506f126235cda4d64", @typed={0x14, 0x12, @binary="042e0e6f371055ed04a4f2dab1348b0e"}, @generic="d7d01aba9d5dd599fb44fc254e189b271f570725c7f64b334de9ea144c14289379a39c472b5e73f92aa465b50ebd40348d9f4dec466a9e", @generic="a884370a94197076b56bf59205e279ffacda38bfc87a106607", @typed={0x8, 0x7e, @pid=r2}]}, @nested={0xa4, 0x3c, [@typed={0x8, 0x0, @fd=r1}, @generic="254b17f3548011d5911654c399d180fbf8e402f62aeacc62b4d9256786c96128401a4db227fff3e2786f2b37529e85b0a4bddfc3b3df02e3f72702d9c7b5124f40defea3134e660f473e8ff71791ebb6292f3ba662ecb3dce0e2edd70d485d3786b870217d467a7110f48b41e97dcac44d64961cdc376927b7f213a0d9e7dfb13816e3d992cb0514f0393598f68afd", @typed={0x8, 0x48, @pid=r3}]}]}, 0x208}}, 0x40000) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0x1ff) getrandom(&(0x7f0000000080)=""/4096, 0x1000, 0x1) close(r0) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ioprio_set$pid(0x1, r1, 0xdd1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x84000, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x6, &(0x7f0000000080)=""/54) ioctl$CAPI_INSTALLED(r2, 0x80024322) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x503000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000200)={@remote, r2}, 0x14) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) getpeername$tipc(r3, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10) close(r0) 20:37:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:04 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xf4a, 0x80000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000100)={0x8, {{0xa, 0x4e20, 0x8, @empty, 0x80000000}}}, 0x88) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0xa000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) close(r0) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 1: r0 = timerfd_create(0x9, 0x80000) close(r0) rt_sigaction(0x2f, &(0x7f0000000480)={&(0x7f00000003c0)="c422d13aa059f7ffff8fc9e09a8cab0c000000c402219c4907c4825d474a0e67c8feef7ac441d5df52e88f49c89a644c1e470f1cb3f9ff0000c481075ac1f0460fbabb58d0000000", {0x9}, 0x72e87a918305675f, &(0x7f0000000440)="66420f1abe00000000436f66f30f1a3497f3400f1efc42d341adc4a2fd3125b30000006641afc482652e4b00640f18dd266444d9dc"}, &(0x7f0000000580)={&(0x7f00000004c0)="c4a27d1a54220cc48379619d3adbb8e90636660fe2fbc4c3cd7dcd012e660f3821ecf26fc42175fdd0c4a375783600c4617fe60dd0000000f042ff8ddf000000", {}, 0x0, &(0x7f0000000500)="c401115fa85c0400004710fbc461e3d0c6c4637904688e00c4c16f59fa64f3420f5e7cdbecc4a1a77cb065566666420f0fa60000010096c4e1fa116918de9f963535d7"}, 0x8, &(0x7f00000005c0)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)=0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000600)={0x1}, 0x4) r2 = syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0xfffffffffffffffc, 0x101200) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000300)={0x78, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b63000011634840000000000000000000000000000000000000000011000000000000000000000058000000000000001800000000000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="852a62730100000003000000000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a747000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/209], @ANYBLOB="d100000000e800003f0000000500"/24], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"], @ANYBLOB="40000000000000000663044002000000046304400300000007630440020000000f630c400100"/48], 0xc, 0x0, &(0x7f00000002c0)="f45fdc1b33ed8f879a88e700"}) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:04 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x630f2c7c0a5d307e) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x7f, 0x3, 0xffffffff, 0x9, 0x40}) 20:37:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 20:37:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:04 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:04 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) shutdown(r1, 0x1) close(r0) 20:37:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200400, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000000c0)={0x6, 0x8001}) 20:37:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000003c0)=""/252) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x4, 0x40) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x48, 0x2000) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)=""/10) 20:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 1: r0 = timerfd_create(0x9, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) getgroups(0x2, &(0x7f00000003c0)=[0xee01, 0x0]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000400)='\'#eth1\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getgroups(0x2, &(0x7f00000005c0)=[0xee01, 0xffffffffffffffff]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000a80)=0xe8) fstat(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000002080)={0x0, 0x0}) r12 = geteuid() getgroups(0x4, &(0x7f00000020c0)=[0xffffffffffffffff, 0xee00, 0xee00, 0xee00]) r14 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000002200)=0xe8) r16 = getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002640)=0x0) stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)=0x0) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = fcntl$getown(r0, 0x9) getresuid(&(0x7f00000029c0)=0x0, &(0x7f0000002a00), &(0x7f0000002a40)) r25 = getgid() r26 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d80)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000002e80)=0xe8) getresgid(&(0x7f0000002ec0)=0x0, &(0x7f0000002f00), &(0x7f0000002f40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002f80)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f00000030c0)=0xe8) getgroups(0x8, &(0x7f0000003100)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0x0]) r32 = gettid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003200)={0x0, 0x0, 0x0}, &(0x7f0000003240)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000003280)={0x0, 0x0}) r36 = getuid() r37 = getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000032c0)=0x0) lstat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000033c0)=0x0, &(0x7f0000003400), &(0x7f0000003440)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003980)=0x0) r42 = getuid() stat(&(0x7f00000039c0)='./file0\x00', &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000003ac0)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000000c0)="55544d3a84eb6144065905dfb794be7988c0024db52ebfb0a98db6985184633cb0cf50b45f00ee49927910fd7b9ce6e3315ab55db15af93cc935db9e24fa3e7b0f44dfc173e7078b87d148deb03248b232d89d87dbe7a41f503be1475ec41cdcd7e3b594a89a5debd5a92d8d94f778010c94ebab67076a333d2946fdebd9f6eb7555797d8eeb074dfd439eec0ddad9be29cd0e902df994a9fbadd65066d585e7c32e849b387a588fe0ebb0865fa5f973ab749bb617bf1ce7292e05b88b5e2376ed08ccdba2fc7f6b74f8aaacbc38e858c7a213a876a67bb00aad4fe4267c4a3609", 0xe1}, {&(0x7f00000001c0)="1a1df37390b89eb3ac9f5dd48d28fc635487ae934cf8bbeefda7c2c8a61043b1dbe8c2f7f021418e62fb6d5f8434060cfee58ba585e723d5d1c5f917048bae152635a2b3ef4874292fbd7d4f38d9221e5a0b60a7109aa3a65b252743c416f266eb85b8013829de6f6bfd20f9e874c5ed293b1941cc531d44882a112de59ebb2473d82a202100357c5d0b299a237feabf0d9989bda3ba0ad80c501e7f7cde014a91afa10e308c5b57b2b5bba35404d7919627a23c091a6d2a58c2042ce697de3e85ea9af77ebd14c886596abba026a301b8dc00c73de02aaaecad5f007f58e4bdd1", 0xe1}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x78, 0x40}, {&(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000700)="3aca67ec5225553f27a70190454212250b781244bf6425df754d36af49d88a7f209ad232d4d847a399eee7eb71533388d4add7988701c048d969743449c0fbe31c36b3b88675f2334fd9313bb3a48aeb6b430c2a8052f031cae833c64a789eb32a", 0x61}, {&(0x7f0000000780)="1e5ca0743604841fb925290aea335f04728ca236419f56bb4b9b15c8d5716b6dbea165ae6b956a034cc53bcc25ceda275d09c1256a8cbc66103a12c7ebc12a3cd482f55229be4fdce4094d71a77c5fd3657fec2a30ba5bacc0c3786f6f8f403fcc2a7e2203de089219100787f7603421a998dbcc96643e241e54048dee935e292a8e36db49eb17d3ce2cf0a399a92f79a6a9a6c8b8fe1854f445b954175b55ced522fa13b6b140808992959cad338556eaf9e81de637ebb26c2d0509162db9a0a7bad18563a95442ad2f63300407bea8039ad25ea7249cfc12a6f6e7781d2100c8447f0f80b38c938e5520a3f3b6da5914ab9c36f865cc98", 0xf8}, {&(0x7f0000000880)="8c2495227b967e72ea193fae21ef8592e0807d2c9681486ece5ad4c0a89391504a2beb68dc617eb53d5ac18a16c8e525d26b907c447a0fbfe42a4a96b495fb674afdb12a32d912c565796f644efd37dc4fd0052f549497862139c19d8d", 0x5d}], 0x3, &(0x7f0000000b40)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}], 0x20, 0x4000}, {&(0x7f0000000b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002000)=[{&(0x7f0000000c00)="5b0644bf8e271d95a2288b97d9be2c1ca7dae0e91632a0c9866274d4d45ee5d1c9da52847a647f91b2916a295fc8cc1751be0e40a245902fb343388ea7a0", 0x3e}, {&(0x7f0000000c40)="10ee2a3c1b8a8d02dbb7a0bd5f109a87eb049648c4231bfec4c2f32d999e9345a49d076c07549ee9977a98b65b6d5ba32c7f69ebc3def9f611db395e690436d9e2e0bc5de83850eef8f97905b27b52b0016ec9ec07bd41c032fcc61a25f70283efdd22c68fa6cff5d3d7c4c941091f4902b96c420fbe5c854a591fe6d28d09dbaa84ca438f4ead35afc69bea075d22fe4db1350bbc26bde056b28b", 0x9b}, {&(0x7f0000000d00)="506a03b4fdf52c472213aaf87a6599b119be798c9229f6130b600e8b9f7e1d7af4482f6fae0af79fcce4f6c8415f2e44437b30883a11b8e56c718732d908813b8bf00c5acd1447edfb754726ec4444ed26109605d0a67e428824cca272b057280138fa57e90c38a9ce53d2983c1b95341dbcc59f24068606", 0x78}, {&(0x7f0000000d80)="07a74457093f142d94aa5f00c23c70f3097b4845f5f3611bc6971a22b8951e732a1034648ef3b28d266787d1fbcaac623ee1437496bed7809db241c0918c929c275da909b93afbb39b4127942c5a3ed2d9f2ad924219034c345c32474233628429f767bdf8e3795dae55a33b758af5ac83b7ac0b68b0857128f7b55dcffcce2535587c6a858ab880951f046591e76673e803d5057ae12ccc816a3a4fedd138dc901d4dd02a2d5d38884c775440aac0f509f3e97ccfa426224134148367041ae12ea590303373980fc70e5b4b7983f9d3", 0xd0}, {&(0x7f0000000e80)="f9e6cbb34bcb4475e09f4c58dae4ea2df195a8113d108f4f48da054e887e9a1ecb78fa6625dfe4fc1cb6905c826adabf34d4902301852d4b231ba9caec68e1667074b019f516abdcffca499fe4c7ded92d16beceb49f41fb9ab46b27899c8ad8017bdfb2c0cdc8ac1701af0ee4f1e682010731cfc6abdacdcb4e94674a3ce5bdb9a44125ff4ae4054baf2b1e01c6078c4b2588bea053a06486e52ccbdd1cdf53d5189b10f8c7991982346b9cd0e6e221b0414192652d85dfedadbdf4c89e3a0bf7bd358b27498226c1a7511963390228cd07fed109ee48f9e11ee3a50fa0595e56f0733016a5ca5c35b0c5f41a15f0c67785ab4fabed85c462319db3e17d19acee5232c04945d3cb820959daac5e3066974950cf6848c070bc02b2f651554a84de0a53219ecf398563543a13da27fdb899bfc12ad6d3e9dc9be99b8725c4ca0803784fc0ab3b96e631908d30fcc67062a2fc64bc74c22bf2c9fb4091c5d10b22c7542755d48546bf3e22d937c9fb4de10102b4da09a9da0056e65481a6210d7bb61ec3f76eeab160d36dae656ff2803cc6f9b86ebaa9a9e5c888201e277c0e4c823f87a384376ec31c1b039ff5ed5144e2c8ca2837604f6b144ce1cedab12956b76f18c22f176f46717a40591c254844c531b9e827687016531be624f255e7956ae70a4a056620903c148168ce070817563a69d1df6c4906d1c0a67278d1c1fb2e270a1d77a3a2e3935fffc2e93af98431780bb2566849395c696fcdc2af3435e078751d51d283105e8e3b8e876ea21aae0c688ba9eb468dc60d152f1dcd1079873de6e36c0ae86d43a0047db5ca54fb3c76105f88ba97e25fb4896187d3e56a486dafb088b9370b9115541a76affefdb76f65656563d58e99437161b6641a185afc69dabaeda6f6b7e743d7ec81e042504742c47d9c36d57c7d379bcd5059f1b07613ad856586a9af122705e605563c62400e3c42c533097887428d3c80c653c0c27a8bf6ff0d666cc35ac6c0c0332b5ee93fde6d09e53b9405e28a9601e302e80657b8320b6ebcc67f39e7ebf9e233bbf2a5ab9ea6caa77668df5e84ae5bdd2ff24a62987885cb3b3c5c76595af2723d6fba704bfd8290905154c7612345f142660332fbd88f0be1ae82d307c5d7013ddf4a7f0b99cc652f41344b2fe1cdf80b213d7e3174477c3e8b012f440e9388ff328c92d1f1cf4a9ee054e5facf77434d6f3759a45b8519ebb98e36bfb8397cb3993d17f84829f40d430ca570c033dd080b9104349fe938e3d4574b88b31cb3d81b263fada3c941e0536e689bb78ae4baa007ed00138268650aae34623eb2fbed15338770b0574fa5efa3ecd6f1281d908a96e2c18884712c51bf0c888962c755759d8334d100644dc14500e8cd3cea4a22e1adc91f6ab9a8436a517d173ea9fca1741162dcf03744e69e6164f9466472429529e20c6ae7c27a07d54cd6f23da5fa1b81c2e7e49a171c0b372882b1aae15631ea88ba43f40ad1ab70edaa680a22fb4f2b9a6cefe226c7d37528ee5b42e848294fe62c2a087ab0aa035337f8243274f21ceb7a7a183ce4fe7a01060ac2af0a50043574d563aa9da33d20f453a9bb58218ec1ee95e2825a8751e5f4ee1af529b68eea7c59888349d2941412dbe2e970973aef7b2caf45f8047518992da4f0beff924a95100de2e4d02433f0b2c65acaff90a897f5e21def6b360747a8fb689dc5bb40a8bce965f90a1a9cd5efe08df6effb4697171eb49db27570a2a1bcc4be4f5771dac8b84b90993281c80f8d318ce75e4a00f4e736e0de37a2d608ee200f4ffa76e8859f496beb8467ba36a8a5817ed7ef1616e26f050743561229b30020851181d04e515e71e3cbf85cae0f9420359ff36df5d7f9ec5c4172d0ad51107ab482360929b56260afbe6e0b2216348df3c8f5b1d3a0715a0f2fb1ae1428167dd68b947145b555995b57d4f47848316a7a9b01b80466b5fe65046065e59510bf8b1d6651f97690052d8e17bdf52bf93fa9c228b6e289cab8940175e10be60426efc8af36f86b3b47284883ac212dd77d51d08419e0aeee36cacbf3ab3400369224a4ec2db1e19cac252bee40c35c95a6b5be046a9cca2c719f7adad0b3f7eb1ffa249a2fcffaf20be83b298d567ad7ebfdfdfa3b1ca80bbaf935e90bacc92d397ae772cd695af1e414417655d1f5045397bfabce382a8fed58c2758fd8c7333b634060738742342e118fcdb8da7f289da4bae382359c12a372cb983547f83175cefebe5e269e1a643ed959b079a9f2858b175f26406d9b00c113b8b4709458c9b7d5d46098961a79305b05a4ecba2231ff9973790b5dd261d084da859f5a9e6354035545ac0e37606f52afc970089160ea258a5533203e637a567d72ffde73238f90ef52bf5c3a74bbe7386e053d5bf743da43294f354f3ac1294e8e6ed13727818644597c8b4c9273eabf4654f0595820e692810f343c23fd0b1fdc5bb9864c349f3b5ef22013ff05b38cb6b29d688259eaa0c7de14f3f68001d456314739d77d47920b49fe8cdbde2c269bd207942dca227f68af86495d1b1b881e513a92c90fd76767b79d249907f598656f66bd2237a9d877923cdfe7a482326f749f3d77f41595ab3a812dabd5f494a7c2798418d418ffb3455d7ef99ce1af619f9ab842800100e5c68ad9868429cdee5d1516d7a1a6eceb43079b21bd866e2f58eddaa843806ac2ca69cfb52cc9e08894337ad30348714b1ca6fb93a2e2225c1a818245e2212fb30a9680ed21e9629f88336b66eb8541c2f231b649a36d964d961cbb3182d74b89dfa5ceaa91951ec7d7a03bb2c2833e49bf328ab197d44fa5dc65b0e47587378cf8a03969b115c8150855f8300e5c561de7bdd8a8007b95979db6c4574b092198321a5c1b3f04aef68309c48aa7026173ba373556a6d1d75a9c099ab8d2b64f30494b326f89095c4c7ae6e0478813420432e40fc313e2c54b5c5b85b846d2d9a7728548c822cd1089e94c8a3b74ef51b253453b26e0bf004071f0b2fe0046e5680e3742933a12368156a3ed50012bcf381056783248fab8a6b590517918021a742d7736adb18a3e48ae808a7f6226039f5edd0d4281c5fe2880c6a949d2c1a697e9370b396dfb929c050d060e5c42486f21a6964200d99dd234e1fd233cc0e5d9580caae6a5a9128308b84dbacbf65157e6b2069f2f6c1bbd2175048fb518c9ea58f792fa04469dc0ae6dc59a0a00dd6bac3603b4c02e87c8f37b7888c0fdaf16792231948f39e99bd5f8ad07328e3370cd82541d458e931dc7bb304610ec5bdeff06c9a84166182c4af561bb9f64385f64856e307aa9e6b805013215e7c372352445e31477a09977e8c4dddfa2e799b8bc657bc8caf72441d02223078307fa9ab0e0211a53065bd348061e7d207faf95ee58955dafc23188bbe86dfd27689387d634ef8027e05f280c73b38823f079acb00d5eda30e4fab2e7ecf77f94f7d13d208b88e336156dc1a105df7d62d175ecf46831a71a1d5c3136be4f87105c270ffafb2c1a6bcdc8fbe84ab99fc929ab28e1f42d676c13d86a70e360913b35b81bc0b66733680ff5b0f09c4907d82664e690538a35dc27a2b84131b3a8bc39b3e8012c23259d23ce10fc5fe2640d01c0a147306cd40126877fb7912930df7e1712169c2ce6b364556abe036df3ca4f351b1089b8617c900bf491fad9d642d6f130ff9eef204543beee0dfe3141723de15af2fdede4900c38362eac1c28e8c47fcbd21881bbcd79eda84a94adcb09e47bb4d2e637c7eb2b61f7dce2bff03370b0f8e121c71e660b0fac6e9c30f5116a6dc56be5f80362ec2cbc83912cfa5afc98ec32f8d681a7406de3ff71286c6ee5a925835cb169a23656deb25403dfc44839832436fb6bba519eb3d5240e50b2e0953765722d751523737d8c39c4d2a1e39dd99f17a2def2ab5c87eafb62c3b73ed516f8cdf8e9f86738767699e51bc97ebe4d1d9b8df8306ec3a8c5483f0fea04a8d48e986f23fe3bf502f1f9821f24f2db19adf217117e14aa8f38054bf42630d5fec41c3b5b52ce2176e0c293230b933a8d12a383bca71a51ba625795e3d620429d660352b04fcd0bb2698586f13f21535a7c23917d1d79a70d2edbb34fb71b354d4d2636c64a6196b5637bdbbeb865c37abb9c8e782d0457abed3d9e5e556bd0157d4f5242c84cc314ada1b117b9839f910b4efa6fa4fc6414806170cfe1f4b45451adc1a078cc823d062379ab7368805a05a4760570fd099ee4d0d1245e73dd28dcb994aa2eebd95a9c422236b946676c6b54f25556744c80f13fc2e7c21a904de7fef2d2c3ec5d4473e27af6bb897cf6a281b02ffe6528d97b551747ec3e6bb3b64e43a8158da0fa6714cf4f6c1113a3d0bbb2daf1c636de4cab994b48d01abc0edb598425567e1b729996872ade4c96b42c4fa46b477e121229c96b4a6f79cbe19dd85fe44ad292eb15ff511c8a0843ca8928efd31ddd07114ce993f3ffc29b8be8f893a4a5f85f9e580b92cdce2e4be97a0ce92a9fcb54b9d16ea50dee81d30373fd0b0939f9e9a6c714e035469cd0b36d6f9886863bd013dfe223559add918ff9338a7bdc3292c19d8a589361c0866dd3698f196674cdd1b3ee8390ef1d52403c6c6230d1f5e681a3c005950e6bbe4aa3d8fab63d9848f6cc3733a1260cd251645855428230cf111d391de45b07c246bd7f9a1230d05db59c4fe8dc64aeff5254ea53665444da2d7e34db9026c28feab2bafefab440751f7565822f02487815fd31c8fe6544c317117d3a2fe5a9bad4b0ba4c2f81de6916d55c4ec6fff54463ad15480ba4bdf5acf84493ea08bd97676e9509cea8f298da2b25e956c55f97db39ad272ac91fcf01946b0e85ce18708da2fa76a74e343164ea4d32c3a3cdf26825d65fb84c16ab174cf47938477b94778630a4265af35b403baaeb0177e402d3051dbf659239a45699d02144a9f55ab52176500323ea606e75ec4173c8ae0eada399b3f0b01bd748ac71a7e95369d8eecfb59a66887ce2231f0216716524e90e9ce6a0477a5245e9a8e4f1b740b818214cd3fc51a697b13181ed1b1198af5870075ef766946dd6802f47c3515cbfb4a4c9595b5070f329abffa3934f6d4f9e487e5de8ead30eddb741ac1ec9976eb4cd0853873c4ae53602daf84055c03391b8c6827d388dc5524c90cc17d743f597c614dc14ae337d394bc34031d155bb74e5aa16aa976ea25aacaa7a92fa6a682f538e149eee61a76c7b9ae0b4dea08b264be7271fcd2669a7cafa7277100f3a821fb8c942a7375e29d4e1b83ee9b2125d314fe615eef9eddf713f8dc7750abbaf8cfbf5f1dc43994bf13f2dc42106448042aeb51bf5fc8288b97a07ba10a1149889ba8dc453bb05d4a9b7527f956a276d4cebdbbed4607123a93700375c0d35d7577e346c27824b6524cccc398b94d2481154d64fd88439594ebbda807cd21f1c2bda97785eda623f8a6fb2d8b26faf00f1102b892c465675cd6b0438a2bb2c994221791326821c05a9ef754d45d569c018255d950a6d1af6543cf8dc9b5c83794f376095ad08ea7bee9b79a87c864348ebb1674368f30eabb87f9fd05894e4a626a0a9105ed8e3c2cf122caa9443e27e2d845713033224bf7df8d51099885a5fd7053356a1ac90807c2748397705539d2f3500d4e6652c0b221974a247a74979cbc759b4bde191c80a9629e38dd4a197e9392220bafc139bdf5c4eb3923976d1233c245d692a2ee67306acca5edd947cbd601945116a671c219d", 0x1000}, {&(0x7f0000001e80)="11fe9ef37d900219c7bbb15e542201af410f09dd743d9afe6027a1fff5ee10e280ee876988a5da72c2e5a8ce3bfc4e492be0ccc0c58e872979b2aaecfc169c2b1b489dcfa6aa9211a9297994d081759ec6a43b3529c1c18d78c806ad8ee02c8efeed8b0cec21af3ca21f4b7841580a754ab5f381ad2fc62a1bdf6bab355fcb053b3be711450cb8b35c1db9aa5b13ee3ea7322d24838993e46db59b047c31f54103f8b086800b945ee969279976382ad0cd19122659836ce366fedc10483f207c6d9d19b20c4a", 0xc6}, {&(0x7f0000001f80)="9e77ce624a46f7021b2f24e271f023603b3e728529244ef604f426fdd7108161698e36bf112c541d60c2b94a5bf283d3d2f9e1e57ebdda985fb43486a2c17c70943cfdd9db1a3dd96e30eeda927ffb06a72df1eb1c980b6af09b04d3651ade98ab18e12d", 0x64}], 0x7, &(0x7f0000002240)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}], 0xb0, 0x40}, {&(0x7f0000002300)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000002600)=[{&(0x7f0000002380)="79ca76cbabc311d5e416150178e0bd639253d3865346684a87ee3175cee2ec788af1bca7bfb589cb194fb3a1150f56f76d32a2dadca942cfcdf3d0c907220b509f30bd67317531787d10db43a621e7860bcfaab4ae7d38c8eca1fc9e13534f202a1ff6c32d368eea345a8926a97bb655717b22c286533af7478e4f618cceb1c31acfaa6dad02d9d527f3", 0x8a}, {&(0x7f0000002440)="348a752fe04c498ef9256d5a7b0dc505dbbfa5d0a154ea84da81c9a0929c4caa4a6ff893c942bc05f17c1219ad7e46ae352b28d497b71f92dd7b70f70594486b7adde2c08aaaedafe8b08785bdaebd181fc9a903a10b00bc6127a65c9f4f0753374765f0fa392d82520bd3a3d0e1e2288366bba624327c4ea5769e105f2528de0720ed6ba55875b936d0fef79453b721c458ffbc9cc81e3b47c8167a4d194d54398d22d755f7f7e2a7c7ced7d2020fbfcfbab20b5c714a0d0acec55861d83e7ea22688819572c160e1fcb284116ec4accdbb5dbf35a077cec1a3914b5985639cf06497604b9b636047e89b34e362eec521", 0xf1}, {&(0x7f0000002540)="b77325ddb6771d6938b1af9cca4037ec3e1da171a228d7ac3775817f806a4a865b346aa951b26fc94dffe098febda5238d7bec49390e076c610f0ce0e64749d4ad071b2a35e056a598a884eedb2717456da3220f2ee14ed611e32df3845b0a9ccfa2d1eee11ecf2a2094a308b642a09f109168c326e874313ee27d55ae9986e19c018db617dbb73922c364affb35fbc385a7061a4a5fe134f8a3fe06cbd99ab4", 0xa0}], 0x3, &(0x7f0000002a80)=[@cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r20, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}], 0x90, 0x4}, {&(0x7f0000002b40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002d40)=[{&(0x7f0000002bc0)="4b439250cf1f8545113a01b8d2a81ae068aaa64e16a31ba5e7887b1ba3670776193110e3e7e2199f11c6eb1334e71fe7c41950a922d8234362f688b887973cb9c4f76f8d6e652d28e5f5f93553a09f41e7efda5124e9030942f627d5617efa8bebe91830ca134e794b37e6997fc75c1241f3fa164344f08907cd8a8cc8c5a72c4f2358067f332af464b768729ada230a937aa43ae496bb56e6c9410e78e4ad9a245ec416a26b409b70e8afe0e87d39cf4dcc9135beadc2", 0xb7}, {&(0x7f0000002c80)="0f42dcef2405e66a1612fd3fe242d67ff3f99047659a8e793d5481012169cb823055e0d1cb9946ab6d1a545570af751c5234acfd69ede97ab1f73b864d867899ca228dd4ac40438014d401e0b8ead4edf74447b8ce2314bc8d9f5a9de5dda7e978805bf9319c75da6c073013569fb6564d28e95ec4c6abbaa9dea48a7365f8962a8803987f7f325f7db1f10b", 0x8c}], 0x2, &(0x7f0000003480)=[@cred={{0x1c, 0x1, 0x2, {r26, r27, r28}}}, @cred={{0x1c, 0x1, 0x2, {r29, r30, r31}}}, @rights={{0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r32, r33, r34}}}, @cred={{0x1c, 0x1, 0x2, {r35, r36, r37}}}, @cred={{0x1c, 0x1, 0x2, {r38, r39, r40}}}], 0xd0}, {&(0x7f0000003580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003940)=[{&(0x7f0000003600)="f9d8ef3b2115e51a981822b30942e51ec3295d89998394d5f8f179e7f41f39c93ef1931aab765968ae6815b0b5f4e2c6e970126b87089c24ba969b030d5e40ad3ee269f289fb1f0389ec6dc92c93d06250773f1a743f372654a8f00ef1a839bcd31b0e5c42e2b2f8033aa49b1b94deb25d4c65b6233199f166031c7395af5373ce6102afc9d37349e4ade96a876fc486428ff7ee02d9585288c19e6dce28878f9e58b38d60", 0xa5}, {&(0x7f00000036c0)="f7fac7463a86a2a29d0b80f33e5fccd9f578994c3029c13aefd22a98a2c528faee760053cd5ad3cd0c7d7d18cfd6a4c57164ef5938c91ea27df91bcf5490de35c3069413077893501dce82fc47f7f70f9796e4d7c2e7169da91c6205a7a64740e52a87c6e3bdd5ee9e8a1f54d6b08f226e1a1a431cd4c41674a4fa2822e02e01f04c", 0x82}, {&(0x7f0000003780)="693b8cfdeaeffc0895f00a5fe9ef63362d8eade97744beacca89b1f9bc7754eee14b37f1859a37169eb8ada3e48952a7d37d48e2ab7070b6e91aa32d84bb47aea8fe86e4bc79d323ee9c5cd7a7c51800142a093b61e5e436569016a2570e90ccbd7537c1a833b28b3a0c909728936b00e807691d4123cf7a83dee99f7b0d5e1e0fdf0037f3257c0e47fa864579764b5e01d1ba213548", 0x96}, {&(0x7f0000003840)="1dad1d45cae6a91b3f9ba562e238147c1c667e2bd68a235a680f245b3e6f80470d417ada2ad5eba09315d710cd0a19be570fe9bbc7d07ec37d1f08b4f9a0d526d62c64f33d06cb714a20019b92d70a498d3e0d0e037ee24757b9919350617ef7e70f7b0dfbfe997e43444d965e66a8938d932ac3b84f9438a72191c062992787f7c741743a56edc494ce20ca19049bd59db5f9dc5d5dabe987450fe1c1bc4dfbb851c6c59792958df2407240340af34abf1295a76cb067e8713c7778d725497c564bc5ec587a0de3da14794dcd6cedd37b4aad3e5b1bee0c6ab3192a9abd", 0xde}], 0x4, &(0x7f0000003a80)=[@cred={{0x1c, 0x1, 0x2, {r41, r42, r43}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}], 0x40, 0x40}], 0x6, 0x0) 20:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:05 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 20:37:05 executing program 1: r0 = timerfd_create(0x922f47b06202551b, 0x0) close(r0) 20:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000040)) close(r0) 20:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40800, 0x0) 20:37:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x800000000e004, 0xaaaaaaaaaaaa862, &(0x7f0000000840)=[{&(0x7f0000000000)="ad95451df27bb80a05d5258204494cc738f63782cb34dacf105f94bf3ccde969d6c9aafc4b05426f85ea1abc40024048278182fb95df73da3c6758ab0440b1718070584b2618c5ae6ad841545270d8be466cc6225e499d1fa032b77308e8a5c34304229c78647dc0dffa162b118689c116b4c58c166f154c056327b2771e7d46331f8cf469daa6fa66152c542bf96b421b80a46ca697b14c99f90ec8982ed01a90702234757b4e49bccb98db0787c2e114e69bc9fd74033e31bfe3acfcec9e4132e77e2db8e2d765178c31127611f3d9cbbd0b4851e355b2cd6ec5ca5f0d8d0d8a4c02384c95be703c97dae46fb180c6f6055d193a879e5ce0", 0x0, 0x400}, {&(0x7f00000003c0)="d3b841314849279ef33ebfb66fb0daf4b12851cd0c3dcf2456825bbbeaa465e995fb34e882551fa1e1dab4d6c1370d7d8e71abd9cbc4243d219f6082fe99a351ca8f493996e7274b43d8d8f279e43fd5551af8352ab47f58987680f2c3f08699b64bb947c42b2605029a1cfa77d17898828933cba2c0e8ea08022f02b63387e04331af27789db704ecc9e72d266524fc", 0x0, 0x5866015e}, {&(0x7f0000000140)="9fcf1762c0", 0x0, 0x8}, {&(0x7f0000000480)="cae949ae2c90fc47be39750cddbf381b0f6d1b1e255df4b1b717f1f5d0df49e843fef94c29db10558025bfc23e0fc5313c5a7f9198ac48e3f81ee4e6a1a4933d94c6193a087777216316a19639ff02b7ab99e40d277e3216ac672b4fca59c8ff8b5aeb0614c36002346187030ce5dfea7cc291cbaae95751eab2f21b08f8f01acbabb57b0c8eb125c90a42ec6d87", 0x0, 0x3}, {&(0x7f0000000240)="b3c61a7d31c454eda46f21c6658e5ae4867a6fe00847db21baa9fb7e2250", 0xffffffffffffff15, 0x4}, {&(0x7f0000000580)="4796b1403089a4db9dc0cdb9fbe7bd1c827f9316d58abbc53e6805644d9b2295ce8f753b28ab03a649056f4adeb509dcd9102301b5050fb0f009999fa7d57d48dd6b3c4ebc4c730b26b5dd5d168329e2e4d3308f06a9463ef23253f0d4016a5ab1da8a9e9e32313b7fa2a8e674a876432d600b1de4ad0ff57518ca700e30e2758e99693976db5e908679fddbc8c98764c57c98ee3e8c4c5c5e470a2308e843988c1ce582bbce5086a16bcf089319b17664a053088b88e23756d8a555f6478061196adb71fd6c1c8e39a3bf83b4145c3304d571bbc55fdf960ac3091a19fd280156d7abdec315cc0d7baf6ee5aacb78966c4c", 0x0, 0x7}, {&(0x7f0000000680)="0663f7110b43994a78236ae247eebde10737f0c61b2bad4415a2ee0f54e0273658aa721ee57cb9516b02e936776b967915293d72cb299341a75a3a5f66cca307cc0409ee307f992612a70b280048e888e3827dde7d2a97401395f0cd15e5ea8b1879cee4b03a749c2c985bb60cabe05aeda925686d83f38d7d7c4b86893b346a8258db6d55", 0x0, 0x3}, {&(0x7f0000000740)="e999d8dda33f2f940ae734ec2eecdd6b2caea3962548143e884f11f735e20e7d0976960a8ad8076bc621b9a56adb1d9eca3b6ba5c6c9c3b94a30a26c347f9df1ce86db8480b3b6ab776d40235879a1a339c69b20d2500767ad334119a57a04f85925f8d0133a813b7d14c99890d6ae966faeb11aa22da1fb5733a4e637a6bc4910f6e43799cac4f9456ccb9d565e03555e0a80898cf08e41b0cd1dc94c0d9308daff95a342e75b97e7efbea6bff280da5e82698497c8f057effdeee82f4cc95b26cc5bfdec527f79cf38c77447cd5006a72399b0", 0x0, 0x9}], 0x20014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:05 executing program 1: timerfd_create(0x6, 0x0) 20:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:37:05 executing program 1: timerfd_create(0x9, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) accept(0xffffffffffffffff, &(0x7f0000001740)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000017c0)=0x80) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001880)={&(0x7f0000001800)=@bridge_getlink={0x50, 0x12, 0x10, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x0, r1, 0x2800, 0x101}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x265}, @IFLA_LINKMODE={0x8}, @IFLA_PROTO_DOWN={0x8, 0x27, 0x8}, @IFLA_OPERSTATE={0x8, 0x10, 0x8}, @IFLA_MTU={0x8, 0xe, 0x7ff}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x4c010}, 0xe2a5fb5dbeb732d8) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000040)=0x3) close(r2) 20:37:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x2) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 20:37:05 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x141002) dup3(r0, r1, 0x0) r2 = timerfd_create(0x9, 0x0) close(r2) 20:37:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7fffffff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x172, 0x8, [0x40, 0x6, 0x8000, 0x5, 0x7, 0x0, 0x0, 0x4]}, 0x18) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000003c0)) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:06 executing program 1: r0 = timerfd_create(0x9, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20, 0xa46e5264f1733a72) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x2, @name="41c539bf757d2c67456336329f4152d35acdf9d00b737f724e96b20c618f5582"}, 0x8, 0xb8, 0x5}) close(r0) 20:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x0, 0x503480) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000001c0)) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat\x00') ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000140)=0x1) close(r0) 20:37:06 executing program 1: timerfd_create(0x7, 0x800) r0 = timerfd_create(0x9, 0x0) close(r0) 20:37:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xe5ffffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:06 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x3f4ea0a6bb0d7f1a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x1ff, 0x80, 0x7, 0x48325b25b14362a1, r0, 0xed6f, [], r1, r2, 0x5, 0x2}, 0x3c) r3 = timerfd_create(0x9, 0x0) close(r3) restart_syscall() 20:37:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x200) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xe5ffffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 1: r0 = timerfd_create(0x9, 0x0) mq_open(&(0x7f0000000000)='$::selfeth0cgroupem0*\x00', 0x800, 0x0, &(0x7f0000000040)={0x2, 0x2, 0x325f, 0x2, 0xffffffff, 0xb2f, 0x9, 0x1}) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x400) close(r0) 20:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x02\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(r0) 20:37:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0xe5ffffff00000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x03\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(r0) 20:37:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x04\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000000)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:06 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) close(r0) 20:37:06 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x05\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:06 executing program 2: r0 = timerfd_create(0x9, 0x0) close(r0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000280)='y\x00', 0x3ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.syz\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(0x0, 0x0, 0xfffffffffffffdb4) socketpair(0x11, 0x1, 0x1, &(0x7f0000000440)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@known='system.posix_acl_access\x00') write$FUSE_BMAP(r1, &(0x7f0000000380)={0x18, 0x0, 0x3}, 0x18) r2 = creat(0x0, 0xfe2b08bceb2fa9dd) r3 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x200, 0x4) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000940)=ANY=[@ANYBLOB="000000000000000005000000000000000300000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000470d000000000000000000000000000000010000000000002a0905070000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000fb04000000000000000803ff0400000000000000000000006e250000000000000000000000000000000500000000000000030000000000000002000000000800000000000000000000043f08080000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000008000000000003000000000000000000010000000000000000a6b8c22c1178d28ba2a09900"/344]) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="8500000007000000250000ebffffffff94000000000000009ebdcb12f2ac9ab3168eb52bb743d0e5ab74e45444afd7b9d8f417a82cbe37068a1fa1c0be49f31c2647d385e359a5bff47efe0961a6aab07f0cf024ac89ba773e13a3191f118b4b74dabb0db69563568435e321da5b6fb409c89d1de5fa69801f5b0ff3de66ccf645269485465e29709a0f0392998016196da857c6c4dfae104f26b76f93d493eae477f267663702af2b7cafac5b4fe005c2fbb45f85a06eb19fad02"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000180)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)={r6, r7, 0x9}) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000580)={0x3, 0x1, {0xffffffffffffffff, 0x0, 0x0, 0x3, 0x20}}) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, 0x0) fchmod(r0, 0x2) 20:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x06\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:07 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\a\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:07 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x100000028) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000001c0)=""/88) 20:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\b\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:07 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:07 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:07 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0702030000000200008a5ff90cfb4c02edb64e7702fe7773a38cebea032267c9e978bc167f84e6b7592c8c171687ceb10573f83fa77e454289cd04418b0175f58647dc16a6e10639c6adfcb07731332a2f52ca6b8626ca5cd6700bdcd6d46000abd5854aaffe0fa8b494590ad02c6958eecd8bdc58cb109513b22d737a4002583fa3263a9911ed378668e582a853fe3c3cf332533cc2526a25d44e203a982692b543ce9e461855690b9869c2615e5c4042778c52808acb58c2f915c71fae524c91b2be7be6fd12ee855fdc50413ef2771127c9b748235679c701dded5bddf4c229c7dcc17a533c04a074943a2ecf5c478738a73e4882229954359e3c2a72d9f9cabea47109c7fdccc7485c23250ca4926bbd8ec520544457970f5e8009a4681d5721ea3ce4fbf27f34c7d3062eb23819fd7b23f3f03a8fa114703f280624113eaea654aa11df06e42a27d1f770"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\t\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1731.930320][ T4142] FAT-fs (loop5): bogus number of reserved sectors [ 1731.962477][ T4142] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1732.017984][ T4218] FAULT_INJECTION: forcing a failure. [ 1732.017984][ T4218] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.034892][ T4218] CPU: 1 PID: 4218 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1732.042729][ T4218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1732.052867][ T4218] Call Trace: [ 1732.056159][ T4218] dump_stack+0x1d8/0x2f8 [ 1732.060493][ T4218] should_fail+0x555/0x770 [ 1732.064914][ T4218] __should_failslab+0x11a/0x160 [ 1732.069853][ T4218] ? __se_sys_memfd_create+0x10a/0x4b0 [ 1732.075311][ T4218] should_failslab+0x9/0x20 [ 1732.079808][ T4218] __kmalloc+0x7a/0x340 [ 1732.083966][ T4218] __se_sys_memfd_create+0x10a/0x4b0 [ 1732.089247][ T4218] ? do_syscall_64+0x1d/0x140 [ 1732.093922][ T4218] __x64_sys_memfd_create+0x5b/0x70 [ 1732.099118][ T4218] do_syscall_64+0xfe/0x140 [ 1732.103706][ T4218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.109680][ T4218] RIP: 0033:0x459879 [ 1732.113568][ T4218] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1732.133258][ T4218] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1732.141670][ T4218] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1732.149645][ T4218] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1732.157700][ T4218] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 20:37:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80001) 20:37:07 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) [ 1732.165674][ T4218] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1732.174071][ T4218] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:07 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\n\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:07 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1732.317780][ T4665] FAULT_INJECTION: forcing a failure. [ 1732.317780][ T4665] name failslab, interval 1, probability 0, space 0, times 0 [ 1732.429707][ T4665] CPU: 1 PID: 4665 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1732.437569][ T4665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1732.447710][ T4665] Call Trace: [ 1732.451022][ T4665] dump_stack+0x1d8/0x2f8 [ 1732.455354][ T4665] should_fail+0x555/0x770 [ 1732.459780][ T4665] __should_failslab+0x11a/0x160 [ 1732.464722][ T4665] ? shmem_alloc_inode+0x1b/0x40 [ 1732.469654][ T4665] should_failslab+0x9/0x20 [ 1732.474144][ T4665] kmem_cache_alloc+0x56/0x2e0 [ 1732.478904][ T4665] ? __alloc_fd+0x58f/0x630 [ 1732.483400][ T4665] ? shmem_fallocate+0xc90/0xc90 [ 1732.483410][ T4665] shmem_alloc_inode+0x1b/0x40 [ 1732.483421][ T4665] ? shmem_fallocate+0xc90/0xc90 [ 1732.493098][ T4665] new_inode_pseudo+0x68/0x240 [ 1732.502753][ T4665] new_inode+0x28/0x1c0 [ 1732.502765][ T4665] ? __kasan_check_read+0x11/0x20 [ 1732.502778][ T4665] shmem_get_inode+0x11b/0x700 [ 1732.512015][ T4665] ? __alloc_fd+0x58f/0x630 [ 1732.512027][ T4665] __shmem_file_setup+0x129/0x280 [ 1732.512039][ T4665] shmem_file_setup+0x2f/0x40 [ 1732.521254][ T4665] __se_sys_memfd_create+0x28e/0x4b0 [ 1732.521265][ T4665] ? do_syscall_64+0x1d/0x140 [ 1732.521276][ T4665] __x64_sys_memfd_create+0x5b/0x70 [ 1732.530946][ T4665] do_syscall_64+0xfe/0x140 [ 1732.530959][ T4665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.530969][ T4665] RIP: 0033:0x459879 [ 1732.560348][ T4665] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:37:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:07 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffffffffffffff2a, 0xfffffffffffffffe}], 0x801000, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x100, 0x200) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000000)=0x1, 0x4) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000400)=""/185) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000240)={0x8, 0x8, 0x0, 0xf35a, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$BLKPG(r2, 0x1269, &(0x7f00000000c0)={0x5, 0x1, 0xdd, &(0x7f0000000300)="4bb20ab5721933103e4a0b9eb992c51c9097086cce0ae76fbc18e11a83971e936202a56f94dc5400fdd4f5bdc9540c55e532f38878d6096fa32089c5eb772a5eccea133bec81627360e9c4251a95994953b11d272133c4c6fc1bbe317a2825749457709e966d5f82222ac48e216665ce9daf0c27d046e39c211d53d69718930f6effeafe7c1a1c9475724c074e259786b8a6e113dcef2aaaf56bdaee30574f7ebc7ea2fa0b79fae79a35a1371a9a29643414096856d0ad2348e9c7c20a21c19086527cd20e9b4565d27f603a1fc4392915e2ed170dee9628808c070648"}) setxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0\x00', 0x8, 0x2) 20:37:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\v\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1732.580122][ T4665] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1732.588535][ T4665] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1732.596627][ T4665] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1732.604598][ T4665] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1732.612662][ T4665] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1732.620637][ T4665] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:08 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\f\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:08 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1732.729535][ T4961] FAULT_INJECTION: forcing a failure. [ 1732.729535][ T4961] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1732.742877][ T4961] CPU: 0 PID: 4961 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1732.750677][ T4961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1732.760730][ T4961] Call Trace: [ 1732.764024][ T4961] dump_stack+0x1d8/0x2f8 [ 1732.768366][ T4961] should_fail+0x555/0x770 [ 1732.772787][ T4961] should_fail_alloc_page+0x55/0x60 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1732.777986][ T4961] prepare_alloc_pages+0x283/0x470 [ 1732.783100][ T4961] __alloc_pages_nodemask+0xb2/0x5d0 [ 1732.788382][ T4961] ? debug_smp_processor_id+0x1c/0x20 [ 1732.793758][ T4961] kmem_getpages+0x56/0xa20 [ 1732.798264][ T4961] cache_grow_begin+0x7e/0x2c0 [ 1732.803029][ T4961] cache_alloc_refill+0x311/0x3f0 [ 1732.808581][ T4961] ? check_preemption_disabled+0xb7/0x2a0 [ 1732.814304][ T4961] kmem_cache_alloc+0x2b9/0x2e0 [ 1732.819153][ T4961] ? shmem_alloc_inode+0x1b/0x40 [ 1732.824087][ T4961] ? shmem_fallocate+0xc90/0xc90 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\r\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1732.829030][ T4961] shmem_alloc_inode+0x1b/0x40 [ 1732.833789][ T4961] ? shmem_fallocate+0xc90/0xc90 [ 1732.838719][ T4961] new_inode_pseudo+0x68/0x240 [ 1732.843475][ T4961] new_inode+0x28/0x1c0 [ 1732.847637][ T4961] ? __kasan_check_read+0x11/0x20 [ 1732.852653][ T4961] shmem_get_inode+0x11b/0x700 [ 1732.852665][ T4961] ? __alloc_fd+0x58f/0x630 [ 1732.852678][ T4961] __shmem_file_setup+0x129/0x280 [ 1732.852692][ T4961] shmem_file_setup+0x2f/0x40 [ 1732.861929][ T4961] __se_sys_memfd_create+0x28e/0x4b0 [ 1732.876857][ T4961] ? do_syscall_64+0x1d/0x140 [ 1732.881530][ T4961] __x64_sys_memfd_create+0x5b/0x70 [ 1732.886721][ T4961] do_syscall_64+0xfe/0x140 [ 1732.891222][ T4961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.897111][ T4961] RIP: 0033:0x459879 [ 1732.900996][ T4961] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1732.901001][ T4961] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x0e\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) [ 1732.901010][ T4961] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1732.901016][ T4961] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1732.901022][ T4961] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1732.901032][ T4961] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1732.961480][ T4961] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:08 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000000)=@bcast) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x10\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:08 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:08 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x11\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x12\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:08 executing program 1: r0 = timerfd_create(0x9, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x94, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1733.352095][ T5344] FAULT_INJECTION: forcing a failure. [ 1733.352095][ T5344] name failslab, interval 1, probability 0, space 0, times 0 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1733.468783][ T5344] CPU: 0 PID: 5344 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1733.476633][ T5344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.486688][ T5344] Call Trace: [ 1733.489981][ T5344] dump_stack+0x1d8/0x2f8 [ 1733.494313][ T5344] should_fail+0x555/0x770 [ 1733.498715][ T5344] __should_failslab+0x11a/0x160 [ 1733.498726][ T5344] ? __d_alloc+0x2d/0x6e0 [ 1733.498736][ T5344] should_failslab+0x9/0x20 [ 1733.498746][ T5344] kmem_cache_alloc+0x56/0x2e0 20:37:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:08 executing program 1: timerfd_create(0x9, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1733.498757][ T5344] __d_alloc+0x2d/0x6e0 [ 1733.498765][ T5344] ? lockdep_init_map+0x2a/0x680 [ 1733.498777][ T5344] d_alloc_pseudo+0x1d/0x70 [ 1733.530902][ T5344] alloc_file_pseudo+0xc3/0x260 [ 1733.535761][ T5344] __shmem_file_setup+0x1a2/0x280 [ 1733.540783][ T5344] shmem_file_setup+0x2f/0x40 [ 1733.545449][ T5344] __se_sys_memfd_create+0x28e/0x4b0 [ 1733.550752][ T5344] ? do_syscall_64+0x1d/0x140 [ 1733.555436][ T5344] __x64_sys_memfd_create+0x5b/0x70 [ 1733.560723][ T5344] do_syscall_64+0xfe/0x140 20:37:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00%\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1733.565223][ T5344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.571102][ T5344] RIP: 0033:0x459879 [ 1733.575020][ T5344] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1733.594608][ T5344] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1733.603016][ T5344] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1733.610975][ T5344] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1733.610984][ T5344] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1733.626894][ T5344] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1733.634853][ T5344] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:09 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:09 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x0, 0x0}}], 0x2, 0x0) 20:37:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00H\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:09 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:09 executing program 5: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0x107, 0x3f, "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"}, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00L\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x2}], 0x2, 0x0) [ 1733.837605][ T5756] FAULT_INJECTION: forcing a failure. [ 1733.837605][ T5756] name failslab, interval 1, probability 0, space 0, times 0 20:37:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1733.909065][ T5756] CPU: 0 PID: 5756 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1733.916912][ T5756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.926967][ T5756] Call Trace: [ 1733.930420][ T5756] dump_stack+0x1d8/0x2f8 [ 1733.934759][ T5756] should_fail+0x555/0x770 [ 1733.939182][ T5756] __should_failslab+0x11a/0x160 [ 1733.944119][ T5756] ? __d_alloc+0x2d/0x6e0 [ 1733.948455][ T5756] should_failslab+0x9/0x20 [ 1733.952952][ T5756] kmem_cache_alloc+0x56/0x2e0 [ 1733.957709][ T5756] __d_alloc+0x2d/0x6e0 [ 1733.961859][ T5756] ? lockdep_init_map+0x2a/0x680 [ 1733.966785][ T5756] d_alloc_pseudo+0x1d/0x70 [ 1733.971261][ T5756] alloc_file_pseudo+0xc3/0x260 [ 1733.976104][ T5756] __shmem_file_setup+0x1a2/0x280 [ 1733.981112][ T5756] shmem_file_setup+0x2f/0x40 [ 1733.985782][ T5756] __se_sys_memfd_create+0x28e/0x4b0 [ 1733.991056][ T5756] ? do_syscall_64+0x1d/0x140 [ 1733.995717][ T5756] __x64_sys_memfd_create+0x5b/0x70 [ 1734.000888][ T5756] do_syscall_64+0xfe/0x140 [ 1734.005364][ T5756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1734.011233][ T5756] RIP: 0033:0x459879 [ 1734.015108][ T5756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1734.034695][ T5756] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1734.043079][ T5756] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 1734.051026][ T5756] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 20:37:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\\\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:09 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3}], 0x2, 0x0) 20:37:09 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1734.058994][ T5756] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1734.066952][ T5756] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1734.074897][ T5756] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:09 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00h\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1734.208768][ T5962] FAULT_INJECTION: forcing a failure. [ 1734.208768][ T5962] name failslab, interval 1, probability 0, space 0, times 0 20:37:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x4}], 0x2, 0x0) [ 1734.287229][ T5962] CPU: 1 PID: 5962 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1734.295078][ T5962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1734.305129][ T5962] Call Trace: [ 1734.308514][ T5962] dump_stack+0x1d8/0x2f8 [ 1734.312854][ T5962] should_fail+0x555/0x770 [ 1734.317279][ T5962] __should_failslab+0x11a/0x160 [ 1734.322221][ T5962] ? security_file_alloc+0x36/0x200 [ 1734.327419][ T5962] should_failslab+0x9/0x20 [ 1734.331921][ T5962] kmem_cache_alloc+0x56/0x2e0 [ 1734.336669][ T5962] security_file_alloc+0x36/0x200 [ 1734.336682][ T5962] __alloc_file+0xde/0x390 [ 1734.336692][ T5962] alloc_empty_file+0xac/0x1b0 [ 1734.336701][ T5962] alloc_file+0x60/0x4c0 [ 1734.336714][ T5962] alloc_file_pseudo+0x1d4/0x260 [ 1734.360032][ T5962] __shmem_file_setup+0x1a2/0x280 [ 1734.365047][ T5962] shmem_file_setup+0x2f/0x40 [ 1734.369707][ T5962] __se_sys_memfd_create+0x28e/0x4b0 [ 1734.374969][ T5962] ? do_syscall_64+0x1d/0x140 [ 1734.374979][ T5962] __x64_sys_memfd_create+0x5b/0x70 [ 1734.374987][ T5962] do_syscall_64+0xfe/0x140 [ 1734.375001][ T5962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1734.375012][ T5962] RIP: 0033:0x459879 [ 1734.399097][ T5962] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1734.418700][ T5962] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1734.427113][ T5962] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 20:37:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x3, {0x7, 0x0, 0xf6, 0x106a}}, 0x20) 20:37:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00l\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00t\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:09 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1734.435084][ T5962] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1734.443084][ T5962] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1734.443089][ T5962] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1734.443094][ T5962] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:09 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1734.560321][ T6183] FAULT_INJECTION: forcing a failure. [ 1734.560321][ T6183] name failslab, interval 1, probability 0, space 0, times 0 [ 1734.613265][ T6183] CPU: 0 PID: 6183 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1734.621108][ T6183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1734.631163][ T6183] Call Trace: [ 1734.634458][ T6183] dump_stack+0x1d8/0x2f8 [ 1734.638796][ T6183] should_fail+0x555/0x770 [ 1734.643211][ T6183] __should_failslab+0x11a/0x160 [ 1734.648138][ T6183] ? security_file_alloc+0x36/0x200 [ 1734.648153][ T6183] should_failslab+0x9/0x20 [ 1734.657811][ T6183] kmem_cache_alloc+0x56/0x2e0 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00z\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:10 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1734.657823][ T6183] security_file_alloc+0x36/0x200 [ 1734.657836][ T6183] __alloc_file+0xde/0x390 [ 1734.657846][ T6183] alloc_empty_file+0xac/0x1b0 [ 1734.657856][ T6183] alloc_file+0x60/0x4c0 [ 1734.657868][ T6183] alloc_file_pseudo+0x1d4/0x260 [ 1734.685906][ T6183] __shmem_file_setup+0x1a2/0x280 [ 1734.690950][ T6183] shmem_file_setup+0x2f/0x40 [ 1734.695625][ T6183] __se_sys_memfd_create+0x28e/0x4b0 [ 1734.700909][ T6183] ? do_syscall_64+0x1d/0x140 [ 1734.705583][ T6183] __x64_sys_memfd_create+0x5b/0x70 [ 1734.710782][ T6183] do_syscall_64+0xfe/0x140 [ 1734.715283][ T6183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1734.721164][ T6183] RIP: 0033:0x459879 [ 1734.721173][ T6183] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1734.721178][ T6183] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1734.744644][ T6183] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x5}], 0x2, 0x0) 20:37:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x03', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1734.744650][ T6183] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 1734.744655][ T6183] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1734.744660][ T6183] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1a4668f6d4 [ 1734.744665][ T6183] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x05', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:10 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:10 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x6}], 0x2, 0x0) 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x06', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:10 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(0x0, 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1735.005450][ T6535] FAULT_INJECTION: forcing a failure. [ 1735.005450][ T6535] name failslab, interval 1, probability 0, space 0, times 0 20:37:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x2}) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)={0x2a, 0x4, 0x0, {0x0, 0xf776, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x7}], 0x2, 0x0) 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\a', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1735.107644][ T6535] CPU: 0 PID: 6535 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1735.115491][ T6535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1735.125542][ T6535] Call Trace: [ 1735.128833][ T6535] dump_stack+0x1d8/0x2f8 [ 1735.133257][ T6535] should_fail+0x555/0x770 [ 1735.137682][ T6535] __should_failslab+0x11a/0x160 [ 1735.142618][ T6535] ? tomoyo_encode2+0x273/0x5a0 [ 1735.147466][ T6535] should_failslab+0x9/0x20 [ 1735.151962][ T6535] __kmalloc+0x7a/0x340 [ 1735.156100][ T6535] tomoyo_encode2+0x273/0x5a0 [ 1735.160752][ T6535] ? dynamic_dname+0xf0/0xf0 [ 1735.165333][ T6535] tomoyo_realpath_from_path+0x769/0x7c0 [ 1735.170942][ T6535] tomoyo_path_perm+0x192/0x850 [ 1735.175781][ T6535] ? trace_lock_release+0x135/0x1a0 [ 1735.180971][ T6535] tomoyo_path_truncate+0x1c/0x20 [ 1735.185977][ T6535] security_path_truncate+0xd5/0x150 [ 1735.191255][ T6535] do_sys_ftruncate+0x493/0x710 [ 1735.196081][ T6535] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1735.201782][ T6535] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1735.207220][ T6535] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1735.212917][ T6535] ? trace_hardirqs_off_caller+0x58/0x80 [ 1735.218520][ T6535] ? do_syscall_64+0x1d/0x140 [ 1735.223171][ T6535] __x64_sys_ftruncate+0x60/0x70 [ 1735.228104][ T6535] do_syscall_64+0xfe/0x140 [ 1735.232583][ T6535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1735.238451][ T6535] RIP: 0033:0x459847 [ 1735.242331][ T6535] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1735.261917][ T6535] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1735.270471][ T6535] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 1735.278427][ T6535] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 1735.286380][ T6535] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1735.294329][ T6535] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 20:37:10 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(0x0, 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1735.302288][ T6535] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1735.312877][ T6535] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x8}], 0x2, 0x0) 20:37:10 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:10 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(0x0, 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\t', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000000)='vfat\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x2, 0x2, 0x6, 0x5, r1}) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bind$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000000c0)=r2) 20:37:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x9}], 0x2, 0x0) 20:37:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\n', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1735.540895][ T7006] FAULT_INJECTION: forcing a failure. [ 1735.540895][ T7006] name failslab, interval 1, probability 0, space 0, times 0 20:37:10 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1735.627706][ T7006] CPU: 1 PID: 7006 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1735.635557][ T7006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1735.645599][ T7006] Call Trace: [ 1735.645618][ T7006] dump_stack+0x1d8/0x2f8 [ 1735.645636][ T7006] should_fail+0x555/0x770 [ 1735.657624][ T7006] __should_failslab+0x11a/0x160 [ 1735.662567][ T7006] ? tomoyo_encode2+0x273/0x5a0 [ 1735.662580][ T7006] should_failslab+0x9/0x20 [ 1735.662590][ T7006] __kmalloc+0x7a/0x340 [ 1735.662602][ T7006] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1735.681771][ T7006] tomoyo_encode2+0x273/0x5a0 [ 1735.686450][ T7006] ? dynamic_dname+0xf0/0xf0 [ 1735.691040][ T7006] tomoyo_realpath_from_path+0x769/0x7c0 [ 1735.696670][ T7006] tomoyo_path_perm+0x192/0x850 [ 1735.701520][ T7006] ? trace_lock_release+0x135/0x1a0 [ 1735.706728][ T7006] tomoyo_path_truncate+0x1c/0x20 [ 1735.711744][ T7006] security_path_truncate+0xd5/0x150 [ 1735.711758][ T7006] do_sys_ftruncate+0x493/0x710 [ 1735.711769][ T7006] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1735.711786][ T7006] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1735.721869][ T7006] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1735.721878][ T7006] ? trace_hardirqs_off_caller+0x58/0x80 [ 1735.721888][ T7006] ? do_syscall_64+0x1d/0x140 [ 1735.721900][ T7006] __x64_sys_ftruncate+0x60/0x70 [ 1735.754087][ T7006] do_syscall_64+0xfe/0x140 [ 1735.758595][ T7006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1735.764470][ T7006] RIP: 0033:0x459847 20:37:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:11 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\v', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1735.768344][ T7006] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1735.787936][ T7006] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1735.787944][ T7006] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 1735.787949][ T7006] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 1735.787955][ T7006] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1735.787959][ T7006] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1735.787964][ T7006] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1735.891111][ T7006] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:11 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000080)={r1, 0x1}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x108}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x60, r2, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xa}], 0x2, 0x0) 20:37:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\f', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:11 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\r', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:11 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1736.095692][ T7258] FAULT_INJECTION: forcing a failure. [ 1736.095692][ T7258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1736.167706][ T7258] CPU: 0 PID: 7258 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1736.175550][ T7258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1736.185602][ T7258] Call Trace: [ 1736.188892][ T7258] dump_stack+0x1d8/0x2f8 [ 1736.193224][ T7258] should_fail+0x555/0x770 [ 1736.197689][ T7258] should_fail_alloc_page+0x55/0x60 [ 1736.202882][ T7258] prepare_alloc_pages+0x283/0x470 [ 1736.207994][ T7258] __alloc_pages_nodemask+0xb2/0x5d0 20:37:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000580)) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000240)=0x1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x401}, &(0x7f0000000340)=0x8) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, &(0x7f0000000440)="360f01c53e0f09baf80c66b85c581c8f66efbafc0c66ed0f01d166b9800000c00f326635008000000f30baf80c66b87e0ef38b66efbafc0ced660f38dbfc0f7925f20fd6d0ba2100ec", 0x49}], 0x1, 0x0, &(0x7f0000000500)=[@dstype0={0x6, 0x8}, @cr4={0x1, 0x90}], 0x2) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x1}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0xbbd7, 0x7, 0x7, 0x1ff, 0x4, 0x2, 0x6, {0x0, @in={{0x2, 0x4e22, @local}}, 0x7, 0x9, 0x0, 0x6, 0x3ef}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) bind$packet(r0, &(0x7f0000000780)={0x11, 0x0, r4, 0x1, 0x7, 0x6, @remote}, 0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r3, 0x3f}, &(0x7f00000001c0)=0x8) openat(r1, &(0x7f0000000400)='./file0\x00', 0x400100, 0x100) 20:37:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xb}], 0x2, 0x0) 20:37:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1736.213272][ T7258] ? percpu_counter_add_batch+0x153/0x170 [ 1736.218988][ T7258] alloc_pages_vma+0x4e7/0x8b0 [ 1736.223751][ T7258] shmem_alloc_and_acct_page+0x429/0xbb0 [ 1736.229401][ T7258] shmem_getpage_gfp+0x1270/0x2c00 [ 1736.234528][ T7258] shmem_write_begin+0xcb/0x1b0 [ 1736.239377][ T7258] generic_perform_write+0x25d/0x4e0 [ 1736.244661][ T7258] __generic_file_write_iter+0x24b/0x520 [ 1736.250300][ T7258] generic_file_write_iter+0x445/0x5d0 [ 1736.255760][ T7258] __vfs_write+0x5a1/0x740 [ 1736.260185][ T7258] vfs_write+0x275/0x590 [ 1736.264426][ T7258] __x64_sys_pwrite64+0x162/0x1d0 [ 1736.269484][ T7258] do_syscall_64+0xfe/0x140 [ 1736.274500][ T7258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1736.280380][ T7258] RIP: 0033:0x4137c7 [ 1736.280391][ T7258] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1736.280396][ T7258] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1736.280406][ T7258] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 1736.280415][ T7258] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 [ 1736.328192][ T7258] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1736.336152][ T7258] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1736.336158][ T7258] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:11 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:11 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x0e', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc}], 0x2, 0x0) 20:37:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x11', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:11 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/186) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1736.552571][ T7714] FAULT_INJECTION: forcing a failure. [ 1736.552571][ T7714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:37:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xd}], 0x2, 0x0) 20:37:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x12', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1736.737974][ T7714] CPU: 1 PID: 7714 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1736.745827][ T7714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1736.755880][ T7714] Call Trace: [ 1736.759173][ T7714] dump_stack+0x1d8/0x2f8 [ 1736.763510][ T7714] should_fail+0x555/0x770 [ 1736.767927][ T7714] should_fail_alloc_page+0x55/0x60 [ 1736.773123][ T7714] prepare_alloc_pages+0x283/0x470 [ 1736.778229][ T7714] __alloc_pages_nodemask+0xb2/0x5d0 [ 1736.783646][ T7714] ? percpu_counter_add_batch+0x153/0x170 [ 1736.789371][ T7714] alloc_pages_vma+0x4e7/0x8b0 [ 1736.794141][ T7714] shmem_alloc_and_acct_page+0x429/0xbb0 [ 1736.799782][ T7714] shmem_getpage_gfp+0x1270/0x2c00 [ 1736.805330][ T7714] shmem_write_begin+0xcb/0x1b0 [ 1736.810179][ T7714] generic_perform_write+0x25d/0x4e0 [ 1736.815467][ T7714] __generic_file_write_iter+0x24b/0x520 [ 1736.821092][ T7714] generic_file_write_iter+0x445/0x5d0 [ 1736.826544][ T7714] __vfs_write+0x5a1/0x740 [ 1736.830965][ T7714] vfs_write+0x275/0x590 [ 1736.835209][ T7714] __x64_sys_pwrite64+0x162/0x1d0 [ 1736.840226][ T7714] do_syscall_64+0xfe/0x140 [ 1736.844721][ T7714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1736.850602][ T7714] RIP: 0033:0x4137c7 [ 1736.854489][ T7714] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1736.874088][ T7714] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1736.882499][ T7714] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 1736.890470][ T7714] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 [ 1736.898439][ T7714] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1736.906415][ T7714] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1736.914380][ T7714] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:12 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xe}], 0x2, 0x0) 20:37:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x200) 20:37:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00%', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00@', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1737.179151][ T8144] FAULT_INJECTION: forcing a failure. [ 1737.179151][ T8144] name failslab, interval 1, probability 0, space 0, times 0 20:37:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x10}], 0x2, 0x0) 20:37:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffffffffffe82, 0x3}], 0x10, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x17) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={r3, 0x3}) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000000)={'veth1_to_bridge\x00', 0xffff}) 20:37:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1737.318512][ T8144] CPU: 1 PID: 8144 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1737.326354][ T8144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1737.336488][ T8144] Call Trace: [ 1737.339779][ T8144] dump_stack+0x1d8/0x2f8 [ 1737.344110][ T8144] should_fail+0x555/0x770 [ 1737.348527][ T8144] __should_failslab+0x11a/0x160 [ 1737.353462][ T8144] ? getname_flags+0xba/0x640 [ 1737.358133][ T8144] should_failslab+0x9/0x20 [ 1737.362635][ T8144] kmem_cache_alloc+0x56/0x2e0 [ 1737.367392][ T8144] ? check_preemption_disabled+0xb7/0x2a0 [ 1737.373102][ T8144] getname_flags+0xba/0x640 [ 1737.377595][ T8144] getname+0x19/0x20 [ 1737.381483][ T8144] do_sys_open+0x261/0x560 [ 1737.385893][ T8144] __x64_sys_open+0x87/0x90 [ 1737.390384][ T8144] do_syscall_64+0xfe/0x140 [ 1737.394877][ T8144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1737.400758][ T8144] RIP: 0033:0x413761 [ 1737.404644][ T8144] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1737.424243][ T8144] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1737.432650][ T8144] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1737.440614][ T8144] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 [ 1737.448591][ T8144] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1737.456559][ T8144] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1737.464521][ T8144] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:12 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[], 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00H', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x11}], 0x2, 0x0) [ 1737.598398][ T8444] FAULT_INJECTION: forcing a failure. [ 1737.598398][ T8444] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1737.611638][ T8444] CPU: 0 PID: 8444 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1737.619470][ T8444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1737.629519][ T8444] Call Trace: [ 1737.632812][ T8444] dump_stack+0x1d8/0x2f8 [ 1737.637144][ T8444] should_fail+0x555/0x770 [ 1737.641543][ T8444] should_fail_alloc_page+0x55/0x60 [ 1737.646737][ T8444] prepare_alloc_pages+0x283/0x470 [ 1737.651955][ T8444] __alloc_pages_nodemask+0xb2/0x5d0 [ 1737.657246][ T8444] ? debug_smp_processor_id+0x1c/0x20 [ 1737.662629][ T8444] kmem_getpages+0x56/0xa20 [ 1737.667217][ T8444] ? trace_lock_release+0x135/0x1a0 [ 1737.667228][ T8444] cache_grow_begin+0x7e/0x2c0 [ 1737.667240][ T8444] cache_alloc_refill+0x311/0x3f0 [ 1737.667249][ T8444] ? check_preemption_disabled+0xb7/0x2a0 [ 1737.667261][ T8444] kmem_cache_alloc+0x2b9/0x2e0 [ 1737.667270][ T8444] ? getname_flags+0xba/0x640 20:37:13 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00L', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x12}], 0x2, 0x0) 20:37:13 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[], 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1737.667282][ T8444] getname_flags+0xba/0x640 [ 1737.701906][ T8444] getname+0x19/0x20 [ 1737.705797][ T8444] do_sys_open+0x261/0x560 [ 1737.710213][ T8444] __x64_sys_open+0x87/0x90 [ 1737.714716][ T8444] do_syscall_64+0xfe/0x140 [ 1737.719220][ T8444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1737.725147][ T8444] RIP: 0033:0x413761 20:37:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1737.729037][ T8444] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1737.753069][ T8444] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1737.761494][ T8444] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1737.769462][ T8444] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 [ 1737.777433][ T8444] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1737.785411][ T8444] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1737.793478][ T8444] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:13 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[], 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:13 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x7, 0x1, 0x1, 0xffffffff, 'syz0\x00', 0x8}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380), 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x101, 0x20) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) fdatasync(r2) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000080)) 20:37:13 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\\', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x25}], 0x2, 0x0) 20:37:13 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:13 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:13 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00h', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1738.060139][ T8705] FAULT_INJECTION: forcing a failure. [ 1738.060139][ T8705] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.091256][ T8705] CPU: 0 PID: 8705 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1738.099098][ T8705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1738.109146][ T8705] Call Trace: [ 1738.112424][ T8705] dump_stack+0x1d8/0x2f8 [ 1738.116749][ T8705] should_fail+0x555/0x770 [ 1738.121165][ T8705] __should_failslab+0x11a/0x160 [ 1738.126089][ T8705] ? __alloc_file+0x2c/0x390 [ 1738.130657][ T8705] should_failslab+0x9/0x20 [ 1738.135149][ T8705] kmem_cache_alloc+0x56/0x2e0 [ 1738.139888][ T8705] __alloc_file+0x2c/0x390 [ 1738.144278][ T8705] alloc_empty_file+0xac/0x1b0 [ 1738.149293][ T8705] path_openat+0x9e/0x4460 [ 1738.153684][ T8705] ? __kasan_kmalloc+0x178/0x1b0 [ 1738.158595][ T8705] ? __kasan_kmalloc+0x11c/0x1b0 [ 1738.163506][ T8705] ? kasan_slab_alloc+0xf/0x20 [ 1738.168244][ T8705] ? kmem_cache_alloc+0x1f5/0x2e0 [ 1738.173258][ T8705] ? getname+0x19/0x20 [ 1738.177301][ T8705] ? do_sys_open+0x261/0x560 [ 1738.181862][ T8705] ? do_syscall_64+0xfe/0x140 [ 1738.186535][ T8705] ? perf_trace_lock+0x90/0x360 [ 1738.191363][ T8705] ? check_preemption_disabled+0x47/0x2a0 [ 1738.197061][ T8705] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1738.202927][ T8705] ? debug_smp_processor_id+0x1c/0x20 [ 1738.208270][ T8705] ? perf_trace_lock+0x90/0x360 [ 1738.213098][ T8705] ? __alloc_fd+0x58f/0x630 [ 1738.217574][ T8705] ? __alloc_fd+0x58f/0x630 [ 1738.222057][ T8705] ? trace_lock_release+0x135/0x1a0 [ 1738.227341][ T8705] ? __alloc_fd+0x58f/0x630 [ 1738.231820][ T8705] do_filp_open+0x192/0x3d0 [ 1738.236302][ T8705] ? _raw_spin_unlock+0x2c/0x50 [ 1738.241136][ T8705] do_sys_open+0x29f/0x560 [ 1738.245529][ T8705] __x64_sys_open+0x87/0x90 [ 1738.250006][ T8705] do_syscall_64+0xfe/0x140 [ 1738.254483][ T8705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1738.260349][ T8705] RIP: 0033:0x413761 [ 1738.264228][ T8705] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1738.283805][ T8705] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1738.292189][ T8705] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1738.300235][ T8705] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 20:37:13 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1738.308181][ T8705] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1738.316128][ T8705] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1738.324077][ T8705] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:13 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1738.365274][ T8711] FAT-fs (loop5): bogus number of reserved sectors 20:37:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x5c}], 0x2, 0x0) 20:37:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1738.464267][ T8711] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1738.546869][ T9004] FAULT_INJECTION: forcing a failure. [ 1738.546869][ T9004] name failslab, interval 1, probability 0, space 0, times 0 [ 1738.560041][ T9004] CPU: 1 PID: 9004 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1738.567862][ T9004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1738.577906][ T9004] Call Trace: [ 1738.581189][ T9004] dump_stack+0x1d8/0x2f8 [ 1738.585497][ T9004] should_fail+0x555/0x770 [ 1738.589910][ T9004] __should_failslab+0x11a/0x160 [ 1738.594836][ T9004] ? __alloc_file+0x2c/0x390 [ 1738.599401][ T9004] should_failslab+0x9/0x20 [ 1738.603873][ T9004] kmem_cache_alloc+0x56/0x2e0 [ 1738.608607][ T9004] __alloc_file+0x2c/0x390 [ 1738.613007][ T9004] alloc_empty_file+0xac/0x1b0 [ 1738.617745][ T9004] path_openat+0x9e/0x4460 [ 1738.622132][ T9004] ? __kasan_kmalloc+0x178/0x1b0 [ 1738.627056][ T9004] ? __kasan_kmalloc+0x11c/0x1b0 [ 1738.631984][ T9004] ? kasan_slab_alloc+0xf/0x20 [ 1738.636718][ T9004] ? kmem_cache_alloc+0x1f5/0x2e0 [ 1738.641712][ T9004] ? getname+0x19/0x20 [ 1738.645751][ T9004] ? do_sys_open+0x261/0x560 [ 1738.650327][ T9004] ? do_syscall_64+0xfe/0x140 [ 1738.654977][ T9004] ? perf_trace_lock+0x90/0x360 [ 1738.659803][ T9004] ? check_preemption_disabled+0x47/0x2a0 [ 1738.665496][ T9004] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1738.671372][ T9004] ? debug_smp_processor_id+0x1c/0x20 [ 1738.676712][ T9004] ? perf_trace_lock+0x90/0x360 [ 1738.681546][ T9004] ? __alloc_fd+0x58f/0x630 [ 1738.686032][ T9004] ? __alloc_fd+0x58f/0x630 [ 1738.690528][ T9004] ? trace_lock_release+0x135/0x1a0 [ 1738.695698][ T9004] ? __alloc_fd+0x58f/0x630 [ 1738.700260][ T9004] do_filp_open+0x192/0x3d0 [ 1738.704755][ T9004] ? _raw_spin_unlock+0x2c/0x50 [ 1738.709594][ T9004] do_sys_open+0x29f/0x560 [ 1738.713986][ T9004] __x64_sys_open+0x87/0x90 [ 1738.718464][ T9004] do_syscall_64+0xfe/0x140 [ 1738.722958][ T9004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1738.728918][ T9004] RIP: 0033:0x413761 [ 1738.732797][ T9004] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1738.752378][ T9004] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1738.760759][ T9004] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1738.768700][ T9004] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 [ 1738.776661][ T9004] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1738.784611][ T9004] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 20:37:14 executing program 5: init_module(&(0x7f00000000c0)='self%%security-^,wlan1\x00', 0x17, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x82) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @bt={0x0, 0xc6, 0x1, 0x1, 0x0, 0x4, 0x5, 0xffffffffffffffe0, 0x5, 0x0, 0x7, 0x100000001, 0x1, 0x6, 0x5, 0x24}}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00l', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:14 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc0}], 0x2, 0x0) [ 1738.792553][ T9004] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:14 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00t', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:14 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100"/172], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:14 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400800, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000001c0), &(0x7f0000000240)=0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000000c0)={0x4, 0x200000, 0x362a, 0x3, 0x8000, "d00474f1cfa53bb187170b0053f4dfc8e6c8b1"}) listen(r1, 0x8) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) 20:37:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x300}], 0x2, 0x0) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00z', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:14 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100"/172], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:14 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100"/172], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1739.234051][ T9525] FAULT_INJECTION: forcing a failure. [ 1739.234051][ T9525] name failslab, interval 1, probability 0, space 0, times 0 [ 1739.275642][ T9525] CPU: 0 PID: 9525 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1739.283577][ T9525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1739.293631][ T9525] Call Trace: [ 1739.296925][ T9525] dump_stack+0x1d8/0x2f8 [ 1739.301264][ T9525] should_fail+0x555/0x770 [ 1739.305674][ T9525] __should_failslab+0x11a/0x160 [ 1739.310657][ T9525] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1739.316356][ T9525] should_failslab+0x9/0x20 [ 1739.320844][ T9525] __kmalloc+0x7a/0x340 [ 1739.324989][ T9525] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1739.330684][ T9525] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1739.336293][ T9525] tomoyo_path_number_perm+0x166/0x640 [ 1739.341822][ T9525] ? smack_file_ioctl+0x226/0x2e0 [ 1739.346839][ T9525] ? __fget+0x471/0x510 [ 1739.350997][ T9525] tomoyo_file_ioctl+0x23/0x30 [ 1739.355759][ T9525] security_file_ioctl+0x6d/0xd0 [ 1739.360685][ T9525] __x64_sys_ioctl+0xa3/0x120 [ 1739.365367][ T9525] do_syscall_64+0xfe/0x140 [ 1739.369850][ T9525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.375714][ T9525] RIP: 0033:0x4596e7 [ 1739.379590][ T9525] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1739.399189][ T9525] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1739.407590][ T9525] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1739.415544][ T9525] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1739.423500][ T9525] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1739.431605][ T9525] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1739.439556][ T9525] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1739.449672][ T9525] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:14 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x500}], 0x2, 0x0) 20:37:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) r7 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) getresuid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000840)=0xe8) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="0013b546e4284077753dfb9ef4", @ANYRES32=r2, @ANYBLOB="0200a1d6", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02009d21", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000100", @ANYRES32=r9, @ANYBLOB="02000400", @ANYRES32=r10, @ANYBLOB="040001000000000010000300000000002000040000000000"], 0x6c, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:14 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900"/258], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:15 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900"/258], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1739.636963][ T9657] FAULT_INJECTION: forcing a failure. [ 1739.636963][ T9657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1739.650193][ T9657] CPU: 0 PID: 9657 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1739.657994][ T9657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1739.668048][ T9657] Call Trace: [ 1739.671341][ T9657] dump_stack+0x1d8/0x2f8 [ 1739.675673][ T9657] should_fail+0x555/0x770 [ 1739.680095][ T9657] should_fail_alloc_page+0x55/0x60 20:37:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1739.685298][ T9657] prepare_alloc_pages+0x283/0x470 [ 1739.690409][ T9657] __alloc_pages_nodemask+0xb2/0x5d0 [ 1739.695701][ T9657] kmem_getpages+0x56/0xa20 [ 1739.700221][ T9657] cache_grow_begin+0x7e/0x2c0 [ 1739.704977][ T9657] cache_alloc_refill+0x311/0x3f0 [ 1739.704987][ T9657] ? check_preemption_disabled+0xb7/0x2a0 [ 1739.704999][ T9657] __kmalloc+0x318/0x340 [ 1739.705009][ T9657] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1739.705021][ T9657] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1739.705036][ T9657] tomoyo_check_open_permission+0x1ce/0x9d0 20:37:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x600}], 0x2, 0x0) [ 1739.705060][ T9657] tomoyo_file_open+0x141/0x190 [ 1739.742393][ T9657] security_file_open+0x65/0x2f0 [ 1739.747332][ T9657] do_dentry_open+0x34e/0xf90 [ 1739.752013][ T9657] vfs_open+0x73/0x80 [ 1739.755995][ T9657] path_openat+0x1397/0x4460 [ 1739.760669][ T9657] ? getname+0x19/0x20 [ 1739.760690][ T9657] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1739.770626][ T9657] ? trace_lock_release+0x135/0x1a0 [ 1739.775861][ T9657] ? __alloc_fd+0x58f/0x630 [ 1739.780372][ T9657] do_filp_open+0x192/0x3d0 [ 1739.784913][ T9657] do_sys_open+0x29f/0x560 [ 1739.789411][ T9657] __x64_sys_open+0x87/0x90 [ 1739.794087][ T9657] do_syscall_64+0xfe/0x140 [ 1739.798589][ T9657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1739.804470][ T9657] RIP: 0033:0x413761 [ 1739.808359][ T9657] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1739.828041][ T9657] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 20:37:15 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900"/258], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1739.828050][ T9657] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1739.828055][ T9657] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 [ 1739.828060][ T9657] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1739.828064][ T9657] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1739.828069][ T9657] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:15 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:15 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x8201, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000140)='lo\x00', 0x3, 0x3) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) 20:37:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:15 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x700}], 0x2, 0x0) [ 1740.039680][ T9902] FAULT_INJECTION: forcing a failure. [ 1740.039680][ T9902] name failslab, interval 1, probability 0, space 0, times 0 20:37:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1740.096805][ T9902] CPU: 0 PID: 9902 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1740.104655][ T9902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1740.114703][ T9902] Call Trace: [ 1740.117999][ T9902] dump_stack+0x1d8/0x2f8 [ 1740.122334][ T9902] should_fail+0x555/0x770 [ 1740.126753][ T9902] __should_failslab+0x11a/0x160 [ 1740.131698][ T9902] ? tomoyo_encode2+0x273/0x5a0 [ 1740.136561][ T9902] should_failslab+0x9/0x20 [ 1740.136572][ T9902] __kmalloc+0x7a/0x340 [ 1740.136587][ T9902] tomoyo_encode2+0x273/0x5a0 [ 1740.136600][ T9902] tomoyo_realpath_from_path+0x769/0x7c0 [ 1740.145327][ T9902] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1740.145355][ T9902] tomoyo_file_open+0x141/0x190 [ 1740.145368][ T9902] security_file_open+0x65/0x2f0 [ 1740.145379][ T9902] do_dentry_open+0x34e/0xf90 [ 1740.145395][ T9902] vfs_open+0x73/0x80 [ 1740.145408][ T9902] path_openat+0x1397/0x4460 [ 1740.175949][ T9902] ? getname+0x19/0x20 [ 1740.184490][ T9902] ? trace_event_raw_event_lock+0x1a0/0x1a0 20:37:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1740.194407][ T9902] ? trace_lock_release+0x135/0x1a0 [ 1740.199589][ T9902] ? __alloc_fd+0x58f/0x630 [ 1740.204076][ T9902] do_filp_open+0x192/0x3d0 [ 1740.208596][ T9902] do_sys_open+0x29f/0x560 [ 1740.213016][ T9902] __x64_sys_open+0x87/0x90 [ 1740.217517][ T9902] do_syscall_64+0xfe/0x140 [ 1740.222018][ T9902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1740.227991][ T9902] RIP: 0033:0x413761 [ 1740.231891][ T9902] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1740.251542][ T9902] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1740.260045][ T9902] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1740.260051][ T9902] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 [ 1740.260055][ T9902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1740.260061][ T9902] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 20:37:15 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x1, 0x189) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x7fff, 0xdfa3}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000003c0)={0x95, ""/149}) open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x8) 20:37:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x900}], 0x2, 0x0) [ 1740.260066][ T9902] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1740.385531][ T9902] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:15 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:15 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xa00}], 0x2, 0x0) [ 1740.568323][T10336] FAULT_INJECTION: forcing a failure. [ 1740.568323][T10336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1740.581561][T10336] CPU: 0 PID: 10336 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1740.581574][T10336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1740.599491][T10336] Call Trace: [ 1740.602778][T10336] dump_stack+0x1d8/0x2f8 [ 1740.607111][T10336] should_fail+0x555/0x770 [ 1740.611525][T10336] should_fail_alloc_page+0x55/0x60 [ 1740.616716][T10336] prepare_alloc_pages+0x283/0x470 [ 1740.616729][T10336] __alloc_pages_nodemask+0xb2/0x5d0 [ 1740.616746][T10336] kmem_getpages+0x56/0xa20 [ 1740.616757][T10336] cache_grow_begin+0x7e/0x2c0 [ 1740.616770][T10336] cache_alloc_refill+0x311/0x3f0 [ 1740.627130][T10336] ? check_preemption_disabled+0xb7/0x2a0 [ 1740.636352][T10336] __kmalloc+0x318/0x340 [ 1740.636363][T10336] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1740.636374][T10336] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1740.636387][T10336] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1740.636414][T10336] tomoyo_file_open+0x141/0x190 [ 1740.673693][T10336] security_file_open+0x65/0x2f0 [ 1740.678625][T10336] do_dentry_open+0x34e/0xf90 [ 1740.678642][T10336] vfs_open+0x73/0x80 [ 1740.687261][T10336] path_openat+0x1397/0x4460 [ 1740.691884][T10336] ? getname+0x19/0x20 [ 1740.695958][T10336] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1740.701864][T10336] ? trace_lock_release+0x135/0x1a0 [ 1740.707062][T10336] ? __alloc_fd+0x58f/0x630 [ 1740.711713][T10336] do_filp_open+0x192/0x3d0 [ 1740.716223][T10336] do_sys_open+0x29f/0x560 [ 1740.720629][T10336] __x64_sys_open+0x87/0x90 [ 1740.725113][T10336] do_syscall_64+0xfe/0x140 [ 1740.725127][T10336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1740.725135][T10336] RIP: 0033:0x413761 [ 1740.725145][T10336] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1740.725149][T10336] RSP: 002b:00007f1a4668ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 20:37:16 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xb00}], 0x2, 0x0) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1740.725158][T10336] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 1740.725167][T10336] RDX: 00007f1a4668eb0a RSI: 0000000000000002 RDI: 00007f1a4668eb00 [ 1740.783422][T10336] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1740.791485][T10336] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1740.799456][T10336] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:16 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:16 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) r1 = msgget(0x0, 0x112) msgsnd(r1, &(0x7f0000000580)={0x3, "5a107d98978e4565d0f3c5a7e0f2226c5522248b9e8ef14bbc6bab8c6020c47ab7775aecedda73734ab94d884c875bbfa77fafe6f92eed1cdba964d986bd3f7013c2af9b9de493983e77a80f73520d31e1eafc82ea716004f5f7ab920fc704446b81e3f3fdcdbad2996996da87225e1a36ab6bfacf6a94d9ed56e7bb851306de8fc0290630aee25039c8c474999e477e006caa315fe2d3fbb110e34714962a65b2c4aacf4641e9150890b613cd64fe2422bd9fa7d9c4899b606bc5a22bb22272fdc9a13a3ea849ea"}, 0xd0, 0x800) msgsnd(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000000000021495bd4a28d81989732a0f663ffd147a32d79d137572ac1f68c40bcca6e38223bd9dd72e4c4c6fb301aa83fb55854b0923486aa6a730360dc81a44fffe900bd62a4f00e53488ee4635ce14dcafa705e5b77eda8a4dc4c090706806587d28ff31e9cf1f308c64599da03fd4749551750ace7c715791e47776b24e6256281c2dc6ca01bdc172d026af3274b1548b28ff679254049316bbfc41934934a069667e2fe7dc58479a81085df9d9981f6ca08694c7cda8045b263742750d95ae0ddbd152a6b072de0b969481ed3a8751dfcfafd440acd134d854532a08107c0a8a3"], 0xe6, 0x800) 20:37:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc00}], 0x2, 0x0) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1741.100711][T10683] FAULT_INJECTION: forcing a failure. [ 1741.100711][T10683] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1741.113955][T10683] CPU: 1 PID: 10683 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1741.121835][T10683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1741.131973][T10683] Call Trace: [ 1741.135262][T10683] dump_stack+0x1d8/0x2f8 [ 1741.139599][T10683] should_fail+0x555/0x770 [ 1741.144016][T10683] should_fail_alloc_page+0x55/0x60 [ 1741.149204][T10683] prepare_alloc_pages+0x283/0x470 [ 1741.149218][T10683] __alloc_pages_nodemask+0xb2/0x5d0 [ 1741.149226][T10683] ? stack_trace_save+0x150/0x150 [ 1741.149243][T10683] kmem_getpages+0x56/0xa20 [ 1741.164692][T10683] cache_grow_begin+0x7e/0x2c0 [ 1741.164704][T10683] cache_alloc_refill+0x311/0x3f0 [ 1741.164718][T10683] ? check_preemption_disabled+0xb7/0x2a0 [ 1741.184650][T10683] __kmalloc+0x318/0x340 [ 1741.188929][T10683] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1741.194646][T10683] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1741.200193][T10683] tomoyo_path_number_perm+0x166/0x640 [ 1741.205663][T10683] ? smack_file_ioctl+0x226/0x2e0 [ 1741.210680][T10683] ? __fget+0x471/0x510 [ 1741.214836][T10683] tomoyo_file_ioctl+0x23/0x30 [ 1741.219593][T10683] security_file_ioctl+0x6d/0xd0 [ 1741.224525][T10683] __x64_sys_ioctl+0xa3/0x120 [ 1741.224537][T10683] do_syscall_64+0xfe/0x140 [ 1741.224551][T10683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1741.233696][T10683] RIP: 0033:0x4596e7 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1741.243427][T10683] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1741.263023][T10683] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1741.271426][T10683] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1741.279393][T10683] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1741.287362][T10683] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 20:37:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xd00}], 0x2, 0x0) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1741.295342][T10683] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1741.303318][T10683] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:16 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:16 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:16 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x9, 0x3f}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0xf5}, &(0x7f00000001c0)=0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1741.517608][T11012] FAULT_INJECTION: forcing a failure. [ 1741.517608][T11012] name failslab, interval 1, probability 0, space 0, times 0 20:37:16 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1741.584737][T11012] CPU: 0 PID: 11012 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1741.592679][T11012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1741.602737][T11012] Call Trace: [ 1741.606027][T11012] dump_stack+0x1d8/0x2f8 [ 1741.606041][T11012] should_fail+0x555/0x770 [ 1741.606056][T11012] __should_failslab+0x11a/0x160 [ 1741.606068][T11012] ? tomoyo_encode2+0x273/0x5a0 [ 1741.624538][T11012] should_failslab+0x9/0x20 [ 1741.629035][T11012] __kmalloc+0x7a/0x340 [ 1741.629050][T11012] tomoyo_encode2+0x273/0x5a0 [ 1741.637847][T11012] tomoyo_realpath_from_path+0x769/0x7c0 [ 1741.643475][T11012] tomoyo_path_number_perm+0x166/0x640 [ 1741.649287][T11012] ? smack_file_ioctl+0x226/0x2e0 [ 1741.654307][T11012] ? __fget+0x471/0x510 [ 1741.658453][T11012] tomoyo_file_ioctl+0x23/0x30 [ 1741.663203][T11012] security_file_ioctl+0x6d/0xd0 [ 1741.668131][T11012] __x64_sys_ioctl+0xa3/0x120 [ 1741.672804][T11012] do_syscall_64+0xfe/0x140 [ 1741.677301][T11012] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:37:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1741.683182][T11012] RIP: 0033:0x4596e7 [ 1741.687073][T11012] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1741.706673][T11012] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1741.715082][T11012] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1741.723046][T11012] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 20:37:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xe00}], 0x2, 0x0) 20:37:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1741.730999][T11012] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1741.731005][T11012] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1741.731009][T11012] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1741.782344][T11012] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:17 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:17 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce9514729"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1100}], 0x2, 0x0) 20:37:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:17 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce9514729"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1741.988501][T11273] FAULT_INJECTION: forcing a failure. [ 1741.988501][T11273] name failslab, interval 1, probability 0, space 0, times 0 [ 1742.023221][T11273] CPU: 1 PID: 11273 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1742.031158][T11273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1742.041215][T11273] Call Trace: [ 1742.044503][T11273] dump_stack+0x1d8/0x2f8 [ 1742.048831][T11273] should_fail+0x555/0x770 [ 1742.053245][T11273] __should_failslab+0x11a/0x160 [ 1742.058168][T11273] ? loop_set_fd+0x1180/0x1180 [ 1742.062980][T11273] should_failslab+0x9/0x20 [ 1742.067468][T11273] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1742.072727][T11273] ? __kthread_create_on_node+0xb2/0x3b0 [ 1742.078428][T11273] ? loop_set_fd+0x1180/0x1180 [ 1742.083164][T11273] __kthread_create_on_node+0xb2/0x3b0 [ 1742.088601][T11273] ? loop_set_fd+0x1180/0x1180 [ 1742.093338][T11273] kthread_create_on_node+0x72/0xa0 [ 1742.098508][T11273] ? lockdep_init_map+0x2a/0x680 [ 1742.103419][T11273] ? __kthread_init_worker+0x5a/0xe0 [ 1742.108682][T11273] loop_set_fd+0x6a8/0x1180 [ 1742.113182][T11273] ? check_preemption_disabled+0xb7/0x2a0 [ 1742.118974][T11273] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1742.124585][T11273] lo_ioctl+0xd5/0x2200 [ 1742.128714][T11273] ? __kasan_slab_free+0x12a/0x1e0 [ 1742.133795][T11273] ? kasan_slab_free+0xe/0x10 [ 1742.138445][T11273] ? kfree+0x115/0x200 [ 1742.142486][T11273] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1742.148105][T11273] ? tomoyo_file_ioctl+0x23/0x30 [ 1742.153031][T11273] ? security_file_ioctl+0x6d/0xd0 [ 1742.158117][T11273] ? __x64_sys_ioctl+0xa3/0x120 [ 1742.162939][T11273] ? do_syscall_64+0xfe/0x140 [ 1742.167589][T11273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1742.173626][T11273] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1742.179495][T11273] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1742.185198][T11273] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1742.190890][T11273] ? trace_lock_release+0x135/0x1a0 [ 1742.196176][T11273] ? check_preemption_disabled+0x47/0x2a0 [ 1742.201868][T11273] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1742.207561][T11273] ? rcu_lock_release+0x9/0x30 [ 1742.212297][T11273] ? debug_smp_processor_id+0x1c/0x20 [ 1742.217641][T11273] ? perf_trace_lock+0x90/0x360 [ 1742.222463][T11273] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1742.228326][T11273] ? rcu_lock_release+0x9/0x30 [ 1742.233063][T11273] ? rcu_lock_release+0x9/0x30 [ 1742.237797][T11273] ? trace_lock_release+0x135/0x1a0 [ 1742.242975][T11273] ? rcu_lock_release+0x9/0x30 [ 1742.247714][T11273] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1742.253321][T11273] ? lo_release+0x1f0/0x1f0 [ 1742.257795][T11273] blkdev_ioctl+0x807/0x2990 [ 1742.262382][T11273] ? tomoyo_path_number_perm+0x53e/0x640 [ 1742.267993][T11273] block_ioctl+0xbd/0x100 [ 1742.272291][T11273] ? blkdev_iopoll+0x100/0x100 [ 1742.277026][T11273] do_vfs_ioctl+0x744/0x1730 [ 1742.281585][T11273] ? __fget+0x471/0x510 [ 1742.285719][T11273] ? tomoyo_file_ioctl+0x23/0x30 [ 1742.290628][T11273] ? security_file_ioctl+0xa1/0xd0 [ 1742.295716][T11273] __x64_sys_ioctl+0xe3/0x120 [ 1742.300368][T11273] do_syscall_64+0xfe/0x140 [ 1742.304879][T11273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1742.310744][T11273] RIP: 0033:0x4596e7 [ 1742.314615][T11273] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:37:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x10800000000e004, 0x13f, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x7c3}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000240)=""/202, 0xca}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000140)=""/10, 0xa}, {&(0x7f00000001c0)=""/52, 0x34}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/67, 0x43}, {&(0x7f0000000440)=""/103, 0x67}, {&(0x7f0000000340)}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f0000001640)=""/139, 0x8b}], 0xa}, 0x2) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000017c0)={0x0, @in6={{0xa, 0x4e21, 0x2, @mcast2, 0x4}}, [0x8, 0x3, 0xffffffffffff0001, 0x6, 0xd1, 0x5, 0x3cd, 0x10000, 0x8, 0x9, 0x4, 0x0, 0xfffffffffffffff8, 0x8]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000018c0)={r3, @in={{0x2, 0x4e20, @empty}}}, 0x84) [ 1742.334192][T11273] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1742.342756][T11273] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1742.350706][T11273] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1742.358650][T11273] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1742.366596][T11273] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1742.374547][T11273] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1200}], 0x2, 0x0) 20:37:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:17 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:17 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x2500}], 0x2, 0x0) 20:37:17 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1742.559097][T11582] FAULT_INJECTION: forcing a failure. [ 1742.559097][T11582] name failslab, interval 1, probability 0, space 0, times 0 20:37:18 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1742.599789][T11582] CPU: 0 PID: 11582 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1742.607720][T11582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1742.617766][T11582] Call Trace: [ 1742.621037][T11582] dump_stack+0x1d8/0x2f8 [ 1742.625351][T11582] should_fail+0x555/0x770 [ 1742.629768][T11582] __should_failslab+0x11a/0x160 [ 1742.634705][T11582] ? __kernfs_new_node+0x97/0x6b0 [ 1742.639721][T11582] should_failslab+0x9/0x20 [ 1742.644225][T11582] kmem_cache_alloc+0x56/0x2e0 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x2667}], 0x2, 0x0) [ 1742.648986][T11582] __kernfs_new_node+0x97/0x6b0 [ 1742.653913][T11582] ? check_preemption_disabled+0x47/0x2a0 [ 1742.659626][T11582] ? finish_task_switch+0x35b/0x550 [ 1742.664847][T11582] ? debug_smp_processor_id+0x1c/0x20 [ 1742.670209][T11582] ? perf_trace_lock+0x90/0x360 [ 1742.675055][T11582] kernfs_new_node+0x97/0x180 [ 1742.679732][T11582] kernfs_create_dir_ns+0x44/0x130 [ 1742.684841][T11582] internal_create_group+0x207/0xd90 [ 1742.690129][T11582] sysfs_create_group+0x1f/0x30 [ 1742.694975][T11582] loop_set_fd+0xcb2/0x1180 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3e80}], 0x2, 0x0) [ 1742.699480][T11582] lo_ioctl+0xd5/0x2200 [ 1742.703627][T11582] ? __kasan_slab_free+0x12a/0x1e0 [ 1742.708737][T11582] ? kasan_slab_free+0xe/0x10 [ 1742.713407][T11582] ? kfree+0x115/0x200 [ 1742.717468][T11582] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1742.723177][T11582] ? tomoyo_file_ioctl+0x23/0x30 [ 1742.735177][T11582] ? security_file_ioctl+0x6d/0xd0 [ 1742.740373][T11582] ? __x64_sys_ioctl+0xa3/0x120 [ 1742.745225][T11582] ? do_syscall_64+0xfe/0x140 [ 1742.749914][T11582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1742.755998][T11582] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1742.761881][T11582] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1742.767765][T11582] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1742.773477][T11582] ? trace_lock_release+0x135/0x1a0 [ 1742.778668][T11582] ? check_preemption_disabled+0x47/0x2a0 [ 1742.784382][T11582] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1742.790095][T11582] ? rcu_lock_release+0x9/0x30 [ 1742.794852][T11582] ? debug_smp_processor_id+0x1c/0x20 [ 1742.800353][T11582] ? perf_trace_lock+0x90/0x360 [ 1742.805374][T11582] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1742.811255][T11582] ? rcu_lock_release+0x9/0x30 [ 1742.816115][T11582] ? rcu_lock_release+0x9/0x30 [ 1742.820944][T11582] ? trace_lock_release+0x135/0x1a0 [ 1742.826126][T11582] ? rcu_lock_release+0x9/0x30 [ 1742.830878][T11582] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1742.836487][T11582] ? lo_release+0x1f0/0x1f0 [ 1742.841051][T11582] blkdev_ioctl+0x807/0x2990 [ 1742.845632][T11582] ? tomoyo_path_number_perm+0x53e/0x640 [ 1742.851269][T11582] block_ioctl+0xbd/0x100 [ 1742.855574][T11582] ? blkdev_iopoll+0x100/0x100 [ 1742.860337][T11582] do_vfs_ioctl+0x744/0x1730 [ 1742.864913][T11582] ? __fget+0x471/0x510 [ 1742.869055][T11582] ? tomoyo_file_ioctl+0x23/0x30 [ 1742.873980][T11582] ? security_file_ioctl+0xa1/0xd0 [ 1742.879067][T11582] __x64_sys_ioctl+0xe3/0x120 [ 1742.883746][T11582] do_syscall_64+0xfe/0x140 [ 1742.888230][T11582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1742.894222][T11582] RIP: 0033:0x4596e7 [ 1742.898112][T11582] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1742.917696][T11582] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1742.926241][T11582] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1742.934283][T11582] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1742.942316][T11582] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3ec0}], 0x2, 0x0) 20:37:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='cpuacct.usawe_per\x81zlW\xd9\xf3\a\xc8\xd9\xfa\x8d\xae\x8ecpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) read$char_usb(r1, &(0x7f00000003c0)=""/178, 0xb2) [ 1742.950369][T11582] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1742.958315][T11582] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:18 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:18 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:18 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3f00}], 0x2, 0x0) 20:37:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:18 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1743.220806][T12259] FAULT_INJECTION: forcing a failure. [ 1743.220806][T12259] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.235149][T12259] CPU: 0 PID: 12259 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1743.243054][T12259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1743.253095][T12259] Call Trace: [ 1743.256410][T12259] dump_stack+0x1d8/0x2f8 [ 1743.260738][T12259] should_fail+0x555/0x770 [ 1743.265152][T12259] __should_failslab+0x11a/0x160 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x4000}], 0x2, 0x0) 20:37:18 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da3720000000000"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1743.270182][T12259] ? __kernfs_new_node+0x97/0x6b0 [ 1743.275203][T12259] should_failslab+0x9/0x20 [ 1743.279701][T12259] kmem_cache_alloc+0x56/0x2e0 [ 1743.284462][T12259] __kernfs_new_node+0x97/0x6b0 [ 1743.289306][T12259] ? check_preemption_disabled+0x47/0x2a0 [ 1743.295015][T12259] ? finish_task_switch+0x35b/0x550 [ 1743.300205][T12259] ? debug_smp_processor_id+0x1c/0x20 [ 1743.305565][T12259] ? perf_trace_lock+0x90/0x360 [ 1743.310421][T12259] kernfs_new_node+0x97/0x180 [ 1743.315092][T12259] kernfs_create_dir_ns+0x44/0x130 20:37:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x5c00}], 0x2, 0x0) [ 1743.320200][T12259] internal_create_group+0x207/0xd90 [ 1743.325522][T12259] sysfs_create_group+0x1f/0x30 [ 1743.330369][T12259] loop_set_fd+0xcb2/0x1180 [ 1743.334877][T12259] lo_ioctl+0xd5/0x2200 [ 1743.339024][T12259] ? __kasan_slab_free+0x12a/0x1e0 [ 1743.344132][T12259] ? kasan_slab_free+0xe/0x10 [ 1743.348945][T12259] ? kfree+0x115/0x200 [ 1743.353017][T12259] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1743.358638][T12259] ? tomoyo_file_ioctl+0x23/0x30 [ 1743.363564][T12259] ? security_file_ioctl+0x6d/0xd0 [ 1743.368701][T12259] ? __x64_sys_ioctl+0xa3/0x120 [ 1743.373552][T12259] ? do_syscall_64+0xfe/0x140 [ 1743.378225][T12259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.384288][T12259] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1743.390171][T12259] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1743.395883][T12259] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1743.401599][T12259] ? trace_lock_release+0x135/0x1a0 [ 1743.406788][T12259] ? check_preemption_disabled+0x47/0x2a0 [ 1743.412497][T12259] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1743.418200][T12259] ? rcu_lock_release+0x9/0x30 [ 1743.422936][T12259] ? debug_smp_processor_id+0x1c/0x20 [ 1743.428278][T12259] ? perf_trace_lock+0x90/0x360 [ 1743.433102][T12259] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1743.438967][T12259] ? rcu_lock_release+0x9/0x30 [ 1743.443700][T12259] ? rcu_lock_release+0x9/0x30 [ 1743.448445][T12259] ? trace_lock_release+0x135/0x1a0 [ 1743.453614][T12259] ? rcu_lock_release+0x9/0x30 [ 1743.458354][T12259] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1743.463977][T12259] ? lo_release+0x1f0/0x1f0 [ 1743.468460][T12259] blkdev_ioctl+0x807/0x2990 [ 1743.473026][T12259] ? tomoyo_path_number_perm+0x53e/0x640 [ 1743.478641][T12259] block_ioctl+0xbd/0x100 [ 1743.482945][T12259] ? blkdev_iopoll+0x100/0x100 [ 1743.487685][T12259] do_vfs_ioctl+0x744/0x1730 [ 1743.492245][T12259] ? __fget+0x471/0x510 [ 1743.496387][T12259] ? tomoyo_file_ioctl+0x23/0x30 [ 1743.501323][T12259] ? security_file_ioctl+0xa1/0xd0 [ 1743.506407][T12259] __x64_sys_ioctl+0xe3/0x120 [ 1743.511060][T12259] do_syscall_64+0xfe/0x140 [ 1743.515794][T12259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1743.521679][T12259] RIP: 0033:0x4596e7 [ 1743.525579][T12259] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1743.545168][T12259] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1743.553550][T12259] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1743.561499][T12259] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 20:37:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) setitimer(0x2, &(0x7f00000001c0)={{}, {0x77359400}}, &(0x7f0000000240)) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000000)="a54b", 0x2}, {&(0x7f0000000040)="46caf0903b1074b9eb2ead8f7fb46993e90d226e7d574301e974819fe36d92b7c1ae48089575b04a105be325dfd50cdb03dba5500c4100eb566916872973f45fd4cc8f2f103377de92d84eed11012ade4f13209191f36f7774a3bd3ca25f34ba09fd547933a7c12189142fa1a8633dfd0d37631023e71a46149844ab184364876463ed4c9e5c3d0b961b3bd5f0ef7ab6ef18596e5e2ec953df2e617da6e524593b0dcf4c9836f2c497e1523a25ae6ef878e239c8", 0xb4}, {&(0x7f00000003c0)="9afe564be48716ec9694298c55108ba629ae4b523eb7f0f6aa5c404b40375c1d709aba8fa990774793d4c0f3a626c545610e55f16fced72ec9a22640bff277d5573157f34cdd722288e045847678df045b2b6e38c950bc208be4f3fff9bbf93f0673d00b6eaa5399cd3fdf59b534f40dc1a51025e01c131dfc73148f3af0bce50fae271923cfc330b63eb758f5f6ed04880bb4a137707808faa696c15ebab41716d50d899e5780c77a6116b7b24bf77c7733715b79ace8221a60d75421e093bfa73c6f34902983335e302404fd65070e50a6a69b70af7909ca3e81f67e6fb7dd24ce31f209fa530d5126c5c1", 0xec}], 0x3, 0x4) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x6726}], 0x2, 0x0) [ 1743.569445][T12259] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1743.577397][T12259] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1743.585358][T12259] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:19 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x803e}], 0x2, 0x0) 20:37:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc000}], 0x2, 0x0) 20:37:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x400400, 0x10000) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000000)={[0x4, 0x4000, 0x2000], 0x0, 0x22, 0xa48e}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') utimensat(r0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1002}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x150, r2, 0x408, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe82}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x467605ef}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x149}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 20:37:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 1743.968288][T12906] FAULT_INJECTION: forcing a failure. [ 1743.968288][T12906] name failslab, interval 1, probability 0, space 0, times 0 [ 1743.981003][T12906] CPU: 0 PID: 12906 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1743.988883][T12906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1743.998920][T12906] Call Trace: [ 1744.002193][T12906] dump_stack+0x1d8/0x2f8 [ 1744.006503][T12906] should_fail+0x555/0x770 [ 1744.010905][T12906] __should_failslab+0x11a/0x160 [ 1744.015830][T12906] ? radix_tree_node_alloc+0x1a1/0x370 [ 1744.021278][T12906] should_failslab+0x9/0x20 [ 1744.025761][T12906] kmem_cache_alloc+0x56/0x2e0 [ 1744.030504][T12906] ? radix_tree_node_alloc+0x1a1/0x370 [ 1744.035970][T12906] radix_tree_node_alloc+0x1a1/0x370 [ 1744.041239][T12906] idr_get_free+0x2b8/0x890 [ 1744.045721][T12906] ? __fs_reclaim_release+0x4/0x20 [ 1744.050814][T12906] idr_alloc_cyclic+0x18b/0x550 [ 1744.055748][T12906] __kernfs_new_node+0x124/0x6b0 [ 1744.060673][T12906] ? debug_smp_processor_id+0x1c/0x20 [ 1744.066032][T12906] ? perf_trace_lock+0x90/0x360 [ 1744.070867][T12906] kernfs_new_node+0x97/0x180 [ 1744.075530][T12906] kernfs_create_dir_ns+0x44/0x130 [ 1744.080629][T12906] internal_create_group+0x207/0xd90 [ 1744.085901][T12906] sysfs_create_group+0x1f/0x30 [ 1744.090729][T12906] loop_set_fd+0xcb2/0x1180 [ 1744.095251][T12906] lo_ioctl+0xd5/0x2200 [ 1744.099392][T12906] ? __kasan_slab_free+0x12a/0x1e0 [ 1744.104489][T12906] ? kasan_slab_free+0xe/0x10 [ 1744.109160][T12906] ? kfree+0x115/0x200 [ 1744.113218][T12906] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1744.118837][T12906] ? tomoyo_file_ioctl+0x23/0x30 [ 1744.123766][T12906] ? security_file_ioctl+0x6d/0xd0 [ 1744.128859][T12906] ? __x64_sys_ioctl+0xa3/0x120 [ 1744.133689][T12906] ? do_syscall_64+0xfe/0x140 [ 1744.138345][T12906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1744.144390][T12906] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1744.150346][T12906] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1744.156044][T12906] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1744.161748][T12906] ? trace_lock_release+0x135/0x1a0 [ 1744.166921][T12906] ? check_preemption_disabled+0x47/0x2a0 [ 1744.172613][T12906] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1744.178310][T12906] ? rcu_lock_release+0x9/0x30 [ 1744.183050][T12906] ? debug_smp_processor_id+0x1c/0x20 [ 1744.188397][T12906] ? perf_trace_lock+0x90/0x360 [ 1744.193225][T12906] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1744.199090][T12906] ? rcu_lock_release+0x9/0x30 [ 1744.203833][T12906] ? rcu_lock_release+0x9/0x30 [ 1744.208591][T12906] ? trace_lock_release+0x135/0x1a0 [ 1744.213762][T12906] ? rcu_lock_release+0x9/0x30 [ 1744.218508][T12906] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1744.224116][T12906] ? lo_release+0x1f0/0x1f0 [ 1744.228596][T12906] blkdev_ioctl+0x807/0x2990 [ 1744.233164][T12906] ? tomoyo_path_number_perm+0x53e/0x640 [ 1744.238784][T12906] block_ioctl+0xbd/0x100 [ 1744.243088][T12906] ? blkdev_iopoll+0x100/0x100 [ 1744.247829][T12906] do_vfs_ioctl+0x744/0x1730 [ 1744.252393][T12906] ? __fget+0x471/0x510 [ 1744.256544][T12906] ? tomoyo_file_ioctl+0x23/0x30 [ 1744.261470][T12906] ? security_file_ioctl+0xa1/0xd0 [ 1744.266580][T12906] __x64_sys_ioctl+0xe3/0x120 [ 1744.271250][T12906] do_syscall_64+0xfe/0x140 [ 1744.275741][T12906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1744.281626][T12906] RIP: 0033:0x4596e7 [ 1744.285516][T12906] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1744.305096][T12906] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1744.313485][T12906] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1744.321450][T12906] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1744.329396][T12906] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1744.337344][T12906] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1744.345290][T12906] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1744.403903][T13006] FAT-fs (loop5): bogus number of reserved sectors [ 1744.425263][T13006] FAT-fs (loop5): Can't find a valid FAT filesystem 20:37:19 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc03e}], 0x2, 0x0) 20:37:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:19 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0xc4400, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', r1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000001c0)={r0, r2}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000000)={0x80000001, 0x41be3613, 0x5470}, 0xc) 20:37:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1744.581331][T13128] FAULT_INJECTION: forcing a failure. [ 1744.581331][T13128] name failslab, interval 1, probability 0, space 0, times 0 [ 1744.600176][T13128] CPU: 1 PID: 13128 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1744.608085][T13128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1744.618119][T13128] Call Trace: [ 1744.621384][T13128] dump_stack+0x1d8/0x2f8 [ 1744.625688][T13128] should_fail+0x555/0x770 [ 1744.630081][T13128] __should_failslab+0x11a/0x160 [ 1744.634993][T13128] ? __kernfs_new_node+0x97/0x6b0 [ 1744.639992][T13128] should_failslab+0x9/0x20 [ 1744.644479][T13128] kmem_cache_alloc+0x56/0x2e0 [ 1744.649215][T13128] __kernfs_new_node+0x97/0x6b0 [ 1744.654052][T13128] ? __kasan_check_write+0x14/0x20 [ 1744.659137][T13128] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 1744.664741][T13128] ? mutex_unlock+0xd/0x10 [ 1744.669128][T13128] ? kernfs_activate+0x213/0x230 [ 1744.674053][T13128] kernfs_new_node+0x97/0x180 [ 1744.678706][T13128] __kernfs_create_file+0x4a/0x2f0 [ 1744.683911][T13128] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1744.689257][T13128] internal_create_group+0x4be/0xd90 [ 1744.694524][T13128] sysfs_create_group+0x1f/0x30 [ 1744.699353][T13128] loop_set_fd+0xcb2/0x1180 [ 1744.703847][T13128] lo_ioctl+0xd5/0x2200 [ 1744.707974][T13128] ? __kasan_slab_free+0x12a/0x1e0 [ 1744.713055][T13128] ? kasan_slab_free+0xe/0x10 [ 1744.717702][T13128] ? kfree+0x115/0x200 [ 1744.721740][T13128] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1744.727343][T13128] ? tomoyo_file_ioctl+0x23/0x30 [ 1744.732252][T13128] ? security_file_ioctl+0x6d/0xd0 [ 1744.737336][T13128] ? __x64_sys_ioctl+0xa3/0x120 [ 1744.742162][T13128] ? do_syscall_64+0xfe/0x140 [ 1744.746821][T13128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1744.752860][T13128] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1744.758726][T13128] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1744.764414][T13128] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1744.770125][T13128] ? trace_lock_release+0x135/0x1a0 [ 1744.775315][T13128] ? check_preemption_disabled+0x47/0x2a0 [ 1744.781009][T13128] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1744.786701][T13128] ? rcu_lock_release+0x9/0x30 [ 1744.791532][T13128] ? debug_smp_processor_id+0x1c/0x20 [ 1744.796877][T13128] ? perf_trace_lock+0x90/0x360 [ 1744.801701][T13128] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1744.807572][T13128] ? rcu_lock_release+0x9/0x30 [ 1744.812320][T13128] ? rcu_lock_release+0x9/0x30 [ 1744.817067][T13128] ? trace_lock_release+0x135/0x1a0 [ 1744.822239][T13128] ? rcu_lock_release+0x9/0x30 [ 1744.826976][T13128] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1744.832595][T13128] ? lo_release+0x1f0/0x1f0 [ 1744.837072][T13128] blkdev_ioctl+0x807/0x2990 [ 1744.841636][T13128] ? tomoyo_path_number_perm+0x53e/0x640 [ 1744.847255][T13128] block_ioctl+0xbd/0x100 [ 1744.851556][T13128] ? blkdev_iopoll+0x100/0x100 [ 1744.856292][T13128] do_vfs_ioctl+0x744/0x1730 [ 1744.860855][T13128] ? __fget+0x471/0x510 [ 1744.864984][T13128] ? tomoyo_file_ioctl+0x23/0x30 [ 1744.869922][T13128] ? security_file_ioctl+0xa1/0xd0 [ 1744.875012][T13128] __x64_sys_ioctl+0xe3/0x120 [ 1744.879673][T13128] do_syscall_64+0xfe/0x140 [ 1744.884152][T13128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1744.890015][T13128] RIP: 0033:0x4596e7 [ 1744.893887][T13128] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1744.913474][T13128] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1744.921891][T13128] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 20:37:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x33fe0}], 0x2, 0x0) [ 1744.929837][T13128] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1744.937780][T13128] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1744.945726][T13128] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1744.953692][T13128] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(0xffffffffffffffff, r0, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:20 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:20 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x10) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='vmnet0}\x00', r1) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:20 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(0xffffffffffffffff, r0, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:20 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x34000}], 0x2, 0x0) [ 1745.231740][T13454] FAULT_INJECTION: forcing a failure. [ 1745.231740][T13454] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.244967][T13454] CPU: 1 PID: 13454 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1745.252886][T13454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1745.262951][T13454] Call Trace: [ 1745.266238][T13454] dump_stack+0x1d8/0x2f8 [ 1745.270548][T13454] should_fail+0x555/0x770 [ 1745.274944][T13454] __should_failslab+0x11a/0x160 [ 1745.279867][T13454] ? __kernfs_new_node+0x97/0x6b0 [ 1745.284879][T13454] should_failslab+0x9/0x20 [ 1745.289372][T13454] kmem_cache_alloc+0x56/0x2e0 [ 1745.294129][T13454] __kernfs_new_node+0x97/0x6b0 [ 1745.298958][T13454] ? __kasan_check_write+0x14/0x20 [ 1745.304068][T13454] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 1745.309675][T13454] ? mutex_unlock+0xd/0x10 [ 1745.314086][T13454] ? kernfs_activate+0x213/0x230 [ 1745.318999][T13454] kernfs_new_node+0x97/0x180 [ 1745.323653][T13454] __kernfs_create_file+0x4a/0x2f0 [ 1745.328750][T13454] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1745.334104][T13454] internal_create_group+0x4be/0xd90 [ 1745.339381][T13454] sysfs_create_group+0x1f/0x30 [ 1745.344227][T13454] loop_set_fd+0xcb2/0x1180 [ 1745.348736][T13454] lo_ioctl+0xd5/0x2200 [ 1745.352973][T13454] ? __kasan_slab_free+0x12a/0x1e0 [ 1745.358065][T13454] ? kasan_slab_free+0xe/0x10 [ 1745.362714][T13454] ? kfree+0x115/0x200 [ 1745.366782][T13454] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1745.372394][T13454] ? tomoyo_file_ioctl+0x23/0x30 [ 1745.377325][T13454] ? security_file_ioctl+0x6d/0xd0 [ 1745.382417][T13454] ? __x64_sys_ioctl+0xa3/0x120 [ 1745.387251][T13454] ? do_syscall_64+0xfe/0x140 [ 1745.391906][T13454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1745.397963][T13454] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1745.403843][T13454] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1745.410707][T13454] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1745.416407][T13454] ? trace_lock_release+0x135/0x1a0 [ 1745.421680][T13454] ? check_preemption_disabled+0x47/0x2a0 [ 1745.427400][T13454] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1745.433096][T13454] ? rcu_lock_release+0x9/0x30 [ 1745.437842][T13454] ? debug_smp_processor_id+0x1c/0x20 [ 1745.443187][T13454] ? perf_trace_lock+0x90/0x360 [ 1745.448013][T13454] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1745.453880][T13454] ? rcu_lock_release+0x9/0x30 [ 1745.458619][T13454] ? rcu_lock_release+0x9/0x30 [ 1745.463355][T13454] ? trace_lock_release+0x135/0x1a0 [ 1745.468525][T13454] ? rcu_lock_release+0x9/0x30 [ 1745.473261][T13454] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1745.478869][T13454] ? lo_release+0x1f0/0x1f0 [ 1745.483361][T13454] blkdev_ioctl+0x807/0x2990 [ 1745.487943][T13454] ? tomoyo_path_number_perm+0x53e/0x640 [ 1745.493572][T13454] block_ioctl+0xbd/0x100 [ 1745.497874][T13454] ? blkdev_iopoll+0x100/0x100 [ 1745.502831][T13454] do_vfs_ioctl+0x744/0x1730 [ 1745.507396][T13454] ? __fget+0x471/0x510 [ 1745.511528][T13454] ? tomoyo_file_ioctl+0x23/0x30 [ 1745.516445][T13454] ? security_file_ioctl+0xa1/0xd0 [ 1745.521558][T13454] __x64_sys_ioctl+0xe3/0x120 [ 1745.526216][T13454] do_syscall_64+0xfe/0x140 [ 1745.530716][T13454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1745.536585][T13454] RIP: 0033:0x4596e7 [ 1745.540459][T13454] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1745.560048][T13454] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1745.568445][T13454] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1745.576420][T13454] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1745.584400][T13454] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1745.592352][T13454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1745.600301][T13454] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:21 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x40000}], 0x2, 0x0) 20:37:21 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(0xffffffffffffffff, r0, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:21 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:21 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='pids.current\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:21 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x400300}], 0x2, 0x0) 20:37:21 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1745.861352][T13796] FAULT_INJECTION: forcing a failure. [ 1745.861352][T13796] name failslab, interval 1, probability 0, space 0, times 0 [ 1745.879303][T13796] CPU: 0 PID: 13796 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1745.887241][T13796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1745.897386][T13796] Call Trace: [ 1745.900679][T13796] dump_stack+0x1d8/0x2f8 [ 1745.905012][T13796] should_fail+0x555/0x770 [ 1745.909433][T13796] __should_failslab+0x11a/0x160 [ 1745.914381][T13796] ? __kernfs_new_node+0x97/0x6b0 [ 1745.919401][T13796] should_failslab+0x9/0x20 [ 1745.923919][T13796] kmem_cache_alloc+0x56/0x2e0 [ 1745.928710][T13796] __kernfs_new_node+0x97/0x6b0 [ 1745.933579][T13796] ? __kasan_check_write+0x14/0x20 [ 1745.938863][T13796] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 1745.944497][T13796] ? mutex_unlock+0xd/0x10 [ 1745.948908][T13796] ? kernfs_activate+0x213/0x230 [ 1745.953848][T13796] kernfs_new_node+0x97/0x180 20:37:21 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000001c000000000000000000000000ab54d8aad9d035ed0000000000000000000000f998834b4129ad9b000000000000000000000000000000000000007b0000000000000015cd0df820a3d55bcb7e02695a0d1100000000000000000000ff00000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000ecffffffffffffff000000000000000000000000000000000015a9878a4e96ae1900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000003f4cefee898cea4d268eabfae2ea38b70b2dc1d2e80f6bc0c479a6e455063308ab2665396c363808953ce95147294da37200000000000000"], 0x119) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1000000}], 0x2, 0x0) [ 1745.958530][T13796] __kernfs_create_file+0x4a/0x2f0 [ 1745.963731][T13796] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1745.969108][T13796] internal_create_group+0x4be/0xd90 [ 1745.974401][T13796] sysfs_create_group+0x1f/0x30 [ 1745.979249][T13796] loop_set_fd+0xcb2/0x1180 [ 1745.983753][T13796] lo_ioctl+0xd5/0x2200 [ 1745.987987][T13796] ? __kasan_slab_free+0x12a/0x1e0 [ 1745.993118][T13796] ? kasan_slab_free+0xe/0x10 [ 1745.997791][T13796] ? kfree+0x115/0x200 [ 1746.001851][T13796] ? tomoyo_path_number_perm+0x4e1/0x640 20:37:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x2000000}], 0x2, 0x0) [ 1746.007485][T13796] ? tomoyo_file_ioctl+0x23/0x30 [ 1746.012414][T13796] ? security_file_ioctl+0x6d/0xd0 [ 1746.017531][T13796] ? __x64_sys_ioctl+0xa3/0x120 [ 1746.022379][T13796] ? do_syscall_64+0xfe/0x140 [ 1746.027052][T13796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1746.033114][T13796] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1746.039003][T13796] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1746.044719][T13796] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1746.050424][T13796] ? trace_lock_release+0x135/0x1a0 [ 1746.055599][T13796] ? check_preemption_disabled+0x47/0x2a0 [ 1746.061293][T13796] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1746.066994][T13796] ? rcu_lock_release+0x9/0x30 [ 1746.071744][T13796] ? debug_smp_processor_id+0x1c/0x20 [ 1746.077093][T13796] ? perf_trace_lock+0x90/0x360 [ 1746.081921][T13796] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1746.087787][T13796] ? rcu_lock_release+0x9/0x30 [ 1746.092522][T13796] ? rcu_lock_release+0x9/0x30 [ 1746.097261][T13796] ? trace_lock_release+0x135/0x1a0 [ 1746.102607][T13796] ? rcu_lock_release+0x9/0x30 [ 1746.107351][T13796] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1746.112966][T13796] ? lo_release+0x1f0/0x1f0 [ 1746.117443][T13796] blkdev_ioctl+0x807/0x2990 [ 1746.122008][T13796] ? tomoyo_path_number_perm+0x53e/0x640 [ 1746.127624][T13796] block_ioctl+0xbd/0x100 [ 1746.131940][T13796] ? blkdev_iopoll+0x100/0x100 [ 1746.136682][T13796] do_vfs_ioctl+0x744/0x1730 [ 1746.141245][T13796] ? __fget+0x471/0x510 [ 1746.145396][T13796] ? tomoyo_file_ioctl+0x23/0x30 [ 1746.150309][T13796] ? security_file_ioctl+0xa1/0xd0 [ 1746.155410][T13796] __x64_sys_ioctl+0xe3/0x120 [ 1746.160078][T13796] do_syscall_64+0xfe/0x140 [ 1746.164574][T13796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1746.170460][T13796] RIP: 0033:0x4596e7 [ 1746.174345][T13796] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1746.193922][T13796] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1746.202305][T13796] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 20:37:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1746.210264][T13796] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1746.218222][T13796] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1746.226256][T13796] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1746.234218][T13796] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:21 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:21 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 20:37:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3000000}], 0x2, 0x0) [ 1746.412575][T14191] FAULT_INJECTION: forcing a failure. [ 1746.412575][T14191] name failslab, interval 1, probability 0, space 0, times 0 [ 1746.454761][T14191] CPU: 1 PID: 14191 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1746.462700][T14191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1746.472745][T14191] Call Trace: [ 1746.476032][T14191] dump_stack+0x1d8/0x2f8 [ 1746.480366][T14191] should_fail+0x555/0x770 [ 1746.484776][T14191] __should_failslab+0x11a/0x160 [ 1746.489695][T14191] ? __kernfs_new_node+0x97/0x6b0 [ 1746.494699][T14191] should_failslab+0x9/0x20 [ 1746.499176][T14191] kmem_cache_alloc+0x56/0x2e0 [ 1746.503914][T14191] __kernfs_new_node+0x97/0x6b0 [ 1746.508752][T14191] ? __kasan_check_write+0x14/0x20 [ 1746.513843][T14191] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 1746.519449][T14191] ? mutex_unlock+0xd/0x10 [ 1746.523838][T14191] ? kernfs_activate+0x213/0x230 [ 1746.528746][T14191] kernfs_new_node+0x97/0x180 [ 1746.533400][T14191] __kernfs_create_file+0x4a/0x2f0 [ 1746.538506][T14191] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1746.543855][T14191] internal_create_group+0x4be/0xd90 [ 1746.549139][T14191] sysfs_create_group+0x1f/0x30 [ 1746.553964][T14191] loop_set_fd+0xcb2/0x1180 [ 1746.558445][T14191] lo_ioctl+0xd5/0x2200 [ 1746.562590][T14191] ? __kasan_slab_free+0x12a/0x1e0 [ 1746.567670][T14191] ? kasan_slab_free+0xe/0x10 [ 1746.572339][T14191] ? kfree+0x115/0x200 [ 1746.576395][T14191] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1746.582017][T14191] ? tomoyo_file_ioctl+0x23/0x30 [ 1746.586952][T14191] ? security_file_ioctl+0x6d/0xd0 [ 1746.592048][T14191] ? __x64_sys_ioctl+0xa3/0x120 [ 1746.596876][T14191] ? do_syscall_64+0xfe/0x140 [ 1746.601546][T14191] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1746.607587][T14191] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1746.613474][T14191] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1746.619165][T14191] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1746.624870][T14191] ? trace_lock_release+0x135/0x1a0 [ 1746.630040][T14191] ? check_preemption_disabled+0x47/0x2a0 [ 1746.635727][T14191] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1746.641416][T14191] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1746.646845][T14191] ? rcu_lock_release+0x9/0x30 [ 1746.651581][T14191] ? debug_smp_processor_id+0x1c/0x20 [ 1746.656932][T14191] ? perf_trace_lock+0x90/0x360 [ 1746.661764][T14191] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1746.667214][T14191] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1746.673079][T14191] ? rcu_lock_release+0x9/0x30 [ 1746.677838][T14191] ? rcu_lock_release+0x9/0x30 [ 1746.682575][T14191] ? trace_lock_release+0x135/0x1a0 [ 1746.687744][T14191] ? rcu_lock_release+0x9/0x30 [ 1746.692493][T14191] ? trace_hardirqs_on+0x34/0x80 [ 1746.697412][T14191] ? lo_release+0x1f0/0x1f0 [ 1746.701892][T14191] blkdev_ioctl+0x807/0x2990 [ 1746.706455][T14191] ? tomoyo_path_number_perm+0x53e/0x640 [ 1746.712069][T14191] block_ioctl+0xbd/0x100 [ 1746.716384][T14191] ? blkdev_iopoll+0x100/0x100 [ 1746.721122][T14191] do_vfs_ioctl+0x744/0x1730 [ 1746.725683][T14191] ? __fget+0x471/0x510 [ 1746.729811][T14191] ? tomoyo_file_ioctl+0x23/0x30 [ 1746.734721][T14191] ? security_file_ioctl+0xa1/0xd0 [ 1746.739806][T14191] __x64_sys_ioctl+0xe3/0x120 [ 1746.744459][T14191] do_syscall_64+0xfe/0x140 [ 1746.748935][T14191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1746.754798][T14191] RIP: 0033:0x4596e7 [ 1746.758666][T14191] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1746.778260][T14191] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1746.786661][T14191] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1746.794605][T14191] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1746.802547][T14191] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1746.810878][T14191] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1746.818823][T14191] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 20:37:22 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x4000000}], 0x2, 0x0) 20:37:22 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, 0x0, 0x8000fffffffe) 20:37:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:22 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:22 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, 0x0, 0x8000fffffffe) 20:37:22 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x5000000}], 0x2, 0x0) 20:37:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:22 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1747.098846][T14499] FAULT_INJECTION: forcing a failure. [ 1747.098846][T14499] name failslab, interval 1, probability 0, space 0, times 0 [ 1747.113320][T14499] CPU: 0 PID: 14499 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1747.121217][T14499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1747.131265][T14499] Call Trace: [ 1747.134555][T14499] dump_stack+0x1d8/0x2f8 [ 1747.138884][T14499] should_fail+0x555/0x770 [ 1747.143301][T14499] __should_failslab+0x11a/0x160 [ 1747.148253][T14499] should_failslab+0x9/0x20 [ 1747.152751][T14499] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1747.158465][T14499] ? __kmalloc_node_track_caller+0x3c/0x60 [ 1747.164379][T14499] __kmalloc_node_track_caller+0x3c/0x60 [ 1747.170003][T14499] ? alloc_uevent_skb+0x7f/0x230 [ 1747.174933][T14499] __alloc_skb+0xe8/0x500 [ 1747.179254][T14499] alloc_uevent_skb+0x7f/0x230 [ 1747.184008][T14499] kobject_uevent_env+0xcbb/0x1260 [ 1747.189115][T14499] kobject_uevent+0x1f/0x30 [ 1747.193597][T14499] loop_set_fd+0xd21/0x1180 [ 1747.198077][T14499] lo_ioctl+0xd5/0x2200 [ 1747.202205][T14499] ? __kasan_slab_free+0x12a/0x1e0 [ 1747.207295][T14499] ? kasan_slab_free+0xe/0x10 [ 1747.211973][T14499] ? kfree+0x115/0x200 [ 1747.216021][T14499] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1747.221633][T14499] ? tomoyo_file_ioctl+0x23/0x30 [ 1747.226552][T14499] ? security_file_ioctl+0x6d/0xd0 [ 1747.231646][T14499] ? __x64_sys_ioctl+0xa3/0x120 [ 1747.236471][T14499] ? do_syscall_64+0xfe/0x140 [ 1747.241120][T14499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1747.247170][T14499] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1747.253046][T14499] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1747.258765][T14499] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1747.264455][T14499] ? trace_lock_release+0x135/0x1a0 [ 1747.269625][T14499] ? check_preemption_disabled+0x47/0x2a0 [ 1747.275316][T14499] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1747.281020][T14499] ? rcu_lock_release+0x9/0x30 [ 1747.285767][T14499] ? debug_smp_processor_id+0x1c/0x20 [ 1747.291133][T14499] ? perf_trace_lock+0x90/0x360 [ 1747.295959][T14499] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1747.301820][T14499] ? rcu_lock_release+0x9/0x30 [ 1747.306565][T14499] ? rcu_lock_release+0x9/0x30 [ 1747.311400][T14499] ? trace_lock_release+0x135/0x1a0 [ 1747.316571][T14499] ? rcu_lock_release+0x9/0x30 [ 1747.321326][T14499] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1747.326942][T14499] ? lo_release+0x1f0/0x1f0 [ 1747.331456][T14499] blkdev_ioctl+0x807/0x2990 [ 1747.336051][T14499] ? tomoyo_path_number_perm+0x53e/0x640 [ 1747.341666][T14499] block_ioctl+0xbd/0x100 [ 1747.345998][T14499] ? blkdev_iopoll+0x100/0x100 [ 1747.350767][T14499] do_vfs_ioctl+0x744/0x1730 [ 1747.355336][T14499] ? __fget+0x471/0x510 [ 1747.359466][T14499] ? tomoyo_file_ioctl+0x23/0x30 [ 1747.364377][T14499] ? security_file_ioctl+0xa1/0xd0 [ 1747.369567][T14499] __x64_sys_ioctl+0xe3/0x120 [ 1747.374223][T14499] do_syscall_64+0xfe/0x140 [ 1747.378717][T14499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1747.384610][T14499] RIP: 0033:0x4596e7 [ 1747.388507][T14499] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1747.408106][T14499] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1747.416489][T14499] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1747.424446][T14499] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1747.432409][T14499] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1747.440355][T14499] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 20:37:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) prctl$PR_SET_FPEMU(0xa, 0x2) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:22 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, 0x0, 0x8000fffffffe) 20:37:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x6000000}], 0x2, 0x0) [ 1747.448323][T14499] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:22 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:22 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x0) 20:37:23 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x7000000}], 0x2, 0x0) 20:37:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:23 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x0) [ 1747.756126][T14913] FAULT_INJECTION: forcing a failure. [ 1747.756126][T14913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1747.769366][T14913] CPU: 0 PID: 14913 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1747.777249][T14913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1747.787297][T14913] Call Trace: [ 1747.790584][T14913] dump_stack+0x1d8/0x2f8 [ 1747.794917][T14913] should_fail+0x555/0x770 [ 1747.799338][T14913] should_fail_alloc_page+0x55/0x60 20:37:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1747.804532][T14913] prepare_alloc_pages+0x283/0x470 [ 1747.809641][T14913] __alloc_pages_nodemask+0xb2/0x5d0 [ 1747.815029][T14913] ? debug_smp_processor_id+0x1c/0x20 [ 1747.820401][T14913] kmem_getpages+0x56/0xa20 [ 1747.824899][T14913] ? trace_lock_release+0x135/0x1a0 [ 1747.830096][T14913] cache_grow_begin+0x7e/0x2c0 [ 1747.834865][T14913] cache_alloc_refill+0x311/0x3f0 [ 1747.840015][T14913] ? check_preemption_disabled+0xb7/0x2a0 [ 1747.845984][T14913] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1747.851353][T14913] ? kobject_uevent_env+0x2cd/0x1260 20:37:23 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) socket$packet(0x11, 0x3, 0x300) 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x8000000}], 0x2, 0x0) 20:37:23 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) sendfile(r0, r1, &(0x7f0000d83ff8), 0x0) [ 1747.856717][T14913] ? dev_uevent_filter+0xb0/0xb0 [ 1747.861744][T14913] kobject_uevent_env+0x2cd/0x1260 [ 1747.866871][T14913] kobject_uevent+0x1f/0x30 [ 1747.871457][T14913] loop_set_fd+0xd21/0x1180 [ 1747.875965][T14913] lo_ioctl+0xd5/0x2200 [ 1747.880113][T14913] ? __kasan_slab_free+0x12a/0x1e0 [ 1747.885426][T14913] ? kasan_slab_free+0xe/0x10 [ 1747.890100][T14913] ? kfree+0x115/0x200 [ 1747.894208][T14913] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1747.899926][T14913] ? tomoyo_file_ioctl+0x23/0x30 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x9000000}], 0x2, 0x0) [ 1747.904947][T14913] ? security_file_ioctl+0x6d/0xd0 [ 1747.910049][T14913] ? __x64_sys_ioctl+0xa3/0x120 [ 1747.914896][T14913] ? do_syscall_64+0xfe/0x140 [ 1747.919566][T14913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1747.925627][T14913] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1747.931543][T14913] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1747.937258][T14913] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1747.942974][T14913] ? trace_lock_release+0x135/0x1a0 [ 1747.948195][T14913] ? check_preemption_disabled+0x47/0x2a0 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xa000000}], 0x2, 0x0) [ 1747.953924][T14913] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1747.959634][T14913] ? rcu_lock_release+0x9/0x30 [ 1747.964389][T14913] ? debug_smp_processor_id+0x1c/0x20 [ 1747.969755][T14913] ? perf_trace_lock+0x90/0x360 [ 1747.974619][T14913] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1747.980501][T14913] ? rcu_lock_release+0x9/0x30 [ 1747.985269][T14913] ? rcu_lock_release+0x9/0x30 [ 1747.990024][T14913] ? trace_lock_release+0x135/0x1a0 [ 1747.995208][T14913] ? rcu_lock_release+0x9/0x30 [ 1748.000051][T14913] ? trace_irq_enable_rcuidle+0x23/0x1e0 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xb000000}], 0x2, 0x0) [ 1748.005680][T14913] ? lo_release+0x1f0/0x1f0 [ 1748.010189][T14913] blkdev_ioctl+0x807/0x2990 [ 1748.014854][T14913] ? tomoyo_path_number_perm+0x53e/0x640 [ 1748.020494][T14913] block_ioctl+0xbd/0x100 [ 1748.024907][T14913] ? blkdev_iopoll+0x100/0x100 [ 1748.029664][T14913] do_vfs_ioctl+0x744/0x1730 [ 1748.034243][T14913] ? __fget+0x471/0x510 [ 1748.038393][T14913] ? tomoyo_file_ioctl+0x23/0x30 [ 1748.043354][T14913] ? security_file_ioctl+0xa1/0xd0 [ 1748.048460][T14913] __x64_sys_ioctl+0xe3/0x120 [ 1748.053237][T14913] do_syscall_64+0xfe/0x140 [ 1748.057776][T14913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.063658][T14913] RIP: 0033:0x4596e7 [ 1748.067541][T14913] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1748.087143][T14913] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1748.095569][T14913] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1748.103577][T14913] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1748.111543][T14913] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1748.119504][T14913] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1748.127453][T14913] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:23 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc000000}], 0x2, 0x0) 20:37:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:23 executing program 1: poll(&(0x7f0000000080)=[{}, {}], 0x2, 0x49) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x7e, 0x0, 0x0, 0x800e004a1) poll(&(0x7f0000000040)=[{r0, 0x4}, {r0, 0x40}], 0x2, 0x0) shutdown(r0, 0x0) 20:37:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) 20:37:23 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xd000000}], 0x2, 0x0) [ 1748.388073][T15626] FAULT_INJECTION: forcing a failure. [ 1748.388073][T15626] name failslab, interval 1, probability 0, space 0, times 0 [ 1748.417846][T15626] CPU: 0 PID: 15626 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1748.425868][T15626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xe000000}], 0x2, 0x0) [ 1748.435923][T15626] Call Trace: [ 1748.439214][T15626] dump_stack+0x1d8/0x2f8 [ 1748.443550][T15626] should_fail+0x555/0x770 [ 1748.447967][T15626] __should_failslab+0x11a/0x160 [ 1748.452942][T15626] should_failslab+0x9/0x20 [ 1748.457441][T15626] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1748.463190][T15626] ? __kmalloc_node_track_caller+0x3c/0x60 [ 1748.469004][T15626] __kmalloc_node_track_caller+0x3c/0x60 [ 1748.474632][T15626] ? alloc_uevent_skb+0x7f/0x230 [ 1748.479606][T15626] __alloc_skb+0xe8/0x500 [ 1748.483940][T15626] alloc_uevent_skb+0x7f/0x230 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x10000000}], 0x2, 0x0) [ 1748.488704][T15626] kobject_uevent_env+0xcbb/0x1260 [ 1748.493819][T15626] kobject_uevent+0x1f/0x30 [ 1748.498318][T15626] loop_set_fd+0xd21/0x1180 [ 1748.502824][T15626] lo_ioctl+0xd5/0x2200 [ 1748.506968][T15626] ? __kasan_slab_free+0x12a/0x1e0 [ 1748.512070][T15626] ? kasan_slab_free+0xe/0x10 [ 1748.516739][T15626] ? kfree+0x115/0x200 [ 1748.520800][T15626] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1748.526423][T15626] ? tomoyo_file_ioctl+0x23/0x30 [ 1748.531355][T15626] ? security_file_ioctl+0x6d/0xd0 [ 1748.536459][T15626] ? __x64_sys_ioctl+0xa3/0x120 [ 1748.541305][T15626] ? do_syscall_64+0xfe/0x140 [ 1748.545978][T15626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.552040][T15626] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1748.557927][T15626] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1748.563640][T15626] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1748.569390][T15626] ? trace_lock_release+0x135/0x1a0 [ 1748.574669][T15626] ? check_preemption_disabled+0x47/0x2a0 [ 1748.580377][T15626] ? debug_check_no_obj_freed+0x505/0x5b0 20:37:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x11000000}], 0x2, 0x0) [ 1748.586092][T15626] ? rcu_lock_release+0x9/0x30 [ 1748.590856][T15626] ? debug_smp_processor_id+0x1c/0x20 [ 1748.596307][T15626] ? perf_trace_lock+0x90/0x360 [ 1748.601160][T15626] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1748.607042][T15626] ? rcu_lock_release+0x9/0x30 [ 1748.611799][T15626] ? rcu_lock_release+0x9/0x30 [ 1748.616564][T15626] ? trace_lock_release+0x135/0x1a0 [ 1748.621747][T15626] ? rcu_lock_release+0x9/0x30 [ 1748.626507][T15626] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1748.632309][T15626] ? lo_release+0x1f0/0x1f0 [ 1748.636835][T15626] blkdev_ioctl+0x807/0x2990 [ 1748.641422][T15626] ? tomoyo_path_number_perm+0x53e/0x640 [ 1748.647062][T15626] block_ioctl+0xbd/0x100 [ 1748.651384][T15626] ? blkdev_iopoll+0x100/0x100 [ 1748.656317][T15626] do_vfs_ioctl+0x744/0x1730 [ 1748.660895][T15626] ? __fget+0x471/0x510 [ 1748.665055][T15626] ? tomoyo_file_ioctl+0x23/0x30 [ 1748.669982][T15626] ? security_file_ioctl+0xa1/0xd0 [ 1748.675079][T15626] __x64_sys_ioctl+0xe3/0x120 [ 1748.679747][T15626] do_syscall_64+0xfe/0x140 [ 1748.684224][T15626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.690108][T15626] RIP: 0033:0x4596e7 [ 1748.693988][T15626] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1748.714585][T15626] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1748.722997][T15626] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1748.730971][T15626] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1748.738927][T15626] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1748.747069][T15626] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1748.755030][T15626] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:24 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x12000000}], 0x2, 0x0) 20:37:24 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)) 20:37:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:24 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x900000, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x5}}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x39, 0x35, 0x35, 0x63, 0x32, 0x77, 0x63], 0x2d, [0x0, 0x0, 0x77, 0x32], 0x2d, [0x66, 0x62, 0x34, 0x31], 0x2d, [0x31, 0x76, 0x36, 0x37], 0x2d, [0x37, 0x66, 0x34, 0x77, 0x62, 0x77, 0x0, 0x35]}}}, {@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, 'cpuacct.usage_percpu_sys\x00'}}, {@hash='hash'}]}) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet6(0xa, 0x3, 0x1) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x0, &(0x7f0000004b40), 0x189, &(0x7f0000004bc0)}, 0xf401}], 0x19cbcb36e8172e, 0x20004bc0) 20:37:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1748.997114][T16233] FAULT_INJECTION: forcing a failure. [ 1748.997114][T16233] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.017848][T16233] CPU: 0 PID: 16233 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1749.025816][T16233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1749.035880][T16233] Call Trace: [ 1749.039177][T16233] dump_stack+0x1d8/0x2f8 [ 1749.043510][T16233] should_fail+0x555/0x770 [ 1749.047932][T16233] __should_failslab+0x11a/0x160 [ 1749.052960][T16233] should_failslab+0x9/0x20 [ 1749.057459][T16233] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1749.063195][T16233] ? __kmalloc_node_track_caller+0x3c/0x60 [ 1749.069096][T16233] __kmalloc_node_track_caller+0x3c/0x60 [ 1749.075082][T16233] ? alloc_uevent_skb+0x7f/0x230 [ 1749.080015][T16233] __alloc_skb+0xe8/0x500 [ 1749.084335][T16233] alloc_uevent_skb+0x7f/0x230 [ 1749.089085][T16233] kobject_uevent_env+0xcbb/0x1260 [ 1749.094175][T16233] kobject_uevent+0x1f/0x30 [ 1749.098656][T16233] loop_set_fd+0xd21/0x1180 [ 1749.103141][T16233] lo_ioctl+0xd5/0x2200 [ 1749.107312][T16233] ? __kasan_slab_free+0x12a/0x1e0 [ 1749.112394][T16233] ? kasan_slab_free+0xe/0x10 [ 1749.117044][T16233] ? kfree+0x115/0x200 [ 1749.121097][T16233] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1749.126703][T16233] ? tomoyo_file_ioctl+0x23/0x30 [ 1749.131615][T16233] ? security_file_ioctl+0x6d/0xd0 [ 1749.136701][T16233] ? __x64_sys_ioctl+0xa3/0x120 [ 1749.141525][T16233] ? do_syscall_64+0xfe/0x140 [ 1749.146177][T16233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.152218][T16233] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1749.158085][T16233] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1749.163779][T16233] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1749.169471][T16233] ? trace_lock_release+0x135/0x1a0 [ 1749.174657][T16233] ? check_preemption_disabled+0x47/0x2a0 [ 1749.180354][T16233] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1749.186330][T16233] ? rcu_lock_release+0x9/0x30 [ 1749.191069][T16233] ? debug_smp_processor_id+0x1c/0x20 [ 1749.196517][T16233] ? perf_trace_lock+0x90/0x360 [ 1749.201344][T16233] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1749.207221][T16233] ? rcu_lock_release+0x9/0x30 [ 1749.211957][T16233] ? rcu_lock_release+0x9/0x30 [ 1749.216708][T16233] ? trace_lock_release+0x135/0x1a0 [ 1749.221904][T16233] ? rcu_lock_release+0x9/0x30 [ 1749.226645][T16233] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1749.232251][T16233] ? lo_release+0x1f0/0x1f0 [ 1749.236814][T16233] blkdev_ioctl+0x807/0x2990 [ 1749.241382][T16233] ? tomoyo_path_number_perm+0x53e/0x640 [ 1749.247005][T16233] block_ioctl+0xbd/0x100 [ 1749.251316][T16233] ? blkdev_iopoll+0x100/0x100 [ 1749.256145][T16233] do_vfs_ioctl+0x744/0x1730 [ 1749.260706][T16233] ? __fget+0x471/0x510 [ 1749.264839][T16233] ? tomoyo_file_ioctl+0x23/0x30 [ 1749.269752][T16233] ? security_file_ioctl+0xa1/0xd0 [ 1749.274856][T16233] __x64_sys_ioctl+0xe3/0x120 [ 1749.279508][T16233] do_syscall_64+0xfe/0x140 [ 1749.283989][T16233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.289867][T16233] RIP: 0033:0x4596e7 [ 1749.293755][T16233] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1749.313344][T16233] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1749.321742][T16233] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1749.329776][T16233] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1749.337822][T16233] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 20:37:24 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x20) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000240)) rmdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x100, 0x0, 0x11}) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) [ 1749.345768][T16233] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1749.354159][T16233] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x25000000}], 0x2, 0x0) 20:37:24 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:24 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:24 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:24 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3f000000}], 0x2, 0x0) 20:37:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1749.673779][T16602] FAULT_INJECTION: forcing a failure. [ 1749.673779][T16602] name failslab, interval 1, probability 0, space 0, times 0 20:37:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x40000000}], 0x2, 0x0) 20:37:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000040)={0x7, 0x20, 0x0, 0x0, 0x7, 0x8, 0x1, 0x3, 0x81, 0x9, 0x9, 0x7}) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000000)) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) [ 1749.717989][T16602] CPU: 0 PID: 16602 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1749.725929][T16602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1749.736024][T16602] Call Trace: [ 1749.740709][T16602] dump_stack+0x1d8/0x2f8 [ 1749.746383][T16602] should_fail+0x555/0x770 [ 1749.750995][T16602] __should_failslab+0x11a/0x160 [ 1749.755944][T16602] ? kzalloc+0x26/0x40 [ 1749.760033][T16602] should_failslab+0x9/0x20 20:37:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1749.764622][T16602] __kmalloc+0x7a/0x340 [ 1749.768772][T16602] kzalloc+0x26/0x40 [ 1749.772662][T16602] kobject_get_path+0xa7/0x1d0 [ 1749.777432][T16602] kobject_uevent_env+0x2f2/0x1260 [ 1749.782549][T16602] kobject_uevent+0x1f/0x30 [ 1749.787055][T16602] loop_set_fd+0xd21/0x1180 [ 1749.791822][T16602] lo_ioctl+0xd5/0x2200 [ 1749.795984][T16602] ? __kasan_slab_free+0x12a/0x1e0 [ 1749.801091][T16602] ? kasan_slab_free+0xe/0x10 [ 1749.805761][T16602] ? kfree+0x115/0x200 [ 1749.809819][T16602] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1749.815678][T16602] ? tomoyo_file_ioctl+0x23/0x30 [ 1749.820726][T16602] ? security_file_ioctl+0x6d/0xd0 [ 1749.825810][T16602] ? __x64_sys_ioctl+0xa3/0x120 [ 1749.830654][T16602] ? do_syscall_64+0xfe/0x140 [ 1749.835307][T16602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.841440][T16602] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1749.847321][T16602] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1749.853039][T16602] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1749.858731][T16602] ? trace_lock_release+0x135/0x1a0 [ 1749.863900][T16602] ? check_preemption_disabled+0x47/0x2a0 [ 1749.869680][T16602] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1749.875484][T16602] ? rcu_lock_release+0x9/0x30 [ 1749.880243][T16602] ? debug_smp_processor_id+0x1c/0x20 [ 1749.885589][T16602] ? perf_trace_lock+0x90/0x360 [ 1749.890416][T16602] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1749.896314][T16602] ? rcu_lock_release+0x9/0x30 [ 1749.901156][T16602] ? rcu_lock_release+0x9/0x30 [ 1749.905916][T16602] ? trace_lock_release+0x135/0x1a0 [ 1749.911112][T16602] ? rcu_lock_release+0x9/0x30 [ 1749.915857][T16602] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1749.921483][T16602] ? lo_release+0x1f0/0x1f0 [ 1749.927353][T16602] blkdev_ioctl+0x807/0x2990 [ 1749.931930][T16602] ? tomoyo_path_number_perm+0x53e/0x640 [ 1749.938108][T16602] block_ioctl+0xbd/0x100 [ 1749.942431][T16602] ? blkdev_iopoll+0x100/0x100 [ 1749.947178][T16602] do_vfs_ioctl+0x744/0x1730 [ 1749.952276][T16602] ? __fget+0x471/0x510 [ 1749.956422][T16602] ? tomoyo_file_ioctl+0x23/0x30 [ 1749.961423][T16602] ? security_file_ioctl+0xa1/0xd0 [ 1749.966527][T16602] __x64_sys_ioctl+0xe3/0x120 [ 1749.971182][T16602] do_syscall_64+0xfe/0x140 [ 1749.975662][T16602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.982080][T16602] RIP: 0033:0x4596e7 [ 1749.985959][T16602] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1750.005556][T16602] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1750.013989][T16602] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1750.021949][T16602] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1750.029906][T16602] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1750.037851][T16602] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1750.045797][T16602] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:25 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x5c000000}], 0x2, 0x0) 20:37:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000000c0)="0f01c5baa000b02aee0f22a40f01c8b89c0c8ee0b800098ee0bad004b011ee0f01ca26660f2a31360fc720", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14, 0x13, 0x0, {0x0, 0x0, 0x6}}, 0x14) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="73fd3b172f08199fd6123ea44b5a799b5bcf29fa5734de4f26", 0x19) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1750.354813][T17100] FAULT_INJECTION: forcing a failure. [ 1750.354813][T17100] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.382993][T17100] CPU: 0 PID: 17100 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1750.390935][T17100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1750.401003][T17100] Call Trace: 20:37:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x67260000}], 0x2, 0x0) 20:37:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1750.404298][T17100] dump_stack+0x1d8/0x2f8 [ 1750.408641][T17100] should_fail+0x555/0x770 [ 1750.413064][T17100] __should_failslab+0x11a/0x160 [ 1750.418128][T17100] should_failslab+0x9/0x20 [ 1750.422631][T17100] kmem_cache_alloc_node+0x65/0x280 [ 1750.427826][T17100] ? __alloc_skb+0x9f/0x500 [ 1750.432332][T17100] __alloc_skb+0x9f/0x500 [ 1750.436666][T17100] alloc_uevent_skb+0x7f/0x230 [ 1750.441433][T17100] kobject_uevent_env+0xcbb/0x1260 [ 1750.446550][T17100] kobject_uevent+0x1f/0x30 [ 1750.451132][T17100] loop_set_fd+0xd21/0x1180 [ 1750.455638][T17100] lo_ioctl+0xd5/0x2200 [ 1750.459781][T17100] ? __kasan_slab_free+0x12a/0x1e0 [ 1750.464872][T17100] ? kasan_slab_free+0xe/0x10 [ 1750.469632][T17100] ? kfree+0x115/0x200 [ 1750.473698][T17100] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1750.479324][T17100] ? tomoyo_file_ioctl+0x23/0x30 [ 1750.484258][T17100] ? security_file_ioctl+0x6d/0xd0 [ 1750.489360][T17100] ? __x64_sys_ioctl+0xa3/0x120 [ 1750.494203][T17100] ? do_syscall_64+0xfe/0x140 [ 1750.498870][T17100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1750.504946][T17100] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1750.510834][T17100] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1750.516805][T17100] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1750.522710][T17100] ? trace_lock_release+0x135/0x1a0 [ 1750.527909][T17100] ? check_preemption_disabled+0x47/0x2a0 [ 1750.533706][T17100] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1750.539421][T17100] ? rcu_lock_release+0x9/0x30 [ 1750.544160][T17100] ? debug_smp_processor_id+0x1c/0x20 [ 1750.549997][T17100] ? perf_trace_lock+0x90/0x360 [ 1750.554839][T17100] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1750.560731][T17100] ? rcu_lock_release+0x9/0x30 [ 1750.565478][T17100] ? rcu_lock_release+0x9/0x30 [ 1750.570242][T17100] ? trace_lock_release+0x135/0x1a0 [ 1750.575420][T17100] ? rcu_lock_release+0x9/0x30 [ 1750.580165][T17100] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1750.585780][T17100] ? lo_release+0x1f0/0x1f0 [ 1750.590286][T17100] blkdev_ioctl+0x807/0x2990 [ 1750.594865][T17100] ? tomoyo_path_number_perm+0x53e/0x640 [ 1750.600505][T17100] block_ioctl+0xbd/0x100 [ 1750.604818][T17100] ? blkdev_iopoll+0x100/0x100 [ 1750.609576][T17100] do_vfs_ioctl+0x744/0x1730 [ 1750.614171][T17100] ? __fget+0x471/0x510 [ 1750.618319][T17100] ? tomoyo_file_ioctl+0x23/0x30 [ 1750.623253][T17100] ? security_file_ioctl+0xa1/0xd0 [ 1750.628344][T17100] __x64_sys_ioctl+0xe3/0x120 [ 1750.633003][T17100] do_syscall_64+0xfe/0x140 [ 1750.637487][T17100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1750.643373][T17100] RIP: 0033:0x4596e7 [ 1750.647267][T17100] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1750.666860][T17100] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1750.675595][T17100] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 1750.683567][T17100] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1750.691547][T17100] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1750.699586][T17100] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1750.707532][T17100] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:26 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x803e0000}], 0x2, 0x0) 20:37:26 executing program 5: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1750.953785][T17438] FAULT_INJECTION: forcing a failure. [ 1750.953785][T17438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1750.967116][T17438] CPU: 1 PID: 17438 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1750.975508][T17438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1750.985593][T17438] Call Trace: [ 1750.989148][T17438] dump_stack+0x1d8/0x2f8 [ 1750.993482][T17438] should_fail+0x555/0x770 [ 1750.997901][T17438] should_fail_alloc_page+0x55/0x60 [ 1751.003096][T17438] prepare_alloc_pages+0x283/0x470 [ 1751.008216][T17438] __alloc_pages_nodemask+0xb2/0x5d0 [ 1751.013609][T17438] ? rcu_lock_release+0x26/0x30 [ 1751.018444][T17438] ? is_bpf_text_address+0x398/0x3b0 [ 1751.018458][T17438] kmem_getpages+0x56/0xa20 [ 1751.018470][T17438] cache_grow_begin+0x7e/0x2c0 [ 1751.018480][T17438] cache_alloc_refill+0x311/0x3f0 [ 1751.018489][T17438] ? check_preemption_disabled+0xb7/0x2a0 [ 1751.018500][T17438] __kmalloc+0x318/0x340 [ 1751.044071][T17438] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1751.054003][T17438] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1751.059577][T17438] tomoyo_path_number_perm+0x166/0x640 [ 1751.065145][T17438] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1751.070770][T17438] ? trace_kmem_cache_free+0xa0/0x110 [ 1751.076146][T17438] tomoyo_path_mkdir+0x9c/0xc0 [ 1751.080913][T17438] security_path_mkdir+0xed/0x170 [ 1751.086118][T17438] do_mkdirat+0x15c/0x320 [ 1751.090447][T17438] __x64_sys_mkdir+0x60/0x70 [ 1751.095040][T17438] do_syscall_64+0xfe/0x140 20:37:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1751.099538][T17438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1751.105426][T17438] RIP: 0033:0x458c97 [ 1751.105436][T17438] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1751.105441][T17438] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1751.105450][T17438] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1751.105459][T17438] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 20:37:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc0000000}], 0x2, 0x0) [ 1751.145326][T17438] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1751.145331][T17438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1751.145336][T17438] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:26 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000000)='net/netstat\x00') 20:37:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc03e0000}], 0x2, 0x0) 20:37:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1751.360423][T17680] FAULT_INJECTION: forcing a failure. [ 1751.360423][T17680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1751.373658][T17680] CPU: 0 PID: 17680 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1751.381685][T17680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1751.391739][T17680] Call Trace: [ 1751.395036][T17680] dump_stack+0x1d8/0x2f8 [ 1751.399370][T17680] should_fail+0x555/0x770 [ 1751.403792][T17680] should_fail_alloc_page+0x55/0x60 20:37:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) getdents64(r0, &(0x7f00000003c0)=""/226, 0xe2) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xe03f0300}], 0x2, 0x0) [ 1751.408990][T17680] prepare_alloc_pages+0x283/0x470 [ 1751.414102][T17680] __alloc_pages_nodemask+0xb2/0x5d0 [ 1751.419388][T17680] ? debug_smp_processor_id+0x1c/0x20 [ 1751.424829][T17680] kmem_getpages+0x56/0xa20 [ 1751.429330][T17680] ? trace_lock_release+0x135/0x1a0 [ 1751.434530][T17680] cache_grow_begin+0x7e/0x2c0 [ 1751.439295][T17680] cache_alloc_refill+0x311/0x3f0 [ 1751.444343][T17680] ? check_preemption_disabled+0xb7/0x2a0 [ 1751.450088][T17680] kmem_cache_alloc+0x2b9/0x2e0 [ 1751.454934][T17680] ? getname_flags+0xba/0x640 20:37:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1751.459609][T17680] getname_flags+0xba/0x640 [ 1751.464110][T17680] do_mkdirat+0x3c/0x320 [ 1751.468435][T17680] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1751.474237][T17680] ? trace_hardirqs_off_caller+0x58/0x80 [ 1751.479871][T17680] ? do_syscall_64+0x1d/0x140 [ 1751.484650][T17680] __x64_sys_mkdir+0x60/0x70 [ 1751.484659][T17680] do_syscall_64+0xfe/0x140 [ 1751.484672][T17680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1751.484680][T17680] RIP: 0033:0x458c97 20:37:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1751.484689][T17680] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1751.484697][T17680] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1751.531493][T17680] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1751.531498][T17680] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1751.531503][T17680] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 20:37:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1751.531509][T17680] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1751.531514][T17680] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:27 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:27 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x02', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xeffdffff}], 0x2, 0x0) 20:37:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1751.764976][T18079] FAULT_INJECTION: forcing a failure. [ 1751.764976][T18079] name failslab, interval 1, probability 0, space 0, times 0 20:37:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000080), 0x10, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:27 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x03', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1751.883925][T18079] CPU: 1 PID: 18079 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1751.891859][T18079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1751.901903][T18079] Call Trace: [ 1751.905185][T18079] dump_stack+0x1d8/0x2f8 [ 1751.905200][T18079] should_fail+0x555/0x770 [ 1751.905215][T18079] __should_failslab+0x11a/0x160 [ 1751.918884][T18079] ? __d_alloc+0x2d/0x6e0 [ 1751.923221][T18079] should_failslab+0x9/0x20 [ 1751.927814][T18079] kmem_cache_alloc+0x56/0x2e0 [ 1751.932577][T18079] __d_alloc+0x2d/0x6e0 [ 1751.936737][T18079] d_alloc+0x4e/0x1d0 [ 1751.940812][T18079] __lookup_hash+0xe5/0x290 [ 1751.945353][T18079] filename_create+0x14f/0x670 [ 1751.950154][T18079] ? getname_flags+0x214/0x640 [ 1751.954911][T18079] do_mkdirat+0x5a/0x320 [ 1751.954922][T18079] ? trace_hardirqs_off_caller+0x58/0x80 [ 1751.954933][T18079] __x64_sys_mkdir+0x60/0x70 [ 1751.964769][T18079] do_syscall_64+0xfe/0x140 [ 1751.964782][T18079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1751.964789][T18079] RIP: 0033:0x458c97 20:37:27 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xfffffdef}], 0x2, 0x0) 20:37:27 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1751.964800][T18079] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1752.003710][T18079] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1752.012125][T18079] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1752.020093][T18079] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1752.020099][T18079] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1752.020104][T18079] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1752.020109][T18079] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:27 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:27 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:27 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x04', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xffffff7f}], 0x2, 0x0) [ 1752.092069][T18248] FAT-fs (loop5): bogus number of reserved sectors 20:37:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1752.155655][T18248] FAT-fs (loop5): Can't find a valid FAT filesystem 20:37:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1752.250287][T18454] FAULT_INJECTION: forcing a failure. [ 1752.250287][T18454] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.326443][T18454] CPU: 0 PID: 18454 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1752.334376][T18454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1752.344422][T18454] Call Trace: [ 1752.347714][T18454] dump_stack+0x1d8/0x2f8 [ 1752.347731][T18454] should_fail+0x555/0x770 [ 1752.347745][T18454] __should_failslab+0x11a/0x160 [ 1752.347756][T18454] ? __d_alloc+0x2d/0x6e0 [ 1752.347774][T18454] should_failslab+0x9/0x20 [ 1752.347784][T18454] kmem_cache_alloc+0x56/0x2e0 20:37:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) io_setup(0xeb33, &(0x7f0000000000)=0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x41, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000240)=0x338) io_pgetevents(r0, 0x2, 0x1, &(0x7f0000000040)=[{}], &(0x7f00000000c0), &(0x7f00000001c0)={&(0x7f0000000140)={0x400}, 0x8}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) 20:37:27 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x05', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1000000000000}], 0x2, 0x0) 20:37:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1752.347795][T18454] __d_alloc+0x2d/0x6e0 [ 1752.370221][T18454] d_alloc+0x4e/0x1d0 [ 1752.379105][T18454] __lookup_hash+0xe5/0x290 [ 1752.387530][T18454] filename_create+0x14f/0x670 [ 1752.387542][T18454] ? getname_flags+0x214/0x640 [ 1752.387552][T18454] do_mkdirat+0x5a/0x320 [ 1752.387561][T18454] ? trace_hardirqs_off_caller+0x58/0x80 [ 1752.387572][T18454] __x64_sys_mkdir+0x60/0x70 [ 1752.387583][T18454] do_syscall_64+0xfe/0x140 [ 1752.387595][T18454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1752.387606][T18454] RIP: 0033:0x458c97 [ 1752.397083][T18454] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1752.445371][T18454] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1752.453784][T18454] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1752.461764][T18454] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1752.469724][T18454] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1752.469730][T18454] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1752.469736][T18454] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:28 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x06', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x4000000000000}], 0x2, 0x0) 20:37:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) socketpair(0x9, 0x1, 0x5, &(0x7f0000000840)) r0 = syz_open_dev$mouse(&(0x7f00000008c0)='/dev/input/mouse#\x00', 0x6, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000900)=0xe8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000940)={0x240, @tick=0x80000001, 0x9, {0x7, 0x7fff}, 0x100000000, 0x0, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1b, 0x7, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x80, 0xd3, &(0x7f00000003c0)=""/211, 0x41000, 0x4, [], r1, 0x12, r2, 0x8, &(0x7f00000001c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x0, 0xf58, 0xfff}, 0x10}, 0x70) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='cpu.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x10, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000100300000000000000000000950000000009000000000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x200, 0xdd, &(0x7f0000000680)=""/221, 0x41100, 0x2, [], 0x0, 0xb, r3, 0x8, &(0x7f00000004c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xb, 0x1, 0x3}, 0x10}, 0x70) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000800)={0xfffffffffffffffd, 0x2, 0x81}) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x5) 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\a', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1752.726923][T18816] FAULT_INJECTION: forcing a failure. [ 1752.726923][T18816] name failslab, interval 1, probability 0, space 0, times 0 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x40030000000000}], 0x2, 0x0) [ 1752.856117][T18816] CPU: 1 PID: 18816 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1752.864052][T18816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1752.874101][T18816] Call Trace: [ 1752.877396][T18816] dump_stack+0x1d8/0x2f8 [ 1752.881731][T18816] should_fail+0x555/0x770 [ 1752.886156][T18816] __should_failslab+0x11a/0x160 [ 1752.891180][T18816] ? security_inode_alloc+0x36/0x1e0 [ 1752.896464][T18816] should_failslab+0x9/0x20 [ 1752.900962][T18816] kmem_cache_alloc+0x56/0x2e0 [ 1752.905731][T18816] security_inode_alloc+0x36/0x1e0 [ 1752.910842][T18816] inode_init_always+0x3b5/0x8d0 [ 1752.915783][T18816] ? set_qf_name+0x3c0/0x3c0 [ 1752.920403][T18816] new_inode_pseudo+0x7f/0x240 [ 1752.925168][T18816] new_inode+0x28/0x1c0 [ 1752.929417][T18816] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1752.935152][T18816] __ext4_new_inode+0x43d/0x5650 [ 1752.940104][T18816] ? memset+0x31/0x40 [ 1752.944087][T18816] ? smk_curacc+0xa3/0xe0 [ 1752.948424][T18816] ext4_mkdir+0x3f5/0x1450 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1752.952846][T18816] ? security_inode_permission+0xdd/0x120 [ 1752.958654][T18816] vfs_mkdir+0x43f/0x610 [ 1752.962897][T18816] do_mkdirat+0x1d7/0x320 [ 1752.967228][T18816] __x64_sys_mkdir+0x60/0x70 [ 1752.972301][T18816] do_syscall_64+0xfe/0x140 [ 1752.976793][T18816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1752.976802][T18816] RIP: 0033:0x458c97 [ 1752.976813][T18816] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:37:28 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x100000000000000}], 0x2, 0x0) 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1752.986548][T18816] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1752.986556][T18816] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1752.986561][T18816] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1752.986565][T18816] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1752.986571][T18816] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1752.986575][T18816] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3900, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0xebb, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="dfabca8fb15d51f619f3ea92f4048eb559373a45439b59b611801b13163b0af3a1742f8900f7f32439ac04346380982e12ce21035545e74a5d77eaa3f93ea73f8e957ce70e", 0x45, 0x4fcd}], 0x800000, &(0x7f00000003c0)={[{@acl='acl'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}], [{@obj_user={'obj_user', 0x3d, 'em0'}}, {@dont_measure='dont_measure'}, {@pcr={'pcr', 0x3d, 0x13}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x64, 0x39, 0x7959bd21e04d7499, 0x35, 0x66, 0x62, 0x66], 0x2d, [0x33, 0x7cc8a10007c7e199, 0x30, 0x35], 0x2d, [0x63, 0x31, 0x37, 0x30], 0x2d, [0x38, 0x38, 0x77, 0x33], 0x2d, [0x32, 0x35, 0x0, 0x35, 0x31, 0x0, 0x36, 0x36]}}}, {@fowner_gt={'fowner>', r2}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@pcr={'pcr', 0x3d, 0x22}}]}) 20:37:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\b', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\t', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1753.212280][T19171] FAULT_INJECTION: forcing a failure. [ 1753.212280][T19171] name failslab, interval 1, probability 0, space 0, times 0 20:37:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x200000000000000}], 0x2, 0x0) [ 1753.259621][T19171] CPU: 1 PID: 19171 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1753.267557][T19171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1753.277612][T19171] Call Trace: [ 1753.280905][T19171] dump_stack+0x1d8/0x2f8 [ 1753.285240][T19171] should_fail+0x555/0x770 [ 1753.289741][T19171] __should_failslab+0x11a/0x160 [ 1753.294661][T19171] ? security_inode_alloc+0x36/0x1e0 [ 1753.294673][T19171] should_failslab+0x9/0x20 [ 1753.294684][T19171] kmem_cache_alloc+0x56/0x2e0 [ 1753.294700][T19171] security_inode_alloc+0x36/0x1e0 [ 1753.314308][T19171] inode_init_always+0x3b5/0x8d0 [ 1753.319244][T19171] ? set_qf_name+0x3c0/0x3c0 [ 1753.323921][T19171] new_inode_pseudo+0x7f/0x240 [ 1753.328695][T19171] new_inode+0x28/0x1c0 [ 1753.332853][T19171] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1753.338572][T19171] __ext4_new_inode+0x43d/0x5650 [ 1753.343505][T19171] ? memset+0x31/0x40 [ 1753.347607][T19171] ? smk_curacc+0xa3/0xe0 [ 1753.351936][T19171] ext4_mkdir+0x3f5/0x1450 20:37:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1753.356354][T19171] ? security_inode_permission+0xdd/0x120 [ 1753.362161][T19171] vfs_mkdir+0x43f/0x610 [ 1753.366411][T19171] do_mkdirat+0x1d7/0x320 [ 1753.370827][T19171] __x64_sys_mkdir+0x60/0x70 [ 1753.375411][T19171] do_syscall_64+0xfe/0x140 [ 1753.379916][T19171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1753.385803][T19171] RIP: 0033:0x458c97 [ 1753.389701][T19171] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x300000000000000}], 0x2, 0x0) [ 1753.409324][T19171] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1753.409333][T19171] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1753.409338][T19171] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1753.409343][T19171] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1753.409347][T19171] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1753.409357][T19171] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:28 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:28 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\n', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000000000000400100004001000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb00000000000000000000ffffffffffff0000000000000000000000000000ac1414bb0200000000000000ac1414aaac1414bb000000ffffffff000180c2000002000000000000000000000000000000000000ffffff00000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000fff05780001000700020008697036746e6c300000000000000000006261746164763000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004d41524b0000000000000000000000000000000000000000000000000002090000000000000000000007ac1414150000000000000000000000000000000000000000000000000000000000000000ffffffff00ff00000000000000000000aaaaaaaaaabb000000000000000000000000000000000000ffff0000000000000000000000000000008001ff000903ff007f0000000000000000000000000000000000006272696467655f736c6176655f31000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000020000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1414bbac1e000108000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000068f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) 20:37:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x400000000000000}], 0x2, 0x0) 20:37:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:29 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\v', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1753.661320][T19628] FAULT_INJECTION: forcing a failure. [ 1753.661320][T19628] name failslab, interval 1, probability 0, space 0, times 0 [ 1753.674136][T19628] CPU: 1 PID: 19628 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1753.682034][T19628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1753.692093][T19628] Call Trace: [ 1753.695389][T19628] dump_stack+0x1d8/0x2f8 [ 1753.699725][T19628] should_fail+0x555/0x770 [ 1753.704142][T19628] __should_failslab+0x11a/0x160 20:37:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1753.704159][T19628] ? __es_insert_extent+0x321/0xd90 [ 1753.714257][T19628] should_failslab+0x9/0x20 [ 1753.718758][T19628] kmem_cache_alloc+0x56/0x2e0 [ 1753.723531][T19628] __es_insert_extent+0x321/0xd90 [ 1753.728558][T19628] ext4_es_insert_extent+0x220/0x2fb0 [ 1753.733942][T19628] ? trace_ext4_ext_convert_to_initialized_fastpath+0x310/0x310 [ 1753.741576][T19628] ext4_ext_map_blocks+0x1806/0x7180 [ 1753.746860][T19628] ? debug_smp_processor_id+0x1c/0x20 [ 1753.752221][T19628] ? perf_trace_lock+0x90/0x360 20:37:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:29 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\f', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1753.752234][T19628] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1753.752247][T19628] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 1753.768513][T19628] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 1753.773971][T19628] ? trace_lock_release+0x135/0x1a0 [ 1753.779173][T19628] ? __down_read+0x14b/0x330 [ 1753.783763][T19628] ext4_map_blocks+0x422/0x1e50 [ 1753.788614][T19628] ? ext4_mark_inode_dirty+0x216/0x700 [ 1753.794173][T19628] ? __kasan_check_write+0x14/0x20 [ 1753.799293][T19628] ext4_getblk+0xae/0x460 [ 1753.803657][T19628] ext4_bread+0x4a/0x240 [ 1753.803667][T19628] ext4_append+0x175/0x310 [ 1753.803679][T19628] ext4_mkdir+0x7ad/0x1450 [ 1753.816723][T19628] vfs_mkdir+0x43f/0x610 [ 1753.820962][T19628] do_mkdirat+0x1d7/0x320 [ 1753.825285][T19628] __x64_sys_mkdir+0x60/0x70 [ 1753.829875][T19628] do_syscall_64+0xfe/0x140 [ 1753.834374][T19628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1753.834383][T19628] RIP: 0033:0x458c97 [ 1753.834394][T19628] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1753.864343][T19628] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1753.872756][T19628] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1753.872762][T19628] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1753.872767][T19628] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1753.872772][T19628] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1753.872783][T19628] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:29 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x110, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x563}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x497599cb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x13b1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2980000000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x2003, 0x3, 0x40000000000000, 0x740, 0xffffffffffffffff}, 0xfc17) 20:37:29 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\r', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x500000000000000}], 0x2, 0x0) 20:37:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1754.041253][T19872] FAULT_INJECTION: forcing a failure. [ 1754.041253][T19872] name failslab, interval 1, probability 0, space 0, times 0 [ 1754.081109][T19872] CPU: 0 PID: 19872 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 20:37:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:29 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x0e', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x600000000000000}], 0x2, 0x0) [ 1754.089038][T19872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1754.099093][T19872] Call Trace: [ 1754.102388][T19872] dump_stack+0x1d8/0x2f8 [ 1754.106847][T19872] should_fail+0x555/0x770 [ 1754.111273][T19872] __should_failslab+0x11a/0x160 [ 1754.116209][T19872] ? security_inode_alloc+0x36/0x1e0 [ 1754.121490][T19872] should_failslab+0x9/0x20 [ 1754.125986][T19872] kmem_cache_alloc+0x56/0x2e0 [ 1754.130748][T19872] security_inode_alloc+0x36/0x1e0 [ 1754.135860][T19872] inode_init_always+0x3b5/0x8d0 20:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x700000000000000}], 0x2, 0x0) [ 1754.140793][T19872] ? set_qf_name+0x3c0/0x3c0 [ 1754.145384][T19872] new_inode_pseudo+0x7f/0x240 [ 1754.150145][T19872] new_inode+0x28/0x1c0 [ 1754.154293][T19872] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1754.160008][T19872] __ext4_new_inode+0x43d/0x5650 [ 1754.164940][T19872] ? memset+0x31/0x40 [ 1754.168923][T19872] ? smk_curacc+0xa3/0xe0 [ 1754.173240][T19872] ext4_mkdir+0x3f5/0x1450 [ 1754.177658][T19872] ? security_inode_permission+0xdd/0x120 [ 1754.183375][T19872] vfs_mkdir+0x43f/0x610 [ 1754.187618][T19872] do_mkdirat+0x1d7/0x320 20:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x800000000000000}], 0x2, 0x0) [ 1754.191927][T19872] __x64_sys_mkdir+0x60/0x70 [ 1754.196501][T19872] do_syscall_64+0xfe/0x140 [ 1754.201002][T19872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1754.206882][T19872] RIP: 0033:0x458c97 [ 1754.210766][T19872] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1754.230358][T19872] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1754.238757][T19872] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1754.246723][T19872] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1754.254690][T19872] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1754.262653][T19872] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1754.270621][T19872] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:29 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x900000000000000}], 0x2, 0x0) 20:37:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:29 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x10', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1754.518894][T20428] FAULT_INJECTION: forcing a failure. [ 1754.518894][T20428] name failslab, interval 1, probability 0, space 0, times 0 [ 1754.537520][T20428] CPU: 0 PID: 20428 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1754.545449][T20428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1754.555507][T20428] Call Trace: [ 1754.558780][T20428] dump_stack+0x1d8/0x2f8 [ 1754.563089][T20428] should_fail+0x555/0x770 [ 1754.567482][T20428] __should_failslab+0x11a/0x160 [ 1754.572397][T20428] ? kcalloc+0x2f/0x50 [ 1754.576453][T20428] should_failslab+0x9/0x20 [ 1754.580930][T20428] __kmalloc+0x7a/0x340 [ 1754.585071][T20428] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1754.590772][T20428] kcalloc+0x2f/0x50 [ 1754.594651][T20428] ext4_find_extent+0x216/0xaa0 [ 1754.599476][T20428] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1754.605875][T20428] ext4_ext_map_blocks+0x170/0x7180 [ 1754.611053][T20428] ? debug_smp_processor_id+0x1c/0x20 [ 1754.616397][T20428] ? check_preemption_disabled+0x47/0x2a0 [ 1754.622087][T20428] ? ext4_map_blocks+0x5be/0x1e50 [ 1754.627082][T20428] ? debug_smp_processor_id+0x1c/0x20 [ 1754.632425][T20428] ? perf_trace_lock+0x90/0x360 [ 1754.637252][T20428] ? trace_lock_acquire+0x159/0x1d0 [ 1754.642429][T20428] ? __kasan_check_write+0x14/0x20 [ 1754.647516][T20428] ext4_map_blocks+0x8f2/0x1e50 [ 1754.652365][T20428] ? __kasan_check_write+0x14/0x20 [ 1754.657462][T20428] ext4_getblk+0xae/0x460 [ 1754.661768][T20428] ext4_bread+0x4a/0x240 [ 1754.666001][T20428] ext4_append+0x175/0x310 [ 1754.670392][T20428] ext4_mkdir+0x7ad/0x1450 [ 1754.674791][T20428] vfs_mkdir+0x43f/0x610 [ 1754.679008][T20428] do_mkdirat+0x1d7/0x320 [ 1754.683310][T20428] __x64_sys_mkdir+0x60/0x70 [ 1754.687876][T20428] do_syscall_64+0xfe/0x140 [ 1754.692355][T20428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1754.698218][T20428] RIP: 0033:0x458c97 [ 1754.702095][T20428] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1754.721671][T20428] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1754.730053][T20428] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1754.737998][T20428] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1754.745942][T20428] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1754.754150][T20428] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1754.762104][T20428] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xa00000000000000}], 0x2, 0x0) 20:37:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x11', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 20:37:30 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000000)='.\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="eb3c906d6b66732e66020002700b73008a000000000000", 0x17}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\x12', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 20:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xb00000000000000}], 0x2, 0x0) [ 1755.030052][T20745] FAULT_INJECTION: forcing a failure. [ 1755.030052][T20745] name failslab, interval 1, probability 0, space 0, times 0 [ 1755.042834][T20745] CPU: 1 PID: 20745 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1755.050714][T20745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1755.050720][T20745] Call Trace: [ 1755.050737][T20745] dump_stack+0x1d8/0x2f8 [ 1755.050753][T20745] should_fail+0x555/0x770 [ 1755.064164][T20745] __should_failslab+0x11a/0x160 [ 1755.064175][T20745] ? __es_insert_extent+0x321/0xd90 [ 1755.064190][T20745] should_failslab+0x9/0x20 [ 1755.077806][T20745] kmem_cache_alloc+0x56/0x2e0 [ 1755.077820][T20745] __es_insert_extent+0x321/0xd90 [ 1755.077838][T20745] ext4_es_insert_extent+0x220/0x2fb0 [ 1755.084289][T20749] FAT-fs (loop5): invalid media value (0x00) [ 1755.087500][T20745] ? trace_ext4_ext_convert_to_initialized_fastpath+0x310/0x310 [ 1755.087520][T20745] ext4_ext_map_blocks+0x1806/0x7180 [ 1755.087530][T20745] ? debug_smp_processor_id+0x1c/0x20 [ 1755.087543][T20745] ? perf_trace_lock+0x90/0x360 [ 1755.097296][T20745] ? trace_event_raw_event_lock+0x1a0/0x1a0 [ 1755.097310][T20745] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 1755.120026][T20749] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1755.121511][T20745] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 1755.121527][T20745] ? trace_lock_release+0x135/0x1a0 [ 1755.160510][T20745] ? __down_read+0x14b/0x330 [ 1755.165103][T20745] ext4_map_blocks+0x422/0x1e50 [ 1755.169951][T20745] ? ext4_mark_inode_dirty+0x216/0x700 [ 1755.175408][T20745] ? __kasan_check_write+0x14/0x20 20:37:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00%', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 20:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc00000000000000}], 0x2, 0x0) [ 1755.180525][T20745] ext4_getblk+0xae/0x460 [ 1755.184857][T20745] ext4_bread+0x4a/0x240 [ 1755.189099][T20745] ext4_append+0x175/0x310 [ 1755.193508][T20745] ext4_mkdir+0x7ad/0x1450 [ 1755.197929][T20745] vfs_mkdir+0x43f/0x610 [ 1755.202174][T20745] do_mkdirat+0x1d7/0x320 [ 1755.206500][T20745] __x64_sys_mkdir+0x60/0x70 [ 1755.211087][T20745] do_syscall_64+0xfe/0x140 [ 1755.215592][T20745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1755.221475][T20745] RIP: 0033:0x458c97 20:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xd00000000000000}], 0x2, 0x0) [ 1755.225368][T20745] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1755.245052][T20745] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1755.253455][T20745] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1755.261431][T20745] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1755.269403][T20745] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1755.277366][T20745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1755.285327][T20745] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xe00000000000000}], 0x2, 0x0) 20:37:30 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/231, 0xe7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xfffffe44, 0x2, 0x0, 0x800e00521) shutdown(r1, 0x0) 20:37:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00H', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200040, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)=0x1) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000003c0)=""/255) 20:37:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1000000000000000}], 0x2, 0x0) 20:37:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00L', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1755.536879][T21291] FAULT_INJECTION: forcing a failure. [ 1755.536879][T21291] name failslab, interval 1, probability 0, space 0, times 0 [ 1755.549633][T21291] CPU: 1 PID: 21291 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1755.557529][T21291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1755.567575][T21291] Call Trace: [ 1755.570869][T21291] dump_stack+0x1d8/0x2f8 [ 1755.575197][T21291] should_fail+0x555/0x770 [ 1755.579618][T21291] __should_failslab+0x11a/0x160 20:37:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00\\', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1755.584553][T21291] ? __es_insert_extent+0x321/0xd90 [ 1755.589746][T21291] should_failslab+0x9/0x20 [ 1755.594248][T21291] kmem_cache_alloc+0x56/0x2e0 [ 1755.599013][T21291] __es_insert_extent+0x321/0xd90 [ 1755.604126][T21291] ext4_es_insert_extent+0x220/0x2fb0 [ 1755.609515][T21291] ext4_map_blocks+0xe18/0x1e50 [ 1755.614367][T21291] ? __kasan_check_write+0x14/0x20 [ 1755.619473][T21291] ext4_getblk+0xae/0x460 [ 1755.623800][T21291] ext4_bread+0x4a/0x240 [ 1755.628035][T21291] ext4_append+0x175/0x310 [ 1755.632444][T21291] ext4_mkdir+0x7ad/0x1450 20:37:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00h', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1755.636863][T21291] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 1755.642411][T21291] vfs_mkdir+0x43f/0x610 [ 1755.646655][T21291] do_mkdirat+0x1d7/0x320 [ 1755.650987][T21291] __x64_sys_mkdir+0x60/0x70 [ 1755.655577][T21291] do_syscall_64+0xfe/0x140 [ 1755.660077][T21291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1755.665969][T21291] RIP: 0033:0x458c97 [ 1755.669852][T21291] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1755.689545][T21291] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1755.697946][T21291] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1755.697951][T21291] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1755.697961][T21291] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1755.697970][T21291] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1755.722015][T21291] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:31 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:31 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @dev}, &(0x7f0000000380)=0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0x6f) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/21, &(0x7f0000000400)=0x15) exit(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x20000, 0x4a95d5334a96c742) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/xfrm_stat\x00') ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20) syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8081) socket$inet(0x2, 0x0, 0x0) 20:37:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00l', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:31 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1100000000000000}], 0x2, 0x0) 20:37:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00t', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1755.956053][T21523] FAULT_INJECTION: forcing a failure. [ 1755.956053][T21523] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.019667][T21618] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1756.028793][T21523] CPU: 1 PID: 21523 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1756.036698][T21523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1756.046745][T21523] Call Trace: [ 1756.050032][T21523] dump_stack+0x1d8/0x2f8 [ 1756.054363][T21523] should_fail+0x555/0x770 [ 1756.058782][T21523] __should_failslab+0x11a/0x160 [ 1756.063715][T21523] ? ext4_mb_new_blocks+0x2ac/0x2cc0 20:37:31 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200005, 0x0) r1 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='vfat\x00', 0x0, r1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000240)={{0x37, @loopback, 0x4e22, 0x4, 'fo\x00', 0x19, 0xffffffffffffffd0, 0x30}, {@empty, 0x4e23, 0x10000, 0x6, 0x60dc}}, 0x44) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) 20:37:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00\x00z', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1756.068990][T21523] should_failslab+0x9/0x20 [ 1756.073486][T21523] kmem_cache_alloc+0x56/0x2e0 [ 1756.078244][T21523] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1756.083337][T21523] ? trace_kmalloc+0xbb/0x130 [ 1756.088002][T21523] ? kcalloc+0x2f/0x50 [ 1756.092059][T21523] ? __kmalloc+0x26c/0x340 [ 1756.096467][T21523] ? kcalloc+0x2f/0x50 [ 1756.100535][T21523] ? ext4_ext_search_right+0x4cb/0x940 [ 1756.105990][T21523] ? ext4_find_extent+0x8e0/0xaa0 [ 1756.111006][T21523] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 1756.116712][T21523] ext4_ext_map_blocks+0x4b9a/0x7180 [ 1756.121969][T21523] ? debug_smp_processor_id+0x1c/0x20 [ 1756.127310][T21523] ? check_preemption_disabled+0x47/0x2a0 [ 1756.132998][T21523] ? ext4_map_blocks+0x5be/0x1e50 [ 1756.137994][T21523] ? debug_smp_processor_id+0x1c/0x20 [ 1756.143337][T21523] ? perf_trace_lock+0x90/0x360 [ 1756.148168][T21523] ext4_map_blocks+0x8f2/0x1e50 [ 1756.152997][T21523] ? __kasan_check_write+0x14/0x20 [ 1756.158081][T21523] ext4_getblk+0xae/0x460 [ 1756.162383][T21523] ext4_bread+0x4a/0x240 [ 1756.166599][T21523] ext4_append+0x175/0x310 [ 1756.170989][T21523] ext4_mkdir+0x7ad/0x1450 [ 1756.175388][T21523] vfs_mkdir+0x43f/0x610 [ 1756.179605][T21523] do_mkdirat+0x1d7/0x320 [ 1756.183909][T21523] __x64_sys_mkdir+0x60/0x70 [ 1756.188490][T21523] do_syscall_64+0xfe/0x140 [ 1756.192965][T21523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1756.198827][T21523] RIP: 0033:0x458c97 20:37:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x1200000000000000}], 0x2, 0x0) [ 1756.202702][T21523] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1756.222464][T21523] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1756.230846][T21523] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1756.238791][T21523] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1756.246733][T21523] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1756.254675][T21523] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1756.262617][T21523] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:31 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:31 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1756.498542][T21890] FAULT_INJECTION: forcing a failure. [ 1756.498542][T21890] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.515802][T21890] CPU: 0 PID: 21890 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1756.523715][T21890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1756.533765][T21890] Call Trace: [ 1756.537055][T21890] dump_stack+0x1d8/0x2f8 [ 1756.541372][T21890] should_fail+0x555/0x770 [ 1756.545779][T21890] __should_failslab+0x11a/0x160 [ 1756.550706][T21890] ? kcalloc+0x2f/0x50 [ 1756.554768][T21890] should_failslab+0x9/0x20 [ 1756.559267][T21890] __kmalloc+0x7a/0x340 [ 1756.563413][T21890] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1756.563431][T21890] kcalloc+0x2f/0x50 [ 1756.573001][T21890] ext4_find_extent+0x216/0xaa0 [ 1756.573012][T21890] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 1756.573025][T21890] ext4_ext_map_blocks+0x170/0x7180 [ 1756.583360][T21989] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1756.584153][T21890] ? debug_smp_processor_id+0x1c/0x20 [ 1756.584166][T21890] ? check_preemption_disabled+0x47/0x2a0 [ 1756.606975][T21890] ? ext4_map_blocks+0x5be/0x1e50 [ 1756.611992][T21890] ? debug_smp_processor_id+0x1c/0x20 [ 1756.617360][T21890] ? perf_trace_lock+0x90/0x360 [ 1756.622219][T21890] ? trace_lock_acquire+0x159/0x1d0 [ 1756.627416][T21890] ? __kasan_check_write+0x14/0x20 [ 1756.632507][T21890] ext4_map_blocks+0x8f2/0x1e50 [ 1756.637346][T21890] ? __kasan_check_write+0x14/0x20 [ 1756.642442][T21890] ext4_getblk+0xae/0x460 [ 1756.646749][T21890] ext4_bread+0x4a/0x240 [ 1756.650972][T21890] ext4_append+0x175/0x310 [ 1756.655383][T21890] ext4_mkdir+0x7ad/0x1450 [ 1756.659789][T21890] vfs_mkdir+0x43f/0x610 [ 1756.664019][T21890] do_mkdirat+0x1d7/0x320 [ 1756.668321][T21890] __x64_sys_mkdir+0x60/0x70 [ 1756.672890][T21890] do_syscall_64+0xfe/0x140 [ 1756.677373][T21890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1756.683250][T21890] RIP: 0033:0x458c97 [ 1756.687120][T21890] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1756.706695][T21890] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1756.715076][T21890] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1756.723022][T21890] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1756.730965][T21890] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1756.738924][T21890] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1756.746872][T21890] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x2500000000000000}], 0x2, 0x0) 20:37:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) getsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 20:37:32 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @dev}, &(0x7f0000000380)=0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0x6f) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/21, &(0x7f0000000400)=0x15) exit(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x20000, 0x4a95d5334a96c742) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/xfrm_stat\x00') ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20) syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8081) socket$inet(0x2, 0x0, 0x0) 20:37:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:32 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x3f00000000000000}], 0x2, 0x0) 20:37:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1756.984218][T22120] FAULT_INJECTION: forcing a failure. [ 1756.984218][T22120] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.996992][T22120] CPU: 0 PID: 22120 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1757.004875][T22120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1757.014917][T22120] Call Trace: [ 1757.014936][T22120] dump_stack+0x1d8/0x2f8 [ 1757.014952][T22120] should_fail+0x555/0x770 [ 1757.014966][T22120] __should_failslab+0x11a/0x160 20:37:32 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1757.014976][T22120] ? __es_insert_extent+0x321/0xd90 [ 1757.014988][T22120] should_failslab+0x9/0x20 [ 1757.014999][T22120] kmem_cache_alloc+0x56/0x2e0 [ 1757.015010][T22120] __es_insert_extent+0x321/0xd90 [ 1757.015023][T22120] ext4_es_insert_extent+0x220/0x2fb0 [ 1757.056713][T22120] ext4_map_blocks+0xe18/0x1e50 [ 1757.061568][T22120] ? __kasan_check_write+0x14/0x20 [ 1757.066940][T22120] ext4_getblk+0xae/0x460 [ 1757.071257][T22120] ext4_bread+0x4a/0x240 [ 1757.075491][T22120] ext4_append+0x175/0x310 [ 1757.079907][T22120] ext4_mkdir+0x7ad/0x1450 20:37:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x4000000000000000}], 0x2, 0x0) [ 1757.084320][T22120] vfs_mkdir+0x43f/0x610 [ 1757.088562][T22120] do_mkdirat+0x1d7/0x320 [ 1757.092895][T22120] __x64_sys_mkdir+0x60/0x70 [ 1757.097484][T22120] do_syscall_64+0xfe/0x140 [ 1757.101989][T22120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1757.107873][T22120] RIP: 0033:0x458c97 [ 1757.111762][T22120] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1757.131361][T22120] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1757.139757][T22120] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1757.139763][T22120] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1757.139768][T22120] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1757.139773][T22120] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1757.139778][T22120] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000000)={0xf000, 0x4000, 0x8, 0x100000000, 0x64}) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x20}], 0x1, &(0x7f00000000c0)={r1, r2+10000000}, &(0x7f0000000140)={0x7f}, 0x8) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x5c00000000000000}], 0x2, 0x0) [ 1757.231532][T22124] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 20:37:33 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @dev}, &(0x7f0000000380)=0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0x6f) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/21, &(0x7f0000000400)=0x15) exit(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x20000, 0x4a95d5334a96c742) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/xfrm_stat\x00') ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20) syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8081) socket$inet(0x2, 0x0, 0x0) 20:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x6726000000000000}], 0x2, 0x0) 20:37:33 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x4) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1757.816943][T22665] FAULT_INJECTION: forcing a failure. [ 1757.816943][T22665] name failslab, interval 1, probability 0, space 0, times 0 20:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1757.868946][T22665] CPU: 0 PID: 22665 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1757.876873][T22665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1757.886919][T22665] Call Trace: [ 1757.886936][T22665] dump_stack+0x1d8/0x2f8 [ 1757.886951][T22665] should_fail+0x555/0x770 [ 1757.886966][T22665] __should_failslab+0x11a/0x160 [ 1757.886979][T22665] should_failslab+0x9/0x20 [ 1757.886992][T22665] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1757.887000][T22665] ? smack_d_instantiate+0xabf/0xd70 [ 1757.887012][T22665] smack_d_instantiate+0xabf/0xd70 [ 1757.899005][T22665] ? lockdep_init_map+0x2a/0x680 [ 1757.899019][T22665] security_d_instantiate+0xa5/0x100 [ 1757.934220][T22665] d_instantiate_new+0x65/0x130 [ 1757.939071][T22665] ext4_mkdir+0xfa9/0x1450 [ 1757.943479][T22665] vfs_mkdir+0x43f/0x610 [ 1757.947714][T22665] do_mkdirat+0x1d7/0x320 [ 1757.952036][T22665] __x64_sys_mkdir+0x60/0x70 [ 1757.952048][T22665] do_syscall_64+0xfe/0x140 [ 1757.952061][T22665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1757.952068][T22665] RIP: 0033:0x458c97 [ 1757.952080][T22665] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1757.990476][T22665] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1757.998875][T22665] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1757.998881][T22665] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 20:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x8000000000000000}], 0x2, 0x0) [ 1757.998886][T22665] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1757.998890][T22665] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1757.998895][T22665] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000380), 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) [ 1758.168697][T22737] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 20:37:33 executing program 1: 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:33 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x803e000000000000}], 0x2, 0x0) [ 1758.234404][T23008] FAT-fs (loop5): bogus number of reserved sectors [ 1758.247787][T23008] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1758.327384][T23113] FAULT_INJECTION: forcing a failure. [ 1758.327384][T23113] name failslab, interval 1, probability 0, space 0, times 0 [ 1758.340151][T23113] CPU: 1 PID: 23113 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1758.348039][T23113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1758.358089][T23113] Call Trace: [ 1758.361384][T23113] dump_stack+0x1d8/0x2f8 [ 1758.365723][T23113] should_fail+0x555/0x770 [ 1758.370227][T23113] __should_failslab+0x11a/0x160 [ 1758.375162][T23113] ? __es_insert_extent+0x321/0xd90 [ 1758.380364][T23113] should_failslab+0x9/0x20 [ 1758.384856][T23113] kmem_cache_alloc+0x56/0x2e0 [ 1758.384869][T23113] __es_insert_extent+0x321/0xd90 [ 1758.384883][T23113] ext4_es_insert_extent+0x220/0x2fb0 [ 1758.394641][T23113] ext4_map_blocks+0xe18/0x1e50 [ 1758.394660][T23113] ? __kasan_check_write+0x14/0x20 [ 1758.394671][T23113] ext4_getblk+0xae/0x460 [ 1758.394683][T23113] ext4_bread+0x4a/0x240 [ 1758.418477][T23113] ext4_append+0x175/0x310 [ 1758.422898][T23113] ext4_mkdir+0x7ad/0x1450 [ 1758.427323][T23113] vfs_mkdir+0x43f/0x610 [ 1758.431565][T23113] do_mkdirat+0x1d7/0x320 [ 1758.435892][T23113] __x64_sys_mkdir+0x60/0x70 [ 1758.440475][T23113] do_syscall_64+0xfe/0x140 [ 1758.444976][T23113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1758.450860][T23113] RIP: 0033:0x458c97 [ 1758.454742][T23113] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:37:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14022}, 0x0, 0x0, 0xffffffffffffffff, 0x4) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:33 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:33 executing program 1: [ 1758.474415][T23113] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1758.482822][T23113] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1758.490790][T23113] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1758.498753][T23113] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1758.506721][T23113] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1758.514692][T23113] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:33 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:34 executing program 1: 20:37:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc000000000000000}], 0x2, 0x0) 20:37:34 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:34 executing program 1: 20:37:34 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xc03e000000000000}], 0x2, 0x0) [ 1758.816952][T23536] FAULT_INJECTION: forcing a failure. [ 1758.816952][T23536] name failslab, interval 1, probability 0, space 0, times 0 [ 1758.882812][T23536] CPU: 0 PID: 23536 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1758.890821][T23536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1758.900870][T23536] Call Trace: [ 1758.904157][T23536] dump_stack+0x1d8/0x2f8 [ 1758.908492][T23536] should_fail+0x555/0x770 [ 1758.912905][T23536] __should_failslab+0x11a/0x160 [ 1758.917834][T23536] should_failslab+0x9/0x20 [ 1758.922329][T23536] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1758.927613][T23536] ? smack_d_instantiate+0x732/0xd70 20:37:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xe03f030000000000}], 0x2, 0x0) [ 1758.932897][T23536] smack_d_instantiate+0x732/0xd70 [ 1758.938011][T23536] ? lockdep_init_map+0x2a/0x680 [ 1758.942951][T23536] security_d_instantiate+0xa5/0x100 [ 1758.948231][T23536] d_instantiate_new+0x65/0x130 [ 1758.953078][T23536] ext4_mkdir+0xfa9/0x1450 [ 1758.957500][T23536] vfs_mkdir+0x43f/0x610 [ 1758.961746][T23536] do_mkdirat+0x1d7/0x320 [ 1758.966079][T23536] __x64_sys_mkdir+0x60/0x70 [ 1758.971068][T23536] do_syscall_64+0xfe/0x140 [ 1758.975583][T23536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1758.981466][T23536] RIP: 0033:0x458c97 [ 1758.985355][T23536] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1759.004954][T23536] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1759.013357][T23536] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1759.021323][T23536] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 20:37:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xeffdffff00000000}], 0x2, 0x0) 20:37:34 executing program 1: 20:37:34 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1759.029288][T23536] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1759.037253][T23536] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1759.045221][T23536] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:34 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:34 executing program 1: 20:37:34 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xffffff7f00000000}], 0x2, 0x0) 20:37:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:34 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1759.394449][T24112] FAULT_INJECTION: forcing a failure. [ 1759.394449][T24112] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.407610][T24112] CPU: 1 PID: 24112 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1759.407616][T24112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1759.407625][T24112] Call Trace: [ 1759.407641][T24112] dump_stack+0x1d8/0x2f8 [ 1759.407656][T24112] should_fail+0x555/0x770 [ 1759.407672][T24112] __should_failslab+0x11a/0x160 [ 1759.443034][T24112] ? __sigqueue_alloc+0x2ce/0x440 [ 1759.448234][T24112] should_failslab+0x9/0x20 [ 1759.452735][T24112] kmem_cache_alloc+0x56/0x2e0 [ 1759.457500][T24112] __sigqueue_alloc+0x2ce/0x440 [ 1759.462349][T24112] __send_signal+0x508/0xcd0 [ 1759.467040][T24112] send_signal+0x6e0/0x830 [ 1759.467053][T24112] force_sig_info_to_task+0x247/0x2e0 [ 1759.467066][T24112] force_sig_fault+0xbf/0x130 [ 1759.467083][T24112] __bad_area_nosemaphore+0x307/0x470 [ 1759.486867][T24112] bad_area+0x6b/0x80 20:37:34 executing program 1: 20:37:34 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:34 executing program 1: 20:37:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1759.491549][T24112] do_user_addr_fault+0xacc/0xaf0 [ 1759.496585][T24112] __do_page_fault+0xd3/0x1f0 [ 1759.501271][T24112] do_page_fault+0x99/0xb0 [ 1759.505681][T24112] page_fault+0x39/0x40 [ 1759.505690][T24112] RIP: 0033:0x45347f [ 1759.505699][T24112] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1759.505703][T24112] RSP: 002b:00007f1a4668ea88 EFLAGS: 00010283 [ 1759.505711][T24112] RAX: 00007f1a4668eb40 RBX: 0000000020000228 RCX: 0000000000000000 [ 1759.505719][T24112] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f1a4668eb40 [ 1759.533319][T24112] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 1759.533324][T24112] R10: 0000000000000075 R11: 00000000004e5320 R12: 0000000000000004 [ 1759.533330][T24112] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:35 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0xffffffff00000000}], 0x2, 0x0) 20:37:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x8f4e120afbf204c, 0x70) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0x81) bind$nfc_llcp(r0, &(0x7f0000000240)={0x27, 0x1, 0x0, 0x6, 0xfffffffffffffffe, 0x0, "e812e14770c4360dbc64e09b53b65270542d93738034400f37713d3eaf898b3f05fb67d7ff24aef7f7fbf24ebb23810fec85eda24afac2a4ac9e260b78fdfc", 0x3b}, 0x60) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bind(r1, &(0x7f0000000040)=@x25={0x9, @null=' \x00'}, 0x80) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000100001200020028bd7000fcdbdf25647262675f70725f686d61635f73686135313200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000200000000000000000000008000100050000000800010001000000080001000000000008000100"/256], 0x100}, 0x1, 0x0, 0x0, 0x4000}, 0x800) 20:37:35 executing program 1: 20:37:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:35 executing program 1: 20:37:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1759.811129][T24261] FAULT_INJECTION: forcing a failure. [ 1759.811129][T24261] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1759.824713][T24261] CPU: 0 PID: 24261 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1759.832597][T24261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1759.842644][T24261] Call Trace: [ 1759.845929][T24261] dump_stack+0x1d8/0x2f8 [ 1759.850266][T24261] should_fail+0x555/0x770 [ 1759.854686][T24261] should_fail_alloc_page+0x55/0x60 20:37:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1759.859888][T24261] prepare_alloc_pages+0x283/0x470 [ 1759.865094][T24261] __alloc_pages_nodemask+0xb2/0x5d0 [ 1759.870369][T24261] ? debug_smp_processor_id+0x1c/0x20 [ 1759.870386][T24261] kmem_getpages+0x56/0xa20 [ 1759.870399][T24261] ? trace_lock_release+0x135/0x1a0 [ 1759.885606][T24261] cache_grow_begin+0x7e/0x2c0 [ 1759.890379][T24261] cache_alloc_refill+0x311/0x3f0 [ 1759.895398][T24261] ? check_preemption_disabled+0xb7/0x2a0 [ 1759.901120][T24261] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1759.906488][T24261] ? copy_mount_options+0x5f/0x3c0 20:37:35 executing program 1: [ 1759.911588][T24261] copy_mount_options+0x5f/0x3c0 [ 1759.911600][T24261] ksys_mount+0xa0/0x100 [ 1759.911610][T24261] __x64_sys_mount+0xbf/0xd0 [ 1759.911625][T24261] do_syscall_64+0xfe/0x140 [ 1759.930258][T24261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1759.936148][T24261] RIP: 0033:0x45c2ca [ 1759.940040][T24261] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:37:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x4000) r2 = openat$cgroup_ro(r1, &(0x7f0000000580)='mey.events\x00\xcd\x19\xe9\xd9\x81f\xc9K\x16*vE%\xc9\x1a\x86@\x8a\xf5X\x13p\x8e\xc2_\x8e\xac\x00\x92\xc6S\xb1=\x16lR\xf6=7.\xf7n\xf8\xde\x15\xb4\x94B`^\x7f\xc6Dz;\x9elR\x01t\x03Z\xd0(\xc8\x16\nx;yw\xf7\xbb4k\xf0t\xd6\xd8\'JIvW+\xfa%z\x9e_4\x1b#$q\xf9?\xfb\xc8\xc0\x8bI\xa3o\t\x17YI\xe7Z\x8f\xff%\x9a\xa2\x8b;Z\xab\xe2L\x9c\xa3s\xfdn\x10c3\xa3d\f\f\xee\xafG\xaa\xfb\xca\xd7\x9b M\x9b:\xec\x96\x1d-\xed\x83k]\xcd\xde\xc9\x04%-\xff3\xdf\xe5\xcd\x06\xec\xbbeu\xd0\xad>\xb1/\x06H\xa3\xf1\xfc*\xd5}\xbdL\x03z\x04]\xb0)\x9e|\xe8i\x87\xa1\xbc\xa3\x92EmG\x9a\x93\xb7z9I\xa86\x97\xb9\xab\xaex*V\xbe\xf6\xdc\xe0\xf7\x8f\xe9\xa7\xce\xd5\xc3\x8eH\xbf\xfb\x8a\xc7\xde\xdeP\xd8\x14r:)\xa6N\x00d\xb4\x8f\x94\xc4\x15\x91a\x1d\x86m\xe0\xee\xc4\xa5\xb6!\xb3\x01Q\xa9#*\\\xdc\x04\xa6O\x11\x13[5,&\x000\xc3\xabY\x0eKJ^\xe7\x9d\f\x19k\xfe#oR\xb2\xc2\xaa\xa0\xdc`\x15\xc2\xfe)\xf02U\xe1Dn\xa1\xfb\t\xd5\x1bu\xc7\x1c,K\xfd\x95\x82\xc9\xa8\xc8*z\x105\x87V\x12\xf0/\xb5\x06k^', 0x26e1, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) [ 1759.960601][T24261] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1759.969797][T24261] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1759.977957][T24261] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1759.986111][T24261] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1759.994107][T24261] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1760.002250][T24261] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:35 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:35 executing program 1: 20:37:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:35 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r1, 0x0, 0x0) 20:37:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1760.304234][T24710] FAULT_INJECTION: forcing a failure. [ 1760.304234][T24710] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.395164][T24710] CPU: 1 PID: 24710 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1760.403105][T24710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1760.413160][T24710] Call Trace: [ 1760.416451][T24710] dump_stack+0x1d8/0x2f8 [ 1760.420784][T24710] should_fail+0x555/0x770 [ 1760.425203][T24710] __should_failslab+0x11a/0x160 [ 1760.430231][T24710] should_failslab+0x9/0x20 [ 1760.434729][T24710] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1760.440183][T24710] ? smack_d_instantiate+0xabf/0xd70 20:37:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:35 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1760.445468][T24710] smack_d_instantiate+0xabf/0xd70 [ 1760.450934][T24710] ? lockdep_init_map+0x2a/0x680 [ 1760.455881][T24710] security_d_instantiate+0xa5/0x100 [ 1760.461259][T24710] d_instantiate_new+0x65/0x130 [ 1760.466187][T24710] ext4_mkdir+0xfa9/0x1450 [ 1760.470615][T24710] vfs_mkdir+0x43f/0x610 [ 1760.474865][T24710] do_mkdirat+0x1d7/0x320 [ 1760.479194][T24710] __x64_sys_mkdir+0x60/0x70 [ 1760.483782][T24710] do_syscall_64+0xfe/0x140 [ 1760.488285][T24710] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:37:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1760.494177][T24710] RIP: 0033:0x458c97 [ 1760.498097][T24710] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1760.517783][T24710] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1760.526185][T24710] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 1760.534150][T24710] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1760.542122][T24710] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1760.550111][T24710] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1760.558066][T24710] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:36 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) io_setup(0xe399, &(0x7f0000000000)=0x0) io_submit(r1, 0x6, &(0x7f0000000680)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x9, r0, &(0x7f00000003c0)="33b8093e010e79c99f0240a12514c7773378b973720b0aecfc98c34b9b694c325bf2f233779832cf0885d43f739fa83c8cba4affc7d6eb8de5a421eed589a5cd673c0f5ae4b5c1742e0737ae7a58dfa8d5f85a38036a5cba5eb3df1c3de19fcac711496b400a774ccb819ad2d717e6c8cd5a7862b05e396ece2aca071ee278aff338358a0035e6a30ce3c8a16b28516c9d4e9b9b8d94f7139c7c8d35037d7e4e286cc16d5450b5480327f6acaeac1548af9beae3e9cc782e664ffb0191146bbc2b8c7be3e030e0990ce703aef964e66f0330721341a4", 0xd6, 0x3, 0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff4, r0, &(0x7f0000000080)="496fc5439fed15b9e3f0ff797cdca597bed83992cc7332be7ec27a99493d5733a812ad3000fa35796a3e76db67eb6e8b1ea3", 0x32, 0x3, 0x0, 0x3}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000740)="e7662d4c637a5e8a54b5852178eeb1da56ec5704e07f980f4e54d2e967effcd6c27cc696d04826be83e1df4f1dc66cd1b3cdafe011b8b5fdfa87e275c914119e4a17c4652b62961ff8c847f0876a196b96cb7af747d07a5a861c1249a2bf0a174cc6c5f24c8bd4f4930b77dcd25341dc702bbdf71b2f9398", 0x78, 0x1, 0x0, 0xe7e9c64fc14214bf}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000300)="9075424e6706edd6c753b0869a7055d9953e9d818b21fc3040d1a46c22c4a22141840744d9469f749dfc004f56b8c178054a8df219f8b2fea26c0ffa780247da8ed6484e3345dfa6e547d3dafd50dbd8", 0x50, 0x6bf5cc02, 0x0, 0x0, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f0000000580)="10ba18309b3c2242693d61f0de5ceb5da2008acd83564a56229927acc9f6ad514f2169e394ed657eaa1f9a50f079e7b0de22758f35eed2a0bd44be81cf7c489c50225fc3e6454713e0c03ad23afb811e06a0cbe84ade9b50b9483b40e69dd09555d2567bf1b02fb8bcfe819234976a294a94027284ca304e06e988d3b049597b9c1a", 0x82, 0xffff}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x1f0, r0, &(0x7f00000006c0)="f050966d947e4a51c55ce55a4acf8e42e80bf1672936b01e07af3134be4ff2948e860f7592394f47013d4b22491148e15a1b488da04a2d42de2dc3ef194f99ab6aef28aaa414d06a1a3ed6bc36", 0x4d, 0x7fffffff, 0x0, 0x3, r0}]) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) fstat(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980)={0x0, 0x0}, &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000bc0)=0xe8) mount$fuseblk(&(0x7f0000000240)='/dev/loop0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000500)='fuseblk\x00', 0x20080, &(0x7f0000000e40)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f74f5a6cf953d3030313536313132353336bcb032323730283d00"/42, @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',default_permissions,dont_measure,euid=', @ANYRESDEC=r5, @ANYBLOB=',appraise,euid>', @ANYRESDEC=r6, @ANYBLOB=',context=staff_u,seclabel,uid=', @ANYRESDEC=r7, @ANYBLOB="42473042b2a7b4651cd05f9d93415f3830979642e335a928b5b4222be582b7d131613964102dc07df51028fa559458"]) setsockopt$inet_buf(r2, 0x0, 0x29, &(0x7f0000000d40)="e4aeaf3471afd1e3b3b40aa4b113260e061191cf05ba430790c2cce8233ea631fa9c759111411d50645593132f7d028c77303314e6560ea0fe0d1de848f110e151d0c8b33307582db6d024cd6720eb76b83c8ddee1f7febac74681264e9c8f1f0de20d8341f962191644f41e0c3b7cd9cafbfb1ec214aa713fd73d1bc4bba53dda28de4a3da743f6c0e0af66163a062632b5ebf58d171bdc3fb663270ede0ac3dd2435c13f633047653d77f08702ac92fcacc3de4c0b8861ed64b0d6f065e8735966e1b013bd3038743acfec1c3d4f4bcedc7c9bb18c6c0a", 0xd8) 20:37:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getcwd(&(0x7f0000000440)=""/153, 0x99) 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x1}, 0x10) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x214) recvfrom$inet(r0, 0x0, 0xfffffe44, 0x0, 0x0, 0x800e00521) shutdown(r0, 0x0) 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1760.781200][T25155] FAULT_INJECTION: forcing a failure. [ 1760.781200][T25155] name failslab, interval 1, probability 0, space 0, times 0 20:37:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x44000, &(0x7f0000000080)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xe233}}], [{@hash='hash'}]}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1760.831881][T25155] CPU: 1 PID: 25155 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1760.839811][T25155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1760.849860][T25155] Call Trace: [ 1760.853153][T25155] dump_stack+0x1d8/0x2f8 [ 1760.857485][T25155] should_fail+0x555/0x770 [ 1760.861908][T25155] __should_failslab+0x11a/0x160 [ 1760.866847][T25155] ? ksys_mount+0x6a/0x100 [ 1760.871262][T25155] should_failslab+0x9/0x20 [ 1760.875758][T25155] __kmalloc_track_caller+0x79/0x340 [ 1760.881038][T25155] strndup_user+0x76/0x130 [ 1760.885621][T25155] ksys_mount+0x6a/0x100 [ 1760.889869][T25155] __x64_sys_mount+0xbf/0xd0 [ 1760.894460][T25155] do_syscall_64+0xfe/0x140 [ 1760.898964][T25155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1760.904843][T25155] RIP: 0033:0x45c2ca [ 1760.908732][T25155] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:37:36 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:36 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9"], 0x60}}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @dev}, &(0x7f0000000380)=0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0x6f) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/21, &(0x7f0000000400)=0x15) exit(0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x20000, 0x4a95d5334a96c742) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/xfrm_stat\x00') ioctl$KDDELIO(r1, 0x4b35, 0x1000) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)={0x0, 0x14, 0x1, 0x1b, 0x6, 0x9, 0x6, 0x65, 0xffffffffffffffff}) fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20010}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x98, r2, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x0, 0x2]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xffffffff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0xff, 0xffffffff, 0x6]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x2, 0x4dec, 0xffffffff80000001, 0xdf]}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0xd}}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x8081) socket$inet(0x2, 0x0, 0x0) [ 1760.928327][T25155] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1760.936743][T25155] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1760.944709][T25155] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1760.952675][T25155] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1760.961159][T25155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1760.961164][T25155] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1761.105265][T25357] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1761.190451][T25477] FAULT_INJECTION: forcing a failure. [ 1761.190451][T25477] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.207711][T25477] CPU: 0 PID: 25477 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1761.215621][T25477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1761.225660][T25477] Call Trace: [ 1761.225678][T25477] dump_stack+0x1d8/0x2f8 [ 1761.225693][T25477] should_fail+0x555/0x770 20:37:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfff, 0x8b5e21eee3d53e68) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10001}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x90, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3f, @empty, 0xdc2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7f, @loopback, 0x7}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'eql\x00'}}]}, @TIPC_NLA_MON={0x4}]}, 0x90}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1761.225708][T25477] __should_failslab+0x11a/0x160 [ 1761.225718][T25477] ? tomoyo_encode2+0x273/0x5a0 [ 1761.225733][T25477] should_failslab+0x9/0x20 [ 1761.251971][T25477] __kmalloc+0x7a/0x340 [ 1761.256103][T25477] tomoyo_encode2+0x273/0x5a0 [ 1761.260769][T25477] tomoyo_encode+0x29/0x40 [ 1761.265175][T25477] tomoyo_mount_permission+0x216/0xa30 [ 1761.265186][T25477] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1761.265198][T25477] ? path_lookupat+0x474/0xb30 [ 1761.265213][T25477] ? kmem_cache_free+0xd8/0xf0 [ 1761.265234][T25477] tomoyo_sb_mount+0x35/0x40 20:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1761.265244][T25477] security_sb_mount+0x84/0xe0 [ 1761.265259][T25477] do_mount+0x107/0x2490 [ 1761.265270][T25477] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1761.276397][T25477] ? copy_mount_options+0x5f/0x3c0 [ 1761.276409][T25477] ? copy_mount_options+0x308/0x3c0 [ 1761.276420][T25477] ksys_mount+0xcc/0x100 [ 1761.276430][T25477] __x64_sys_mount+0xbf/0xd0 [ 1761.276443][T25477] do_syscall_64+0xfe/0x140 [ 1761.276457][T25477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1761.334629][T25477] RIP: 0033:0x45c2ca 20:37:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1761.338519][T25477] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1761.358114][T25477] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1761.366519][T25477] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1761.374487][T25477] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1761.382455][T25477] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 20:37:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1761.382461][T25477] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1761.382467][T25477] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:36 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1761.545257][T25691] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 20:37:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1761.669707][T25770] FAULT_INJECTION: forcing a failure. [ 1761.669707][T25770] name failslab, interval 1, probability 0, space 0, times 0 [ 1761.707780][T25770] CPU: 1 PID: 25770 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 20:37:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) finit_module(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x1) [ 1761.715710][T25770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1761.725763][T25770] Call Trace: [ 1761.729054][T25770] dump_stack+0x1d8/0x2f8 [ 1761.733378][T25770] should_fail+0x555/0x770 [ 1761.737800][T25770] __should_failslab+0x11a/0x160 [ 1761.742735][T25770] ? tomoyo_encode2+0x273/0x5a0 [ 1761.747591][T25770] should_failslab+0x9/0x20 [ 1761.752102][T25770] __kmalloc+0x7a/0x340 [ 1761.756255][T25770] tomoyo_encode2+0x273/0x5a0 [ 1761.760943][T25770] tomoyo_encode+0x29/0x40 20:37:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1761.765356][T25770] tomoyo_mount_permission+0x216/0xa30 [ 1761.770802][T25770] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1761.776518][T25770] ? kmem_cache_free+0xd8/0xf0 [ 1761.781302][T25770] tomoyo_sb_mount+0x35/0x40 [ 1761.785925][T25770] security_sb_mount+0x84/0xe0 [ 1761.790691][T25770] do_mount+0x107/0x2490 [ 1761.794927][T25770] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1761.794939][T25770] ? copy_mount_options+0x5f/0x3c0 [ 1761.794952][T25770] ? copy_mount_options+0x308/0x3c0 [ 1761.810845][T25770] ksys_mount+0xcc/0x100 [ 1761.815091][T25770] __x64_sys_mount+0xbf/0xd0 20:37:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1761.819680][T25770] do_syscall_64+0xfe/0x140 [ 1761.824184][T25770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1761.830064][T25770] RIP: 0033:0x45c2ca [ 1761.830074][T25770] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1761.830083][T25770] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1761.861976][T25770] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca 20:37:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1761.869998][T25770] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1761.877990][T25770] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1761.877995][T25770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1761.878000][T25770] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:37 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:37 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1762.077219][T26057] FAULT_INJECTION: forcing a failure. [ 1762.077219][T26057] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.157114][T26057] CPU: 0 PID: 26057 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1762.165049][T26057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1762.175100][T26057] Call Trace: [ 1762.178388][T26057] dump_stack+0x1d8/0x2f8 [ 1762.182802][T26057] should_fail+0x555/0x770 [ 1762.187217][T26057] __should_failslab+0x11a/0x160 [ 1762.192150][T26057] ? getname_flags+0xba/0x640 [ 1762.196825][T26057] should_failslab+0x9/0x20 [ 1762.201326][T26057] kmem_cache_alloc+0x56/0x2e0 [ 1762.206084][T26057] ? trace_hardirqs_on_caller+0x74/0x80 [ 1762.211632][T26057] getname_flags+0xba/0x640 [ 1762.216130][T26057] user_path_at_empty+0x2d/0x50 [ 1762.221028][T26057] do_mount+0xd4/0x2490 [ 1762.225396][T26057] ? copy_mount_options+0x308/0x3c0 [ 1762.230878][T26057] ksys_mount+0xcc/0x100 [ 1762.235206][T26057] __x64_sys_mount+0xbf/0xd0 [ 1762.239887][T26057] do_syscall_64+0xfe/0x140 [ 1762.244392][T26057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1762.250294][T26057] RIP: 0033:0x45c2ca [ 1762.254179][T26057] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1762.273778][T26057] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1762.282187][T26057] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1762.290152][T26057] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1762.298125][T26057] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 20:37:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x4, &(0x7f0000000240)=[{&(0x7f00000003c0)="ab4055034feba0d84b22e12d3733fca628509930e00f147aa67f0afd2b62c49f7310fa04c99fa58c9b5eb37e30f62fbbdcda2808d9626e30b166f2529ddb6b4e470fa2278b724169d32448cf9ab018ad35a36660910822376e0ca040a3a85abb577bd6d7a8f8fe53c0ffb1c00acbba76a5e8f2404437bf8a6fe5ccd9154b4363e4ab0857aa8ecd7745097b4b7433adc033d03a12665a7764b439b2befc3007141e2bd5b9b17e9f630447b329a951f980872ce6af7f2802c716aaa3f047cd88a91036ea10a55841eaa8de0e7f3d23465f329c06588eed0d33c6c4389f69fb4beca993ece4ca5113e281a634010448731fac06066f6d9c3e76", 0xf8, 0xd2ff}, {&(0x7f0000000580)="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", 0x1000, 0x2}, {&(0x7f0000000080)="869d21ecf21bf5d228d17afc329f", 0xe, 0x8}, {&(0x7f0000001580)="4514fb82d53e0c275497147130d58d3b8c5ca07393461697bb8b25ba59e72ecc73e3dcdf21b5ce3e178c2b4c7751424c8e4ef1e1c0e51af3b6882777eebb58f2301c751594ecec06afa047c03fb705bce6034ee7a08ede86c00031b9b4e7c7bd880710666802916d87948235e678ddffbf6b7747b38140b85acb8ef338f0a5569828af3ec07448ce621c570e15c6dca77be96ff9c850", 0x96, 0x7fff}], 0x4000, &(0x7f00000000c0)={[{@two_active_logs='active_logs=2'}]}) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:37 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:37 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1762.306092][T26057] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1762.314058][T26057] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:37 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:37 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0xaaaaaaaaaaaaba3, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x4}], 0x14, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) syslog(0x0, &(0x7f0000000000)=""/83, 0x53) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 20:37:37 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:37 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1762.564729][T26515] FAULT_INJECTION: forcing a failure. [ 1762.564729][T26515] name failslab, interval 1, probability 0, space 0, times 0 [ 1762.627702][T26515] CPU: 0 PID: 26515 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1762.635631][T26515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1762.645683][T26515] Call Trace: [ 1762.648976][T26515] dump_stack+0x1d8/0x2f8 [ 1762.653308][T26515] should_fail+0x555/0x770 [ 1762.657742][T26515] __should_failslab+0x11a/0x160 [ 1762.662837][T26515] ? tomoyo_encode2+0x273/0x5a0 [ 1762.667706][T26515] should_failslab+0x9/0x20 [ 1762.672207][T26515] __kmalloc+0x7a/0x340 20:37:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1762.676363][T26515] tomoyo_encode2+0x273/0x5a0 [ 1762.681049][T26515] tomoyo_realpath_from_path+0x769/0x7c0 [ 1762.686683][T26515] tomoyo_mount_permission+0x294/0xa30 [ 1762.692144][T26515] ? kmem_cache_free+0xd8/0xf0 [ 1762.696916][T26515] tomoyo_sb_mount+0x35/0x40 [ 1762.701502][T26515] security_sb_mount+0x84/0xe0 [ 1762.706271][T26515] do_mount+0x107/0x2490 [ 1762.710599][T26515] ? copy_mount_options+0x25e/0x3c0 [ 1762.715805][T26515] ? copy_mount_options+0x308/0x3c0 [ 1762.721018][T26515] ksys_mount+0xcc/0x100 20:37:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1762.725436][T26515] __x64_sys_mount+0xbf/0xd0 [ 1762.734544][T26515] do_syscall_64+0xfe/0x140 [ 1762.739047][T26515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1762.745043][T26515] RIP: 0033:0x45c2ca [ 1762.748927][T26515] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1762.768523][T26515] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1762.776926][T26515] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1762.776932][T26515] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1762.776937][T26515] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1762.776942][T26515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1762.776947][T26515] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1762.819408][T26515] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:38 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:38 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='dirsync\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cp\xe0f\x8a\x94-\x91\xbe\x19\b\x12uacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:38 executing program 1: syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1763.017943][T26837] FAULT_INJECTION: forcing a failure. [ 1763.017943][T26837] name failslab, interval 1, probability 0, space 0, times 0 20:37:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:38 executing program 1: syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1763.120201][T26837] CPU: 0 PID: 26837 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1763.128131][T26837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.138184][T26837] Call Trace: [ 1763.141472][T26837] dump_stack+0x1d8/0x2f8 [ 1763.145793][T26837] should_fail+0x555/0x770 [ 1763.145809][T26837] __should_failslab+0x11a/0x160 [ 1763.145820][T26837] ? tomoyo_encode2+0x273/0x5a0 [ 1763.145830][T26837] should_failslab+0x9/0x20 [ 1763.145841][T26837] __kmalloc+0x7a/0x340 [ 1763.145853][T26837] tomoyo_encode2+0x273/0x5a0 [ 1763.145865][T26837] tomoyo_realpath_from_path+0x769/0x7c0 [ 1763.145880][T26837] tomoyo_mount_permission+0x923/0xa30 [ 1763.164523][T26837] ? kmem_cache_free+0xd8/0xf0 [ 1763.189116][T26837] tomoyo_sb_mount+0x35/0x40 [ 1763.193702][T26837] security_sb_mount+0x84/0xe0 [ 1763.193718][T26837] do_mount+0x107/0x2490 [ 1763.193732][T26837] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1763.208270][T26837] ? copy_mount_options+0x5f/0x3c0 [ 1763.213389][T26837] ? copy_mount_options+0x308/0x3c0 [ 1763.218586][T26837] ksys_mount+0xcc/0x100 [ 1763.222824][T26837] __x64_sys_mount+0xbf/0xd0 [ 1763.227413][T26837] do_syscall_64+0xfe/0x140 [ 1763.231915][T26837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1763.237833][T26837] RIP: 0033:0x45c2ca [ 1763.241722][T26837] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1763.261322][T26837] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1763.269816][T26837] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1763.277837][T26837] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1763.286005][T26837] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1763.293966][T26837] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1763.301910][T26837] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1763.312185][T26837] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:38 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:38 executing program 1: syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) mount$fuseblk(&(0x7f0000000340)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x40000, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'blksize'}}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_gt={'uid>', r5}}]}}) 20:37:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:38 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, 0x0) 20:37:38 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1763.476549][T27167] FAULT_INJECTION: forcing a failure. [ 1763.476549][T27167] name failslab, interval 1, probability 0, space 0, times 0 20:37:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1763.583120][T27167] CPU: 1 PID: 27167 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1763.591151][T27167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.601212][T27167] Call Trace: [ 1763.604524][T27167] dump_stack+0x1d8/0x2f8 [ 1763.608868][T27167] should_fail+0x555/0x770 [ 1763.613302][T27167] __should_failslab+0x11a/0x160 [ 1763.618250][T27167] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1763.623981][T27167] should_failslab+0x9/0x20 [ 1763.628480][T27167] __kmalloc+0x7a/0x340 20:37:39 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xdc, 0x1) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0xff00000000000000, 0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000080), &(0x7f0000000140)=0x4) 20:37:39 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1763.632629][T27167] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1763.638349][T27167] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1763.643912][T27167] tomoyo_mount_permission+0x923/0xa30 [ 1763.649380][T27167] ? kmem_cache_free+0xd8/0xf0 [ 1763.654160][T27167] tomoyo_sb_mount+0x35/0x40 [ 1763.658900][T27167] security_sb_mount+0x84/0xe0 [ 1763.663668][T27167] do_mount+0x107/0x2490 [ 1763.667907][T27167] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1763.673453][T27167] ? copy_mount_options+0x5f/0x3c0 [ 1763.678549][T27167] ? copy_mount_options+0x308/0x3c0 [ 1763.678559][T27167] ksys_mount+0xcc/0x100 [ 1763.678570][T27167] __x64_sys_mount+0xbf/0xd0 [ 1763.678583][T27167] do_syscall_64+0xfe/0x140 [ 1763.697076][T27167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1763.702993][T27167] RIP: 0033:0x45c2ca [ 1763.706878][T27167] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:37:39 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:39 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:39 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:39 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, 0x0) [ 1763.726603][T27167] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1763.735033][T27167] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1763.735039][T27167] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1763.735044][T27167] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1763.735049][T27167] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1763.735059][T27167] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1763.770843][T27167] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:39 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:39 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, 0x0) 20:37:39 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1763.923968][T27454] FAULT_INJECTION: forcing a failure. [ 1763.923968][T27454] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.977990][T27454] CPU: 1 PID: 27454 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1763.985922][T27454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.996062][T27454] Call Trace: [ 1763.999359][T27454] dump_stack+0x1d8/0x2f8 [ 1764.003788][T27454] should_fail+0x555/0x770 [ 1764.008217][T27454] __should_failslab+0x11a/0x160 [ 1764.013159][T27454] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1764.019049][T27454] should_failslab+0x9/0x20 [ 1764.023552][T27454] __kmalloc+0x7a/0x340 20:37:39 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)) [ 1764.027709][T27454] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1764.033425][T27454] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1764.038961][T27454] tomoyo_mount_permission+0x294/0xa30 [ 1764.038973][T27454] ? path_lookupat+0x474/0xb30 [ 1764.038988][T27454] ? kmem_cache_free+0xd8/0xf0 [ 1764.039010][T27454] tomoyo_sb_mount+0x35/0x40 [ 1764.049185][T27454] security_sb_mount+0x84/0xe0 [ 1764.049207][T27454] do_mount+0x107/0x2490 [ 1764.067481][T27454] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1764.073024][T27454] ? copy_mount_options+0x5f/0x3c0 20:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1764.078135][T27454] ? copy_mount_options+0x308/0x3c0 [ 1764.083334][T27454] ksys_mount+0xcc/0x100 [ 1764.087660][T27454] __x64_sys_mount+0xbf/0xd0 [ 1764.092253][T27454] do_syscall_64+0xfe/0x140 [ 1764.096763][T27454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1764.102735][T27454] RIP: 0033:0x45c2ca [ 1764.106623][T27454] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:37:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) 20:37:39 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)) [ 1764.126230][T27454] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1764.126239][T27454] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1764.126244][T27454] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1764.126249][T27454] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1764.126259][T27454] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1764.150555][T27454] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1764.158509][T27454] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:39 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:39 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:39 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:39 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)) 20:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:39 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:39 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:39 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) connect$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x8, 0x6, @link_local}, 0x14) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_timeout(0xf, r3, 0x100) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', r3) [ 1764.389876][T27822] FAULT_INJECTION: forcing a failure. [ 1764.389876][T27822] name failslab, interval 1, probability 0, space 0, times 0 20:37:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1764.503266][T27822] CPU: 1 PID: 27822 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1764.511206][T27822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.521272][T27822] Call Trace: [ 1764.524579][T27822] dump_stack+0x1d8/0x2f8 [ 1764.528914][T27822] should_fail+0x555/0x770 [ 1764.533332][T27822] __should_failslab+0x11a/0x160 [ 1764.538272][T27822] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1764.543992][T27822] should_failslab+0x9/0x20 [ 1764.548515][T27822] __kmalloc+0x7a/0x340 20:37:39 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1764.552676][T27822] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1764.558407][T27822] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1764.563957][T27822] tomoyo_mount_permission+0x923/0xa30 [ 1764.569424][T27822] ? kmem_cache_free+0xd8/0xf0 [ 1764.574201][T27822] tomoyo_sb_mount+0x35/0x40 [ 1764.578805][T27822] security_sb_mount+0x84/0xe0 [ 1764.583576][T27822] do_mount+0x107/0x2490 [ 1764.587902][T27822] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1764.593450][T27822] ? copy_mount_options+0x5f/0x3c0 [ 1764.598911][T27822] ? copy_mount_options+0x308/0x3c0 [ 1764.604112][T27822] ksys_mount+0xcc/0x100 [ 1764.608371][T27822] __x64_sys_mount+0xbf/0xd0 [ 1764.612958][T27822] do_syscall_64+0xfe/0x140 [ 1764.617461][T27822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1764.623364][T27822] RIP: 0033:0x45c2ca [ 1764.627455][T27822] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1764.647408][T27822] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1764.647417][T27822] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1764.647421][T27822] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1764.647426][T27822] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1764.647431][T27822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1764.647436][T27822] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1764.712122][T27822] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:40 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:40 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:40 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @host}, 0x10, 0x800) recvmsg(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f00000018c0)=""/142, 0x8e}, {&(0x7f0000001980)=""/202, 0xca}], 0x2, &(0x7f0000001ac0)=""/34, 0x22}, 0x10001) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) sendmsg$xdp(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, 0x1, r2, 0x3c}, 0x10, &(0x7f0000001800)=[{&(0x7f00000003c0)="74e788341e5986c09b207380fabef4a13980120576dfaffbc00df8b96f3a30611977b6654f1fc0ace80f460a93eda626ee8325c5cc6af584bed7436b8ed902aaff61290faa4a6945ba65817a1a1f15d66cff602cfaceab22ac64c9051ee173d84ae27758ba5de482d2b6a7fd286f9338cd48222b3c57b34adfca64c05d770b5228f7e21be0087469b1e3fc222351cffff2d28a617370a0526392ea431a0cfdbf140ae484a9e92c1c16226fc306aac7812bb9934830fde7a34be4e4ad81fc7dc5128f7ed1198545fec76c0ac481cfafc96ce6218825d6241c3004adf5e0c57b63d2bb8714f330bd02995c892b9a91f0ee04db833f3bbbdf", 0xf7}, {&(0x7f0000000240)="29c136358416feac343dae47855c23c6655a2cb65a74cb0a2730cffa141e766a7e051a6bad0e0a69d76affc2c6f0f99e511825fe0947ac91b84ac974957114a897c9327fda8b0dc87459ee3f540535105102f244958f67a58c4aa6c58ff28f8c227ffb738a33cb1a", 0x68}, {&(0x7f00000000c0)}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="859f22c154489dd503b010d00ec1610da31903a96e1f22f750b264c6e9108f22d87d2349ff1ae3b4d803d8ca369edd9c43f0677abb887eae3f014d7ae456403e87a3dc234fa4993deecc01f11aa8503ba1c0c35122ff33f20825a90e2d8538873e612d3960681528d3efcb29395165c6134145d2496a05d1bb68efd650c2a119cbdd1a525dc9b552b26632a3e33d8c14856fcefff21710b53a7fbd92cfb8bb2ed916d1e1a937ec3503ecc4c975631a", 0xaf}, {&(0x7f0000000300)="d499156d74b815a25b3e5fcef3a85ca1ad6a34e6dcf1a1b8955450d31c6ffd742b3269e123dd21604238474830f8ece7175d8a613e4a33bf7667920bfe9225875fddc5c3e4e9b9548f3a2b54964499fa7b68fce7406dfe757c1bdb28", 0x5c}, {&(0x7f0000001640)="0f61f7eaf8ee650f09588fcc154259f1e5d06504e2a3d6a5150d34e5f465d84d55042e0afd20b41c81be4212eb487e0caddac0ad1a6de8bffb9ef94e183bb0f44f0b0a3e778398965ed365b8daecb07954ab1807dbd09c61c4cbbc537d945dbfbdfd73c820203f696557c97314ecc17615d6772e96e7cd2a5c9154b0929ee56c1c51f2125ddd7ba1565541c308c57f141d6d23d63953a60437d7", 0x9a}, {&(0x7f0000001700)="649de2674bdc83441a1fd4ee9ae3beeb4f03705bd67156ef51c35e7be490f2601d9164ce5db4c96ec7231cfb53b2ad3b87b4b4ebd7ff97f4a575a61c510f8b6374d17ff3845f5eb080cfdf0f98516cd9b3c82b7f799c2f12f911fee42b113ad2110d8f70fb767a9fea7ed47d31ce95feb17d5cacc60693af312f895d7437ae7d88d642adcd7e22e60c3d55eb585384a38606439c0bfc6f8b51193ec496517a091299b4df29bf1965caad24c261a598a6c7c04f17116052dc4c8749a62fe1271ae78fca7cfd193729d3204fc68ab4cce2a06ddae207fc8dab", 0xd8}, {&(0x7f00000004c0)="412f8e6750b02fb1de8f9100ac4527ce78d775aaf0d025894940a197ab9bcb47a34870ea14446640d76e8f22092c5ccbae4504e03060a3fe10a1ab44996cee0e9f18", 0x42}, {&(0x7f0000000140)="b26345b62d20dc5bc10d2c4d5235529379e96e7e20bb7d7ec179894f9f37ef39500c2482", 0x24}], 0xa, 0x0, 0x0, 0x4000000}, 0x8000) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) r2 = dup3(r1, r0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, [0x5, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x20, 0xffff, 0x0, 0x4, 0x0, 0x7, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:40 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:40 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1764.916454][T28254] FAULT_INJECTION: forcing a failure. [ 1764.916454][T28254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1764.929699][T28254] CPU: 0 PID: 28254 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1764.929706][T28254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.929709][T28254] Call Trace: [ 1764.929725][T28254] dump_stack+0x1d8/0x2f8 [ 1764.929741][T28254] should_fail+0x555/0x770 [ 1764.959663][T28254] should_fail_alloc_page+0x55/0x60 [ 1764.964862][T28254] prepare_alloc_pages+0x283/0x470 [ 1764.970374][T28254] __alloc_pages_nodemask+0xb2/0x5d0 [ 1764.970388][T28254] ? debug_smp_processor_id+0x1c/0x20 [ 1764.981132][T28254] kmem_getpages+0x56/0xa20 [ 1764.985654][T28254] ? trace_lock_release+0x135/0x1a0 [ 1764.990858][T28254] cache_grow_begin+0x7e/0x2c0 [ 1764.995796][T28254] cache_alloc_refill+0x311/0x3f0 [ 1765.000820][T28254] ? check_preemption_disabled+0xb7/0x2a0 [ 1765.006549][T28254] kmem_cache_alloc+0x2b9/0x2e0 [ 1765.011396][T28254] ? getname_kernel+0x59/0x2f0 [ 1765.016146][T28254] getname_kernel+0x59/0x2f0 [ 1765.016156][T28254] kern_path+0x1f/0x40 [ 1765.016167][T28254] tomoyo_mount_permission+0x7f1/0xa30 [ 1765.016187][T28254] ? kmem_cache_free+0xd8/0xf0 [ 1765.016208][T28254] tomoyo_sb_mount+0x35/0x40 [ 1765.024815][T28254] security_sb_mount+0x84/0xe0 [ 1765.024830][T28254] do_mount+0x107/0x2490 [ 1765.024838][T28254] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1765.024849][T28254] ? copy_mount_options+0x5f/0x3c0 [ 1765.059300][T28254] ? copy_mount_options+0x308/0x3c0 [ 1765.064622][T28254] ksys_mount+0xcc/0x100 [ 1765.068954][T28254] __x64_sys_mount+0xbf/0xd0 [ 1765.073545][T28254] do_syscall_64+0xfe/0x140 [ 1765.078044][T28254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1765.083935][T28254] RIP: 0033:0x45c2ca [ 1765.087825][T28254] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1765.087830][T28254] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:37:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:40 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1765.087839][T28254] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1765.087844][T28254] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1765.087848][T28254] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1765.087852][T28254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1765.087862][T28254] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:40 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:40 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:40 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000000c0)={r1}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x8004, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000000)='procselfvboxnet1\x00', 0x0, r3) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:40 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:40 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:40 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1765.426968][T28539] FAULT_INJECTION: forcing a failure. [ 1765.426968][T28539] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.465145][T28539] CPU: 1 PID: 28539 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 20:37:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1765.473091][T28539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.483148][T28539] Call Trace: [ 1765.486443][T28539] dump_stack+0x1d8/0x2f8 [ 1765.490779][T28539] should_fail+0x555/0x770 [ 1765.495203][T28539] __should_failslab+0x11a/0x160 [ 1765.500157][T28539] ? btrfs_mount+0x83/0x18f0 [ 1765.504749][T28539] should_failslab+0x9/0x20 [ 1765.509252][T28539] __kmalloc_track_caller+0x79/0x340 [ 1765.514527][T28539] ? perf_trace_lock+0x90/0x360 [ 1765.519381][T28539] kstrdup+0x34/0x70 20:37:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000180), 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) timer_create(0x1, &(0x7f0000000040)={0x0, 0x16, 0x0, @tid=r1}, &(0x7f0000000080)) openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_per\xd7\xfd\xf7\xfd\xc7\x19\\]\xdf\x9fyY\x8b*\xbd\xbc\xach\xcf\x14z\x1cO\xcb?i\x93u\xdc\xcd=\xa8d\xe6-_]\xc9o#`\x9e\x05\xfc&\xc1\f\xb8\r6\x8a\xa4\x87\x93\x9f\x1e\xcen\"\x96\x1e\x03\xa2h\xb0A\x98F', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:40 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1765.523271][T28539] btrfs_mount+0x83/0x18f0 [ 1765.527693][T28539] ? legacy_parse_param+0x37b/0x880 [ 1765.532893][T28539] ? cap_capable+0x250/0x290 [ 1765.537488][T28539] legacy_get_tree+0xf9/0x1a0 [ 1765.542163][T28539] ? btrfs_resize_thread_pool+0x290/0x290 [ 1765.547881][T28539] vfs_get_tree+0x8f/0x380 [ 1765.552295][T28539] do_mount+0x169d/0x2490 [ 1765.556624][T28539] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1765.562173][T28539] ? copy_mount_options+0x5f/0x3c0 [ 1765.567297][T28539] ? copy_mount_options+0x308/0x3c0 [ 1765.572501][T28539] ksys_mount+0xcc/0x100 [ 1765.576744][T28539] __x64_sys_mount+0xbf/0xd0 [ 1765.581335][T28539] do_syscall_64+0xfe/0x140 [ 1765.585841][T28539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1765.591729][T28539] RIP: 0033:0x45c2ca [ 1765.595616][T28539] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1765.615209][T28539] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:37:41 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:41 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1765.615218][T28539] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1765.615223][T28539] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1765.615227][T28539] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1765.615231][T28539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1765.615236][T28539] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1765.791637][T28998] FAULT_INJECTION: forcing a failure. [ 1765.791637][T28998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1765.805451][T28998] CPU: 0 PID: 28998 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1765.813337][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.823382][T28998] Call Trace: [ 1765.826664][T28998] dump_stack+0x1d8/0x2f8 [ 1765.830983][T28998] should_fail+0x555/0x770 [ 1765.835380][T28998] should_fail_alloc_page+0x55/0x60 [ 1765.840561][T28998] prepare_alloc_pages+0x283/0x470 [ 1765.845675][T28998] __alloc_pages_nodemask+0xb2/0x5d0 [ 1765.850952][T28998] ? debug_smp_processor_id+0x1c/0x20 [ 1765.856304][T28998] kmem_getpages+0x56/0xa20 [ 1765.860790][T28998] ? trace_lock_release+0x135/0x1a0 [ 1765.865984][T28998] cache_grow_begin+0x7e/0x2c0 [ 1765.870727][T28998] cache_alloc_refill+0x311/0x3f0 [ 1765.875827][T28998] ? check_preemption_disabled+0xb7/0x2a0 [ 1765.881694][T28998] kmem_cache_alloc+0x2b9/0x2e0 [ 1765.886522][T28998] ? getname_kernel+0x59/0x2f0 [ 1765.891264][T28998] getname_kernel+0x59/0x2f0 [ 1765.895830][T28998] kern_path+0x1f/0x40 [ 1765.899875][T28998] tomoyo_mount_permission+0x7f1/0xa30 [ 1765.905316][T28998] ? kmem_cache_free+0xd8/0xf0 [ 1765.910064][T28998] tomoyo_sb_mount+0x35/0x40 [ 1765.914631][T28998] security_sb_mount+0x84/0xe0 [ 1765.919373][T28998] do_mount+0x107/0x2490 [ 1765.923587][T28998] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1765.929292][T28998] ? copy_mount_options+0x5f/0x3c0 [ 1765.934394][T28998] ? copy_mount_options+0x308/0x3c0 [ 1765.939578][T28998] ksys_mount+0xcc/0x100 [ 1765.943804][T28998] __x64_sys_mount+0xbf/0xd0 [ 1765.948398][T28998] do_syscall_64+0xfe/0x140 [ 1765.952880][T28998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1765.958745][T28998] RIP: 0033:0x45c2ca [ 1765.962616][T28998] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1765.982193][T28998] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:37:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1765.990578][T28998] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1765.998785][T28998] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1766.007079][T28998] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1766.016589][T28998] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1766.024722][T28998] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:41 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1766.187501][T28872] FAT-fs (loop5): bogus number of reserved sectors [ 1766.218722][T28872] FAT-fs (loop5): Can't find a valid FAT filesystem 20:37:41 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x6001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0xac, 0x0, &(0x7f0000000580)=[@acquire_done={0x40106309, 0x1}, @exit_looper, @decrefs={0x40046307, 0x7f}, @enter_looper, @request_death={0x400c630e, 0x2}, @increfs, @clear_death={0x400c630f, 0x1}, @request_death, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000080)={@fda={0x66646185, 0x7, 0x2, 0x32}, @ptr={0x70742a85, 0x0, &(0x7f0000000040)=""/2, 0x2, 0x1, 0x14}, @ptr={0x70742a85, 0x1, &(0x7f00000003c0)=""/197, 0xc5, 0x2, 0x30}}, &(0x7f0000000140)={0x0, 0x20, 0x48}}, 0x1000}, @register_looper], 0x7b, 0x0, &(0x7f0000000240)="2322e6505d0f1b9a513c41d7e42c0f8cbc72bee8b0c8f65415667a2fde07bfabd8cab6f3dfc21713dea1d5e1eb42d6d313f52cd35018df942e214aeceed190e2c91dc36fe48c8901c171725f1b4b48970a6c7d87f056c5fdcd4d24f6cb7494e3011fa656443bc29dd8d111506bd5b515a6b3d652b2b7270fbc26f1"}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, 0x0) 20:37:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:41 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:41 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:41 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1766.491371][T29420] FAULT_INJECTION: forcing a failure. [ 1766.491371][T29420] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.528664][T29420] CPU: 0 PID: 29420 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1766.536602][T29420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1766.536606][T29420] Call Trace: [ 1766.536623][T29420] dump_stack+0x1d8/0x2f8 [ 1766.536639][T29420] should_fail+0x555/0x770 [ 1766.536654][T29420] __should_failslab+0x11a/0x160 [ 1766.536666][T29420] ? btrfs_mount+0x83/0x18f0 [ 1766.536681][T29420] should_failslab+0x9/0x20 [ 1766.572873][T29420] __kmalloc_track_caller+0x79/0x340 [ 1766.578158][T29420] ? perf_trace_lock+0x90/0x360 [ 1766.583020][T29420] kstrdup+0x34/0x70 [ 1766.587084][T29420] btrfs_mount+0x83/0x18f0 [ 1766.587103][T29420] ? legacy_parse_param+0x37b/0x880 [ 1766.597040][T29420] ? cap_capable+0x250/0x290 [ 1766.601644][T29420] legacy_get_tree+0xf9/0x1a0 [ 1766.606317][T29420] ? btrfs_resize_thread_pool+0x290/0x290 [ 1766.612123][T29420] vfs_get_tree+0x8f/0x380 [ 1766.616541][T29420] do_mount+0x169d/0x2490 [ 1766.620879][T29420] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1766.626419][T29420] ? copy_mount_options+0x5f/0x3c0 [ 1766.631528][T29420] ? copy_mount_options+0x308/0x3c0 [ 1766.636721][T29420] ksys_mount+0xcc/0x100 20:37:41 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:42 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1766.640959][T29420] __x64_sys_mount+0xbf/0xd0 [ 1766.645551][T29420] do_syscall_64+0xfe/0x140 [ 1766.645564][T29420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1766.645575][T29420] RIP: 0033:0x45c2ca [ 1766.656108][T29420] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1766.656114][T29420] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:37:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000000)={0x800, 'syz1\x00'}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) 20:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:42 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:42 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1766.656127][T29420] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1766.679587][T29420] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1766.679592][T29420] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1766.679597][T29420] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1766.679602][T29420] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\n\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1766.838122][T29584] FAULT_INJECTION: forcing a failure. [ 1766.838122][T29584] name failslab, interval 1, probability 0, space 0, times 0 [ 1766.853814][T29584] CPU: 0 PID: 29584 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1766.861754][T29584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1766.871896][T29584] Call Trace: [ 1766.871913][T29584] dump_stack+0x1d8/0x2f8 [ 1766.871932][T29584] should_fail+0x555/0x770 [ 1766.883927][T29584] __should_failslab+0x11a/0x160 [ 1766.888871][T29584] ? tomoyo_encode2+0x273/0x5a0 [ 1766.893724][T29584] should_failslab+0x9/0x20 [ 1766.898229][T29584] __kmalloc+0x7a/0x340 [ 1766.902387][T29584] tomoyo_encode2+0x273/0x5a0 [ 1766.907066][T29584] tomoyo_realpath_from_path+0x769/0x7c0 [ 1766.907083][T29584] tomoyo_mount_permission+0x923/0xa30 [ 1766.907103][T29584] ? kmem_cache_free+0xd8/0xf0 [ 1766.922947][T29584] tomoyo_sb_mount+0x35/0x40 [ 1766.927632][T29584] security_sb_mount+0x84/0xe0 [ 1766.932397][T29584] do_mount+0x107/0x2490 [ 1766.936643][T29584] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1766.942187][T29584] ? copy_mount_options+0x5f/0x3c0 [ 1766.947305][T29584] ? copy_mount_options+0x308/0x3c0 [ 1766.952514][T29584] ksys_mount+0xcc/0x100 [ 1766.956765][T29584] __x64_sys_mount+0xbf/0xd0 [ 1766.956780][T29584] do_syscall_64+0xfe/0x140 [ 1766.956798][T29584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1766.965844][T29584] RIP: 0033:0x45c2ca [ 1766.965855][T29584] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1766.965859][T29584] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1766.965868][T29584] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1766.965878][T29584] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1767.020978][T29584] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1767.028948][T29584] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 20:37:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\v\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1767.036916][T29584] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x101}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000480)={r1, 0x7}, &(0x7f00000004c0)=0x8) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x200) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000300), 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000001c0)='cpuacct.usa\x06\x00>\xc0\xd1rcpu_syZ@v\xf7\xd0|\x97\xd5\x19\xd3L6\xe5\xcew\xd5\x92\xf4\xac09\xdc\xea\x97p\xe0\xd0\xfe\xed\x90\x14\x83e\xd3,E$y1P\xdao\x97\xef_\xca\x884\a\x01\x86\xddj\xae\xf8<\x14\x14\xc8\xd2\x86\xd9\xe5\xc2\xf6\x9dX\x9b0\xa8L\xab\xe7\x85\xc3\xa1\x98\x00\xe1o\xf8~IA\xa1\xb4S\x00\x00\x00\xb6[\xff\xcb&\xca\x87$\x80T\x0fFL.\x80\xf4\xcfs\xa3TP\xc0\xa5z\xbf\xbf\xc6\x9a\x00\xcc[:Q\xa0q\x15pR\x93m\x83\xb9\x9d\xa7\x01k\xe7\x13\xd9\x91\x8f\f+\x96\xb2\x1b\xb1\x8e>\x85\xdf\xc4O\x12\xbf\xf1\"\xbb\x10Mf,\xf91\x1bVTZ\x01Z\"\xb8<\x87\xc1S1\x17\xd7S0\xce\xf5\tUy\xd8', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x243c00000000, 0x6}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e21, @broadcast}}, 0x80000001, 0x5}, 0xfffffee9) 20:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1767.169502][T29584] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:42 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\r\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mq_open(&(0x7f0000000040)='vfat\x00', 0x80, 0x18879ff148078c16, &(0x7f0000000080)={0xfffffffffffffff7, 0x3ff, 0xcb32, 0x7, 0xc, 0x80000000, 0x5, 0x80000001}) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x8) bind$netrom(r1, &(0x7f0000000240)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) 20:37:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:42 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1767.421093][T30076] FAULT_INJECTION: forcing a failure. [ 1767.421093][T30076] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.514997][T30076] CPU: 0 PID: 30076 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1767.522931][T30076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1767.532979][T30076] Call Trace: [ 1767.536256][T30076] dump_stack+0x1d8/0x2f8 [ 1767.536271][T30076] should_fail+0x555/0x770 [ 1767.536284][T30076] __should_failslab+0x11a/0x160 [ 1767.536296][T30076] should_failslab+0x9/0x20 [ 1767.554427][T30076] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1767.559714][T30076] ? legacy_init_fs_context+0x51/0xc0 [ 1767.565173][T30076] legacy_init_fs_context+0x51/0xc0 [ 1767.570455][T30076] alloc_fs_context+0x4e3/0x5f0 [ 1767.575314][T30076] fs_context_for_mount+0x24/0x30 [ 1767.580434][T30076] do_mount+0x1095/0x2490 [ 1767.584763][T30076] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1767.590301][T30076] ? copy_mount_options+0x5f/0x3c0 [ 1767.595506][T30076] ? copy_mount_options+0x308/0x3c0 [ 1767.600785][T30076] ksys_mount+0xcc/0x100 [ 1767.605008][T30076] __x64_sys_mount+0xbf/0xd0 [ 1767.605020][T30076] do_syscall_64+0xfe/0x140 [ 1767.605032][T30076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1767.605043][T30076] RIP: 0033:0x45c2ca [ 1767.623848][T30076] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1767.643446][T30076] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1767.651853][T30076] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca 20:37:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1767.659814][T30076] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1767.667780][T30076] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1767.675746][T30076] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1767.683714][T30076] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:43 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x10\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x8, &(0x7f0000001880)=[{&(0x7f00000003c0)="eedd564f912f1a28093ab74a9712a6b3de90c6ec261adc208a133e7c54ec5b7a96877e884fbbc34a96617faec1b26c241e31e3c1cec0b41268b239b8f4f47146a3f5bb2fe0180edb1f103c242a06625727fa72074f40dcd2f594cee217c0c3d89c9ecb47ae5b72eec1e4472814acc4413dea161adc9b100a4446372eb694a1ee9a5034a24d8e03d44e61e4c9dfa2f635490c4d55ed2f075afb0d24da812b366311f819c9e242681537c093fbc020343c4dbeb39457e3d92dc1ca6ecfaff34a7610095a4dcf3d7d575dd28387af5abf6936773a1305362c312a3dad0a82d0e2f3539c8900517868d0bafb8015", 0xec, 0x10000}, {&(0x7f0000000580)="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", 0x1000, 0x8}, {&(0x7f0000001580)="197652802a2b86859374fa9e9ba863e50898c84df3499b02cde7d565d7b7427294619de4c8bbe82c1ad9cde886d0f1d47b526f6a4b4c73a60d0474802e77d71fade0c66cf27132da22e8909a791b3365d88dcb70f223890cbe9c46f5038349e0b00084d0eb619f10699f1249c1f40904f3cac9c23e2e3a972afd09a83319d22250e8e46f9e5fe4433d29901aceb1720b6b050cbfcada0b50a751f6a159bc4e6f0c8488aff8e3387bf4432468955db510beeaf1adb4179bb77473041fba9572a3a454af0eec0dbe93ffbcd6417656cb66e102bff55715c34dafa56ca71f043b69ccdf27eb38e3a25bb76b27fa69b79a80ed0ba99e0fa90961e8", 0xf9, 0xffffffff}, {&(0x7f0000000040)="a12f1d297662159b19d83722dbc2f7b43273b2985034860cfb9f811a2364a7f7d9c5d8880de7bff5ca45a63c7f3f63759c5ea82454231b46fe70f77ee626e975f757998907cf6c07dc8a34b30637a7f6e97d8e61ee3fead431e5814e8ff198f8ec098bf2dc3c70ccaa2641", 0x6b, 0x3}, {&(0x7f0000001680)="783b2ff3080c2ce8d15586924b092a8ca1a4fbc0334887adcd4ced4b4ee56fa62991341a19a60b8d20d8f03d211031df3730f483e0a77ef400543513fe7d203a12eee360b5e6ed74661a33e009c20a823eba3e8e3152c18fabd5c104bff44b20a22cbeda8c58ee71138bd1e381194da62bd12f7d19d8ef8724c209a733b804557888d19037347ff825d3ee684fa9e6b23e4619c4ce0ad92719c0c8a679e2af6072d89292531007acc1332b6d6156d60aad6824cba165c280f11f0ad7a35381706789a6595e79bd649abd94125e14f8507a6ae72564c73aac085ed6a49a6141bc5ded", 0xe2}, {&(0x7f0000000240)="6aac20adf97713a914e782b4e472cd8de533988a6046df5326f4a923453282de846426d326d4e39e61674accd6f5b3b9c22902e5ba7376d9144a08c4a7c9b625a46c9b2b155262185b6c5703aa4185a8543ec8cbed812303c03cb21f269c81774934e514834d0b9bb2ff4cffc82fae68701f26aad2", 0x75, 0x280000}, {&(0x7f0000001780)="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", 0xfb, 0x5}, {&(0x7f00000000c0)="ef036b2f", 0x4, 0x80000000}], 0x100000010, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, 0x0) accept4$unix(r1, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) setgid(r2) 20:37:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1767.837657][T30429] FAULT_INJECTION: forcing a failure. [ 1767.837657][T30429] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.851199][T30429] CPU: 0 PID: 30429 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1767.859107][T30429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1767.869153][T30429] Call Trace: [ 1767.869175][T30429] dump_stack+0x1d8/0x2f8 [ 1767.869190][T30429] should_fail+0x555/0x770 [ 1767.869203][T30429] __should_failslab+0x11a/0x160 [ 1767.869217][T30429] should_failslab+0x9/0x20 [ 1767.869227][T30429] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1767.869235][T30429] ? alloc_fs_context+0x65/0x5f0 [ 1767.869248][T30429] alloc_fs_context+0x65/0x5f0 [ 1767.905577][T30429] ? _raw_read_unlock+0x2c/0x50 [ 1767.910429][T30429] ? get_fs_type+0x47f/0x500 [ 1767.915023][T30429] fs_context_for_mount+0x24/0x30 [ 1767.920044][T30429] do_mount+0x1095/0x2490 [ 1767.920057][T30429] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1767.920066][T30429] ? copy_mount_options+0x5f/0x3c0 20:37:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1767.920078][T30429] ? copy_mount_options+0x308/0x3c0 [ 1767.920092][T30429] ksys_mount+0xcc/0x100 [ 1767.935163][T30429] __x64_sys_mount+0xbf/0xd0 [ 1767.935178][T30429] do_syscall_64+0xfe/0x140 [ 1767.935192][T30429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1767.935199][T30429] RIP: 0033:0x45c2ca [ 1767.935208][T30429] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x12\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1767.935217][T30429] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1767.954277][T30429] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1767.954283][T30429] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1767.954289][T30429] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1767.954295][T30429] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1767.954300][T30429] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:43 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:43 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:43 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1768.191967][T30762] FAULT_INJECTION: forcing a failure. [ 1768.191967][T30762] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.218650][T30762] CPU: 0 PID: 30762 Comm: syz-executor.5 Not tainted 5.3.0-rc6 #93 [ 1768.226576][T30762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1768.236636][T30762] Call Trace: [ 1768.236653][T30762] dump_stack+0x1d8/0x2f8 [ 1768.236666][T30762] should_fail+0x555/0x770 [ 1768.236682][T30762] __should_failslab+0x11a/0x160 [ 1768.241309][T30766] FAULT_INJECTION: forcing a failure. [ 1768.241309][T30766] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.244268][T30762] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1768.244284][T30762] should_failslab+0x9/0x20 [ 1768.276627][T30762] __kmalloc+0x7a/0x340 [ 1768.280772][T30762] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1768.286479][T30762] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1768.292024][T30762] tomoyo_path_number_perm+0x166/0x640 [ 1768.297483][T30762] ? smack_file_ioctl+0x226/0x2e0 [ 1768.302486][T30762] ? __fget+0x471/0x510 [ 1768.306633][T30762] tomoyo_file_ioctl+0x23/0x30 [ 1768.311380][T30762] security_file_ioctl+0x6d/0xd0 [ 1768.316315][T30762] __x64_sys_ioctl+0xa3/0x120 [ 1768.320977][T30762] do_syscall_64+0xfe/0x140 [ 1768.325550][T30762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1768.331422][T30762] RIP: 0033:0x459879 [ 1768.335305][T30762] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1768.355426][T30762] RSP: 002b:00007f5ad90fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1768.363816][T30762] RAX: ffffffffffffffda RBX: 00007f5ad90fcc90 RCX: 0000000000459879 [ 1768.371766][T30762] RDX: 0000000020000040 RSI: 0000000040a85321 RDI: 0000000000000003 [ 1768.379717][T30762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1768.387692][T30762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ad90fd6d4 [ 1768.395658][T30762] R13: 00000000004cdd90 R14: 00000000004d7cd8 R15: 0000000000000004 [ 1768.403631][T30766] CPU: 1 PID: 30766 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1768.411523][T30766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1768.421569][T30766] Call Trace: [ 1768.424858][T30766] dump_stack+0x1d8/0x2f8 [ 1768.429190][T30766] should_fail+0x555/0x770 [ 1768.433778][T30766] __should_failslab+0x11a/0x160 [ 1768.438714][T30766] should_failslab+0x9/0x20 20:37:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1768.442985][T30762] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1768.443206][T30766] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1768.455125][T30766] ? alloc_fs_context+0x65/0x5f0 [ 1768.460064][T30766] alloc_fs_context+0x65/0x5f0 [ 1768.464836][T30766] ? _raw_read_unlock+0x2c/0x50 [ 1768.469680][T30766] ? get_fs_type+0x47f/0x500 [ 1768.474265][T30766] fs_context_for_mount+0x24/0x30 [ 1768.479286][T30766] do_mount+0x1095/0x2490 [ 1768.483612][T30766] ? kmem_cache_alloc_trace+0x23a/0x2f0 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1768.489142][T30766] ? copy_mount_options+0x5f/0x3c0 [ 1768.494246][T30766] ? copy_mount_options+0x308/0x3c0 [ 1768.499437][T30766] ksys_mount+0xcc/0x100 [ 1768.503675][T30766] __x64_sys_mount+0xbf/0xd0 [ 1768.508269][T30766] do_syscall_64+0xfe/0x140 [ 1768.512789][T30766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1768.518675][T30766] RIP: 0033:0x45c2ca [ 1768.518685][T30766] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 20:37:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:43 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1768.518691][T30766] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1768.518703][T30766] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1768.542166][T30766] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1768.542173][T30766] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1768.542178][T30766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1768.542184][T30766] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:44 executing program 2 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:44 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1768.671574][T30961] FAULT_INJECTION: forcing a failure. [ 1768.671574][T30961] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.765021][T31002] FAULT_INJECTION: forcing a failure. [ 1768.765021][T31002] name failslab, interval 1, probability 0, space 0, times 0 [ 1768.771981][T30961] CPU: 0 PID: 30961 Comm: syz-executor.5 Not tainted 5.3.0-rc6 #93 [ 1768.785625][T30961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1768.785630][T30961] Call Trace: [ 1768.785646][T30961] dump_stack+0x1d8/0x2f8 [ 1768.785662][T30961] should_fail+0x555/0x770 [ 1768.808291][T30961] __should_failslab+0x11a/0x160 [ 1768.813258][T30961] ? tomoyo_encode2+0x273/0x5a0 [ 1768.818104][T30961] should_failslab+0x9/0x20 [ 1768.818115][T30961] __kmalloc+0x7a/0x340 [ 1768.818129][T30961] tomoyo_encode2+0x273/0x5a0 [ 1768.818143][T30961] tomoyo_realpath_from_path+0x769/0x7c0 [ 1768.831429][T30961] tomoyo_path_number_perm+0x166/0x640 [ 1768.831455][T30961] ? smack_file_ioctl+0x226/0x2e0 [ 1768.842492][T30961] ? __fget+0x471/0x510 [ 1768.842509][T30961] tomoyo_file_ioctl+0x23/0x30 [ 1768.842524][T30961] security_file_ioctl+0x6d/0xd0 [ 1768.856402][T30961] __x64_sys_ioctl+0xa3/0x120 [ 1768.856416][T30961] do_syscall_64+0xfe/0x140 [ 1768.856430][T30961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1768.865986][T30961] RIP: 0033:0x459879 [ 1768.865996][T30961] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1768.866001][T30961] RSP: 002b:00007f5ad90fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:37:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:44 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) [ 1768.866010][T30961] RAX: ffffffffffffffda RBX: 00007f5ad90fcc90 RCX: 0000000000459879 [ 1768.866018][T30961] RDX: 0000000020000040 RSI: 0000000040a85321 RDI: 0000000000000003 [ 1768.924387][T30961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1768.932344][T30961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ad90fd6d4 [ 1768.940307][T30961] R13: 00000000004cdd90 R14: 00000000004d7cd8 R15: 0000000000000004 [ 1768.948294][T31002] CPU: 1 PID: 31002 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1768.956186][T31002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1768.966229][T31002] Call Trace: [ 1768.970053][T31002] dump_stack+0x1d8/0x2f8 [ 1768.974388][T31002] should_fail+0x555/0x770 [ 1768.978803][T31002] __should_failslab+0x11a/0x160 [ 1768.983742][T31002] should_failslab+0x9/0x20 [ 1768.988261][T31002] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1768.993553][T31002] ? legacy_init_fs_context+0x51/0xc0 [ 1768.998927][T31002] legacy_init_fs_context+0x51/0xc0 [ 1769.004213][T31002] alloc_fs_context+0x4e3/0x5f0 [ 1769.009070][T31002] fs_context_for_mount+0x24/0x30 [ 1769.014877][T31002] do_mount+0x1095/0x2490 [ 1769.016573][T30961] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1769.019199][T31002] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1769.019215][T31002] ? copy_mount_options+0x5f/0x3c0 [ 1769.036493][T31002] ? copy_mount_options+0x308/0x3c0 [ 1769.041688][T31002] ksys_mount+0xcc/0x100 [ 1769.045928][T31002] __x64_sys_mount+0xbf/0xd0 [ 1769.050517][T31002] do_syscall_64+0xfe/0x140 [ 1769.055022][T31002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1769.060904][T31002] RIP: 0033:0x45c2ca 20:37:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1769.064791][T31002] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1769.084396][T31002] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1769.092805][T31002] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1769.100774][T31002] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1769.108752][T31002] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 20:37:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:44 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1769.116718][T31002] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1769.124672][T31002] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:44 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:44 executing program 2 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) dup3(0xffffffffffffffff, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:44 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:44 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x2, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:44 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00h\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1769.387917][T31272] FAULT_INJECTION: forcing a failure. [ 1769.387917][T31272] name failslab, interval 1, probability 0, space 0, times 0 20:37:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1769.453662][T31272] CPU: 0 PID: 31272 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1769.461590][T31272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1769.461594][T31272] Call Trace: [ 1769.461611][T31272] dump_stack+0x1d8/0x2f8 [ 1769.461627][T31272] should_fail+0x555/0x770 [ 1769.483662][T31272] __should_failslab+0x11a/0x160 [ 1769.488611][T31272] ? vfs_parse_fs_string+0xed/0x1a0 [ 1769.493806][T31272] should_failslab+0x9/0x20 [ 1769.498314][T31272] __kmalloc_track_caller+0x79/0x340 20:37:44 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x2, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1769.498330][T31272] kmemdup_nul+0x2a/0xa0 [ 1769.498342][T31272] vfs_parse_fs_string+0xed/0x1a0 [ 1769.498356][T31272] do_mount+0x11a6/0x2490 [ 1769.498364][T31272] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1769.498371][T31272] ? copy_mount_options+0x5f/0x3c0 [ 1769.498381][T31272] ? copy_mount_options+0x308/0x3c0 [ 1769.498391][T31272] ksys_mount+0xcc/0x100 [ 1769.498401][T31272] __x64_sys_mount+0xbf/0xd0 [ 1769.498413][T31272] do_syscall_64+0xfe/0x140 [ 1769.498425][T31272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1769.498432][T31272] RIP: 0033:0x45c2ca [ 1769.498441][T31272] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1769.498445][T31272] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1769.498453][T31272] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1769.498457][T31272] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1769.498461][T31272] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1769.498467][T31272] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1769.498471][T31272] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:45 executing program 2 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x3, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x10, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1769.723122][T31482] FAULT_INJECTION: forcing a failure. [ 1769.723122][T31482] name failslab, interval 1, probability 0, space 0, times 0 [ 1769.740013][T31482] CPU: 0 PID: 31482 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1769.747920][T31482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1769.757970][T31482] Call Trace: [ 1769.761257][T31482] dump_stack+0x1d8/0x2f8 [ 1769.765588][T31482] should_fail+0x555/0x770 [ 1769.770006][T31482] __should_failslab+0x11a/0x160 [ 1769.774939][T31482] ? getname_kernel+0x59/0x2f0 [ 1769.779696][T31482] should_failslab+0x9/0x20 [ 1769.784217][T31482] kmem_cache_alloc+0x56/0x2e0 [ 1769.788979][T31482] getname_kernel+0x59/0x2f0 [ 1769.793655][T31482] kern_path+0x1f/0x40 [ 1769.797728][T31482] blkdev_get_by_path+0x71/0x270 [ 1769.802656][T31482] btrfs_scan_one_device+0xbd/0x450 [ 1769.802667][T31482] ? btrfs_mount_root+0x477/0x1050 [ 1769.802679][T31482] ? trace_hardirqs_on+0x74/0x80 [ 1769.817873][T31482] btrfs_mount_root+0x4af/0x1050 [ 1769.822812][T31482] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1769.828088][T31482] ? trace_kfree+0xa0/0x110 [ 1769.832581][T31482] legacy_get_tree+0xf9/0x1a0 [ 1769.832592][T31482] ? btrfs_control_open+0x40/0x40 [ 1769.832604][T31482] vfs_get_tree+0x8f/0x380 [ 1769.846690][T31482] vfs_kern_mount+0xc2/0x160 [ 1769.851277][T31482] btrfs_mount+0x34f/0x18f0 [ 1769.855778][T31482] ? legacy_parse_param+0x37b/0x880 [ 1769.860964][T31482] ? cap_capable+0x250/0x290 [ 1769.860980][T31482] legacy_get_tree+0xf9/0x1a0 [ 1769.860994][T31482] ? btrfs_resize_thread_pool+0x290/0x290 [ 1769.875934][T31482] vfs_get_tree+0x8f/0x380 [ 1769.880350][T31482] do_mount+0x169d/0x2490 [ 1769.884672][T31482] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1769.890206][T31482] ? copy_mount_options+0x5f/0x3c0 [ 1769.890220][T31482] ? copy_mount_options+0x308/0x3c0 [ 1769.890232][T31482] ksys_mount+0xcc/0x100 [ 1769.904721][T31482] __x64_sys_mount+0xbf/0xd0 [ 1769.909396][T31482] do_syscall_64+0xfe/0x140 [ 1769.913910][T31482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1769.919793][T31482] RIP: 0033:0x45c2ca [ 1769.923674][T31482] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1769.923680][T31482] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1769.923689][T31482] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1769.923694][T31482] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 20:37:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x4, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x4c01, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x5, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x5421, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1769.923700][T31482] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1769.923704][T31482] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1769.923714][T31482] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:45 executing program 2 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x6, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x5450, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00z\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x5451, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x7, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1770.192346][T31669] FAULT_INJECTION: forcing a failure. [ 1770.192346][T31669] name failslab, interval 1, probability 0, space 0, times 0 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x5452, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1770.257753][T31669] CPU: 1 PID: 31669 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1770.265672][T31669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1770.265677][T31669] Call Trace: [ 1770.265693][T31669] dump_stack+0x1d8/0x2f8 [ 1770.265708][T31669] should_fail+0x555/0x770 [ 1770.265722][T31669] __should_failslab+0x11a/0x160 [ 1770.265736][T31669] should_failslab+0x9/0x20 [ 1770.288252][T31669] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1770.288262][T31669] ? __kmalloc_node+0x3c/0x60 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x5460, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1770.288275][T31669] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 1770.313567][T31669] __kmalloc_node+0x3c/0x60 [ 1770.318073][T31669] kvmalloc_node+0xcc/0x130 [ 1770.322574][T31669] btrfs_mount_root+0xe3/0x1050 [ 1770.327426][T31669] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1770.332709][T31669] ? trace_kfree+0xa0/0x110 [ 1770.337215][T31669] legacy_get_tree+0xf9/0x1a0 [ 1770.341893][T31669] ? btrfs_control_open+0x40/0x40 [ 1770.346914][T31669] vfs_get_tree+0x8f/0x380 [ 1770.351322][T31669] vfs_kern_mount+0xc2/0x160 [ 1770.355892][T31669] btrfs_mount+0x34f/0x18f0 [ 1770.355911][T31669] ? legacy_parse_param+0x37b/0x880 [ 1770.355924][T31669] ? cap_capable+0x250/0x290 [ 1770.355937][T31669] legacy_get_tree+0xf9/0x1a0 [ 1770.355944][T31669] ? btrfs_resize_thread_pool+0x290/0x290 [ 1770.355953][T31669] vfs_get_tree+0x8f/0x380 [ 1770.355962][T31669] do_mount+0x169d/0x2490 [ 1770.355972][T31669] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1770.355979][T31669] ? copy_mount_options+0x5f/0x3c0 [ 1770.355988][T31669] ? copy_mount_options+0x308/0x3c0 [ 1770.355998][T31669] ksys_mount+0xcc/0x100 [ 1770.356007][T31669] __x64_sys_mount+0xbf/0xd0 [ 1770.356019][T31669] do_syscall_64+0xfe/0x140 [ 1770.356031][T31669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1770.356038][T31669] RIP: 0033:0x45c2ca [ 1770.356046][T31669] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1770.356051][T31669] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1770.356059][T31669] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1770.356064][T31669] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1770.356068][T31669] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1770.356072][T31669] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1770.356077][T31669] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:45 executing program 2 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x6364, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:45 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x8, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x8912, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x9, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1770.637566][T31775] FAULT_INJECTION: forcing a failure. [ 1770.637566][T31775] name failslab, interval 1, probability 0, space 0, times 0 [ 1770.650887][T31775] CPU: 0 PID: 31775 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1770.658784][T31775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1770.658789][T31775] Call Trace: [ 1770.658806][T31775] dump_stack+0x1d8/0x2f8 [ 1770.658822][T31775] should_fail+0x555/0x770 [ 1770.680873][T31775] __should_failslab+0x11a/0x160 [ 1770.685814][T31775] should_failslab+0x9/0x20 [ 1770.690331][T31775] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1770.695613][T31775] ? alloc_fs_context+0x65/0x5f0 [ 1770.700549][T31775] alloc_fs_context+0x65/0x5f0 [ 1770.705325][T31775] ? trace_kmalloc+0xbb/0x130 [ 1770.705337][T31775] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 1770.705349][T31775] fs_context_for_mount+0x24/0x30 [ 1770.705359][T31775] vfs_kern_mount+0x2c/0x160 [ 1770.705370][T31775] btrfs_mount+0x34f/0x18f0 [ 1770.705385][T31775] ? legacy_parse_param+0x37b/0x880 [ 1770.720672][T31775] ? cap_capable+0x250/0x290 [ 1770.720688][T31775] legacy_get_tree+0xf9/0x1a0 [ 1770.720699][T31775] ? btrfs_resize_thread_pool+0x290/0x290 [ 1770.720711][T31775] vfs_get_tree+0x8f/0x380 [ 1770.744380][T31775] do_mount+0x169d/0x2490 [ 1770.744393][T31775] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1770.744404][T31775] ? copy_mount_options+0x5f/0x3c0 [ 1770.769708][T31775] ? copy_mount_options+0x308/0x3c0 [ 1770.774904][T31775] ksys_mount+0xcc/0x100 [ 1770.774917][T31775] __x64_sys_mount+0xbf/0xd0 [ 1770.774931][T31775] do_syscall_64+0xfe/0x140 [ 1770.774943][T31775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1770.774955][T31775] RIP: 0033:0x45c2ca [ 1770.788340][T31775] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1770.788347][T31775] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1770.788356][T31775] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca 20:37:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xa, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1770.788361][T31775] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1770.788370][T31775] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1770.850837][T31775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1770.858791][T31775] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:46 executing program 2 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xb, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x8933, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xc, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x400454ca, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) [ 1771.112691][T31924] FAULT_INJECTION: forcing a failure. [ 1771.112691][T31924] name failslab, interval 1, probability 0, space 0, times 0 [ 1771.137043][T31924] CPU: 0 PID: 31924 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1771.144989][T31924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1771.155050][T31924] Call Trace: [ 1771.158425][T31924] dump_stack+0x1d8/0x2f8 [ 1771.158441][T31924] should_fail+0x555/0x770 [ 1771.158457][T31924] __should_failslab+0x11a/0x160 [ 1771.158471][T31924] ? getname_kernel+0x59/0x2f0 [ 1771.176957][T31924] should_failslab+0x9/0x20 [ 1771.181465][T31924] kmem_cache_alloc+0x56/0x2e0 [ 1771.186233][T31924] getname_kernel+0x59/0x2f0 [ 1771.190822][T31924] kern_path+0x1f/0x40 [ 1771.194889][T31924] blkdev_get_by_path+0x71/0x270 [ 1771.199918][T31924] btrfs_scan_one_device+0xbd/0x450 [ 1771.205131][T31924] ? btrfs_mount_root+0x477/0x1050 [ 1771.210235][T31924] ? trace_hardirqs_on+0x74/0x80 [ 1771.215171][T31924] btrfs_mount_root+0x4af/0x1050 [ 1771.220111][T31924] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1771.225396][T31924] ? trace_kfree+0xa0/0x110 [ 1771.225410][T31924] legacy_get_tree+0xf9/0x1a0 [ 1771.225421][T31924] ? btrfs_control_open+0x40/0x40 [ 1771.225432][T31924] vfs_get_tree+0x8f/0x380 [ 1771.225449][T31924] vfs_kern_mount+0xc2/0x160 [ 1771.234610][T31924] btrfs_mount+0x34f/0x18f0 [ 1771.234629][T31924] ? legacy_parse_param+0x37b/0x880 [ 1771.234642][T31924] ? cap_capable+0x250/0x290 [ 1771.234657][T31924] legacy_get_tree+0xf9/0x1a0 [ 1771.267516][T31924] ? btrfs_resize_thread_pool+0x290/0x290 [ 1771.273238][T31924] vfs_get_tree+0x8f/0x380 [ 1771.277660][T31924] do_mount+0x169d/0x2490 [ 1771.282018][T31924] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1771.287567][T31924] ? copy_mount_options+0x5f/0x3c0 [ 1771.292682][T31924] ? copy_mount_options+0x308/0x3c0 [ 1771.297884][T31924] ksys_mount+0xcc/0x100 [ 1771.302125][T31924] __x64_sys_mount+0xbf/0xd0 [ 1771.306716][T31924] do_syscall_64+0xfe/0x140 [ 1771.306729][T31924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1771.306737][T31924] RIP: 0033:0x45c2ca [ 1771.306749][T31924] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1771.340580][T31924] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1771.348988][T31924] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca 20:37:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xd, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1771.356960][T31924] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1771.364932][T31924] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1771.373000][T31924] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1771.381100][T31924] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:46 executing program 2 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xe, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40049409, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:46 executing program 1 (fault-call:3 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x4020940d, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1771.481092][T32124] FAULT_INJECTION: forcing a failure. [ 1771.481092][T32124] name failslab, interval 1, probability 0, space 0, times 0 [ 1771.516925][T32124] CPU: 1 PID: 32124 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 20:37:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x10, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1771.524874][T32124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1771.534928][T32124] Call Trace: [ 1771.538218][T32124] dump_stack+0x1d8/0x2f8 [ 1771.542553][T32124] should_fail+0x555/0x770 [ 1771.546972][T32124] __should_failslab+0x11a/0x160 [ 1771.551946][T32124] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1771.557860][T32124] should_failslab+0x9/0x20 [ 1771.562389][T32124] __kmalloc+0x7a/0x340 [ 1771.566544][T32124] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1771.572261][T32124] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1771.578022][T32124] tomoyo_path_number_perm+0x166/0x640 [ 1771.583501][T32124] ? smack_file_ioctl+0x226/0x2e0 [ 1771.588528][T32124] ? __fget+0x471/0x510 [ 1771.588543][T32124] tomoyo_file_ioctl+0x23/0x30 [ 1771.597421][T32124] security_file_ioctl+0x6d/0xd0 [ 1771.597434][T32124] __x64_sys_ioctl+0xa3/0x120 [ 1771.597447][T32124] do_syscall_64+0xfe/0x140 [ 1771.597461][T32124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1771.597469][T32124] RIP: 0033:0x459879 [ 1771.597479][T32124] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1771.597484][T32124] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1771.597493][T32124] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1771.597499][T32124] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1771.597504][T32124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1771.597509][T32124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 20:37:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1771.597519][T32124] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1771.629248][T32154] FAULT_INJECTION: forcing a failure. [ 1771.629248][T32154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1771.702543][T32154] CPU: 1 PID: 32154 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1771.710423][T32154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1771.720477][T32154] Call Trace: [ 1771.720493][T32154] dump_stack+0x1d8/0x2f8 20:37:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x11, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1771.720512][T32154] should_fail+0x555/0x770 [ 1771.720526][T32154] should_fail_alloc_page+0x55/0x60 [ 1771.720539][T32154] prepare_alloc_pages+0x283/0x470 [ 1771.727848][T32124] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1771.728128][T32154] __alloc_pages_nodemask+0xb2/0x5d0 [ 1771.754805][T32154] ? debug_smp_processor_id+0x1c/0x20 [ 1771.760182][T32154] kmem_getpages+0x56/0xa20 [ 1771.764762][T32154] ? trace_lock_release+0x135/0x1a0 [ 1771.764777][T32154] cache_grow_begin+0x7e/0x2c0 [ 1771.764788][T32154] cache_alloc_refill+0x311/0x3f0 [ 1771.764798][T32154] ? check_preemption_disabled+0xb7/0x2a0 [ 1771.764809][T32154] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1771.764819][T32154] ? btrfs_mount_root+0x12c/0x1050 [ 1771.764832][T32154] btrfs_mount_root+0x12c/0x1050 [ 1771.764848][T32154] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1771.779809][T32154] ? trace_kfree+0xa0/0x110 [ 1771.779824][T32154] legacy_get_tree+0xf9/0x1a0 [ 1771.779837][T32154] ? btrfs_control_open+0x40/0x40 [ 1771.810645][T32154] vfs_get_tree+0x8f/0x380 [ 1771.810661][T32154] vfs_kern_mount+0xc2/0x160 [ 1771.824726][T32154] btrfs_mount+0x34f/0x18f0 [ 1771.824747][T32154] ? legacy_parse_param+0x37b/0x880 [ 1771.824760][T32154] ? cap_capable+0x250/0x290 [ 1771.824774][T32154] legacy_get_tree+0xf9/0x1a0 [ 1771.824782][T32154] ? btrfs_resize_thread_pool+0x290/0x290 [ 1771.824793][T32154] vfs_get_tree+0x8f/0x380 [ 1771.824805][T32154] do_mount+0x169d/0x2490 [ 1771.824816][T32154] ? copy_mount_options+0x25e/0x3c0 [ 1771.853974][T32154] ? copy_mount_options+0x308/0x3c0 [ 1771.853986][T32154] ksys_mount+0xcc/0x100 [ 1771.877386][T32154] __x64_sys_mount+0xbf/0xd0 [ 1771.881979][T32154] do_syscall_64+0xfe/0x140 [ 1771.882002][T32154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1771.892359][T32154] RIP: 0033:0x45c2ca [ 1771.896247][T32154] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1771.915841][T32154] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1771.915851][T32154] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1771.915856][T32154] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1771.915861][T32154] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1771.915865][T32154] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1771.915869][T32154] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:47 executing program 2 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:47 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:47 executing program 1 (fault-call:3 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40bc5311, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x12, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1772.080241][T32564] FAULT_INJECTION: forcing a failure. [ 1772.080241][T32564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1772.093490][T32564] CPU: 1 PID: 32564 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1772.101367][T32564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.101372][T32564] Call Trace: [ 1772.101389][T32564] dump_stack+0x1d8/0x2f8 [ 1772.101403][T32564] should_fail+0x555/0x770 [ 1772.101418][T32564] should_fail_alloc_page+0x55/0x60 20:37:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x80045300, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1772.114762][T32564] prepare_alloc_pages+0x283/0x470 [ 1772.114777][T32564] __alloc_pages_nodemask+0xb2/0x5d0 [ 1772.114788][T32564] ? stack_trace_save+0x150/0x150 [ 1772.114804][T32564] kmem_getpages+0x56/0xa20 [ 1772.114815][T32564] cache_grow_begin+0x7e/0x2c0 [ 1772.114830][T32564] cache_alloc_refill+0x311/0x3f0 [ 1772.125904][T32567] FAULT_INJECTION: forcing a failure. [ 1772.125904][T32567] name failslab, interval 1, probability 0, space 0, times 0 [ 1772.128821][T32564] ? check_preemption_disabled+0xb7/0x2a0 [ 1772.128837][T32564] __kmalloc+0x318/0x340 [ 1772.128847][T32564] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1772.128863][T32564] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1772.171128][T32564] tomoyo_path_number_perm+0x166/0x640 [ 1772.192604][T32564] ? smack_file_ioctl+0x226/0x2e0 [ 1772.192613][T32564] ? __fget+0x471/0x510 [ 1772.192628][T32564] tomoyo_file_ioctl+0x23/0x30 [ 1772.212654][T32564] security_file_ioctl+0x6d/0xd0 [ 1772.217600][T32564] __x64_sys_ioctl+0xa3/0x120 [ 1772.222280][T32564] do_syscall_64+0xfe/0x140 20:37:47 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1772.226779][T32564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1772.232664][T32564] RIP: 0033:0x459879 [ 1772.236556][T32564] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1772.256150][T32564] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1772.256160][T32564] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1772.256166][T32564] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 20:37:47 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1772.256171][T32564] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1772.256177][T32564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1772.256182][T32564] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1772.310000][T32567] CPU: 0 PID: 32567 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1772.317912][T32567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.327977][T32567] Call Trace: [ 1772.331267][T32567] dump_stack+0x1d8/0x2f8 [ 1772.335597][T32567] should_fail+0x555/0x770 [ 1772.336040][T32664] FAULT_INJECTION: forcing a failure. [ 1772.336040][T32664] name failslab, interval 1, probability 0, space 0, times 0 [ 1772.340008][T32567] __should_failslab+0x11a/0x160 [ 1772.340022][T32567] should_failslab+0x9/0x20 [ 1772.362011][T32567] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1772.367733][T32567] ? __kmalloc_node+0x3c/0x60 [ 1772.372413][T32567] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 1772.377870][T32567] __kmalloc_node+0x3c/0x60 [ 1772.382374][T32567] kvmalloc_node+0xcc/0x130 [ 1772.386878][T32567] btrfs_mount_root+0xe3/0x1050 [ 1772.391730][T32567] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1772.397050][T32567] ? trace_kfree+0xa0/0x110 [ 1772.401589][T32567] legacy_get_tree+0xf9/0x1a0 [ 1772.406257][T32567] ? btrfs_control_open+0x40/0x40 [ 1772.411272][T32567] vfs_get_tree+0x8f/0x380 [ 1772.415680][T32567] vfs_kern_mount+0xc2/0x160 [ 1772.420263][T32567] btrfs_mount+0x34f/0x18f0 [ 1772.424765][T32567] ? legacy_parse_param+0x37b/0x880 [ 1772.429961][T32567] ? cap_capable+0x250/0x290 [ 1772.434540][T32567] legacy_get_tree+0xf9/0x1a0 [ 1772.439202][T32567] ? btrfs_resize_thread_pool+0x290/0x290 [ 1772.444912][T32567] vfs_get_tree+0x8f/0x380 [ 1772.449317][T32567] do_mount+0x169d/0x2490 [ 1772.453631][T32567] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1772.459156][T32567] ? copy_mount_options+0x5f/0x3c0 [ 1772.464251][T32567] ? copy_mount_options+0x308/0x3c0 [ 1772.469436][T32567] ksys_mount+0xcc/0x100 [ 1772.473665][T32567] __x64_sys_mount+0xbf/0xd0 [ 1772.478239][T32567] do_syscall_64+0xfe/0x140 [ 1772.482725][T32567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1772.488596][T32567] RIP: 0033:0x45c2ca [ 1772.492494][T32567] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1772.512077][T32567] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1772.520469][T32567] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca 20:37:47 executing program 1 (fault-call:3 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x25, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:47 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1772.528425][T32567] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1772.536379][T32567] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1772.544332][T32567] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1772.552309][T32567] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1772.560281][T32664] CPU: 1 PID: 32664 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1772.568183][T32664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.578226][T32664] Call Trace: [ 1772.578242][T32664] dump_stack+0x1d8/0x2f8 [ 1772.578256][T32664] should_fail+0x555/0x770 [ 1772.578269][T32664] __should_failslab+0x11a/0x160 [ 1772.578279][T32664] ? tomoyo_encode2+0x273/0x5a0 [ 1772.578289][T32664] should_failslab+0x9/0x20 [ 1772.578298][T32664] __kmalloc+0x7a/0x340 [ 1772.578310][T32664] tomoyo_encode2+0x273/0x5a0 [ 1772.595219][T32664] tomoyo_realpath_from_path+0x769/0x7c0 [ 1772.595233][T32664] tomoyo_path_number_perm+0x166/0x640 [ 1772.595260][T32664] ? smack_file_ioctl+0x226/0x2e0 [ 1772.604568][T32664] ? __fget+0x471/0x510 [ 1772.604581][T32664] tomoyo_file_ioctl+0x23/0x30 [ 1772.604591][T32664] security_file_ioctl+0x6d/0xd0 [ 1772.604603][T32664] __x64_sys_ioctl+0xa3/0x120 [ 1772.604615][T32664] do_syscall_64+0xfe/0x140 [ 1772.604630][T32664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1772.613405][T32664] RIP: 0033:0x459879 [ 1772.613415][T32664] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1772.613424][T32664] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1772.624469][T32664] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1772.624475][T32664] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1772.624480][T32664] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1772.624485][T32664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1772.624493][T32664] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1772.655748][T32664] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:48 executing program 2 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x48, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:48 executing program 1 (fault-call:3 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x80045301, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x800454d2, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1772.889532][T32697] FAULT_INJECTION: forcing a failure. [ 1772.889532][T32697] name failslab, interval 1, probability 0, space 0, times 0 [ 1772.913072][T32697] CPU: 1 PID: 32697 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1772.921001][T32697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.921006][T32697] Call Trace: [ 1772.921023][T32697] dump_stack+0x1d8/0x2f8 [ 1772.921040][T32697] should_fail+0x555/0x770 [ 1772.934371][T32697] __should_failslab+0x11a/0x160 [ 1772.934385][T32697] ? batadv_tt_local_add+0x35a/0x29d0 [ 1772.934399][T32697] should_failslab+0x9/0x20 [ 1772.934413][T32697] kmem_cache_alloc+0x56/0x2e0 [ 1772.953426][T32697] batadv_tt_local_add+0x35a/0x29d0 [ 1772.953442][T32697] ? refcount_dec_and_test_checked+0x1a/0x20 [ 1772.953457][T32697] ? batadv_tt_local_remove+0x736/0x930 [ 1772.959884][T32746] FAULT_INJECTION: forcing a failure. [ 1772.959884][T32746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1772.962688][T32697] batadv_interface_set_mac_addr+0x2f3/0x5b0 [ 1772.999130][T32697] dev_set_mac_address+0x278/0x480 [ 1773.004230][T32697] dev_ifsioc+0x5a0/0x9f0 [ 1773.008555][T32697] dev_ioctl+0x52e/0xce0 [ 1773.012780][T32697] sock_do_ioctl+0x16b/0x260 [ 1773.017439][T32697] sock_ioctl+0x461/0x680 [ 1773.021748][T32697] ? sock_poll+0x310/0x310 [ 1773.026144][T32697] do_vfs_ioctl+0x744/0x1730 [ 1773.030798][T32697] ? __fget+0x471/0x510 [ 1773.034939][T32697] ? tomoyo_file_ioctl+0x23/0x30 [ 1773.039906][T32697] ? security_file_ioctl+0xa1/0xd0 [ 1773.045024][T32697] __x64_sys_ioctl+0xe3/0x120 [ 1773.049857][T32697] do_syscall_64+0xfe/0x140 [ 1773.054341][T32697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1773.060211][T32697] RIP: 0033:0x459879 [ 1773.064104][T32697] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1773.083686][T32697] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.092074][T32697] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1773.100023][T32697] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1773.108060][T32697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1773.116014][T32697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1773.124051][T32697] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1773.132020][T32746] CPU: 0 PID: 32746 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1773.139919][T32746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1773.149973][T32746] Call Trace: [ 1773.153263][T32746] dump_stack+0x1d8/0x2f8 [ 1773.157594][T32746] should_fail+0x555/0x770 [ 1773.162008][T32746] should_fail_alloc_page+0x55/0x60 [ 1773.167196][T32746] prepare_alloc_pages+0x283/0x470 [ 1773.172304][T32746] __alloc_pages_nodemask+0xb2/0x5d0 [ 1773.177580][T32746] ? debug_smp_processor_id+0x1c/0x20 [ 1773.182943][T32746] kmem_getpages+0x56/0xa20 [ 1773.187434][T32746] ? trace_lock_release+0x135/0x1a0 [ 1773.187446][T32746] cache_grow_begin+0x7e/0x2c0 [ 1773.187457][T32746] cache_alloc_refill+0x311/0x3f0 [ 1773.187471][T32746] ? check_preemption_disabled+0xb7/0x2a0 [ 1773.197395][T32746] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1773.197406][T32746] ? btrfs_mount_root+0x12c/0x1050 [ 1773.197419][T32746] btrfs_mount_root+0x12c/0x1050 [ 1773.208119][T32746] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1773.208128][T32746] ? trace_kfree+0xa0/0x110 [ 1773.208141][T32746] legacy_get_tree+0xf9/0x1a0 [ 1773.218578][T32746] ? btrfs_control_open+0x40/0x40 [ 1773.218589][T32746] vfs_get_tree+0x8f/0x380 [ 1773.218601][T32746] vfs_kern_mount+0xc2/0x160 [ 1773.251935][T32746] btrfs_mount+0x34f/0x18f0 [ 1773.256454][T32746] ? legacy_parse_param+0x37b/0x880 [ 1773.261649][T32746] ? cap_capable+0x250/0x290 [ 1773.266245][T32746] legacy_get_tree+0xf9/0x1a0 [ 1773.266261][T32746] ? btrfs_resize_thread_pool+0x290/0x290 [ 1773.276613][T32746] vfs_get_tree+0x8f/0x380 [ 1773.276626][T32746] do_mount+0x169d/0x2490 [ 1773.276637][T32746] ? kmem_cache_alloc_trace+0x23a/0x2f0 20:37:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x4c, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x5c, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1773.276648][T32746] ? copy_mount_options+0x5f/0x3c0 [ 1773.296103][T32746] ? copy_mount_options+0x308/0x3c0 [ 1773.301301][T32746] ksys_mount+0xcc/0x100 [ 1773.305541][T32746] __x64_sys_mount+0xbf/0xd0 [ 1773.310217][T32746] do_syscall_64+0xfe/0x140 [ 1773.314706][T32746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1773.314716][T32746] RIP: 0033:0x45c2ca [ 1773.314725][T32746] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1773.314730][T32746] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1773.324596][T32746] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1773.324602][T32746] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1773.324607][T32746] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1773.324613][T32746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 20:37:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x68, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1773.324618][T32746] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:48 executing program 2 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:48 executing program 1 (fault-call:3 fault-nth:4): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x80086301, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x6c, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0045878, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1773.547299][ T367] FAULT_INJECTION: forcing a failure. [ 1773.547299][ T367] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.580355][ T377] FAULT_INJECTION: forcing a failure. [ 1773.580355][ T377] name failslab, interval 1, probability 0, space 0, times 0 20:37:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x74, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1773.605435][ T367] CPU: 1 PID: 367 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1773.613192][ T367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1773.623246][ T367] Call Trace: [ 1773.626539][ T367] dump_stack+0x1d8/0x2f8 [ 1773.630881][ T367] should_fail+0x555/0x770 [ 1773.635310][ T367] __should_failslab+0x11a/0x160 [ 1773.640257][ T367] ? batadv_tt_local_event+0x59/0x710 [ 1773.645640][ T367] should_failslab+0x9/0x20 [ 1773.650145][ T367] kmem_cache_alloc+0x56/0x2e0 20:37:49 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x7a, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1773.654907][ T367] ? trace_lock_release+0x135/0x1a0 [ 1773.660102][ T367] batadv_tt_local_event+0x59/0x710 [ 1773.665295][ T367] ? batadv_tt_local_add+0x231c/0x29d0 [ 1773.670775][ T367] ? trace_hardirqs_on+0x74/0x80 [ 1773.675706][ T367] ? batadv_tt_local_add+0x231c/0x29d0 [ 1773.681146][ T367] batadv_tt_local_add+0x340/0x29d0 [ 1773.686374][ T367] batadv_interface_set_mac_addr+0x2f3/0x5b0 [ 1773.686390][ T367] dev_set_mac_address+0x278/0x480 [ 1773.686404][ T367] dev_ifsioc+0x5a0/0x9f0 [ 1773.686417][ T367] dev_ioctl+0x52e/0xce0 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1773.706010][ T367] sock_do_ioctl+0x16b/0x260 [ 1773.710599][ T367] sock_ioctl+0x461/0x680 [ 1773.710611][ T367] ? sock_poll+0x310/0x310 [ 1773.710624][ T367] do_vfs_ioctl+0x744/0x1730 [ 1773.710635][ T367] ? __fget+0x471/0x510 [ 1773.728057][ T367] ? tomoyo_file_ioctl+0x23/0x30 [ 1773.732981][ T367] ? security_file_ioctl+0xa1/0xd0 [ 1773.732995][ T367] __x64_sys_ioctl+0xe3/0x120 [ 1773.733009][ T367] do_syscall_64+0xfe/0x140 [ 1773.733022][ T367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1773.753121][ T367] RIP: 0033:0x459879 [ 1773.757013][ T367] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1773.776606][ T367] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.776615][ T367] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1773.776621][ T367] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1773.776626][ T367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1773.776632][ T367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1773.776637][ T367] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1773.805549][ T377] CPU: 1 PID: 377 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1773.832684][ T377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1773.842737][ T377] Call Trace: [ 1773.846019][ T377] dump_stack+0x1d8/0x2f8 [ 1773.846035][ T377] should_fail+0x555/0x770 [ 1773.846049][ T377] __should_failslab+0x11a/0x160 [ 1773.846061][ T377] should_failslab+0x9/0x20 [ 1773.846071][ T377] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1773.846081][ T377] ? btrfs_mount_root+0x1b2/0x1050 [ 1773.846094][ T377] btrfs_mount_root+0x1b2/0x1050 [ 1773.854814][ T377] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1773.854824][ T377] ? trace_kfree+0xa0/0x110 [ 1773.854836][ T377] legacy_get_tree+0xf9/0x1a0 [ 1773.854845][ T377] ? btrfs_control_open+0x40/0x40 [ 1773.854856][ T377] vfs_get_tree+0x8f/0x380 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1773.854869][ T377] vfs_kern_mount+0xc2/0x160 [ 1773.854879][ T377] btrfs_mount+0x34f/0x18f0 [ 1773.854894][ T377] ? legacy_parse_param+0x37b/0x880 [ 1773.854908][ T377] ? cap_capable+0x250/0x290 [ 1773.854920][ T377] legacy_get_tree+0xf9/0x1a0 [ 1773.854928][ T377] ? btrfs_resize_thread_pool+0x290/0x290 [ 1773.854937][ T377] vfs_get_tree+0x8f/0x380 [ 1773.854951][ T377] do_mount+0x169d/0x2490 [ 1773.869615][ T377] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1773.869626][ T377] ? copy_mount_options+0x5f/0x3c0 [ 1773.869641][ T377] ? copy_mount_options+0x308/0x3c0 [ 1773.879660][ T377] ksys_mount+0xcc/0x100 [ 1773.879673][ T377] __x64_sys_mount+0xbf/0xd0 [ 1773.879685][ T377] do_syscall_64+0xfe/0x140 [ 1773.879700][ T377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1773.976483][ T377] RIP: 0033:0x45c2ca [ 1773.980368][ T377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1773.999954][ T377] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1773.999962][ T377] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1773.999966][ T377] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1773.999971][ T377] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1773.999975][ T377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1773.999979][ T377] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:49 executing program 2 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:49 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x300, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0045878, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:49 executing program 1 (fault-call:3 fault-nth:5): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:49 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x500, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0105303, &(0x7f0000000040)={{0xffffffffffffff80}}) [ 1774.151196][ T505] FAULT_INJECTION: forcing a failure. [ 1774.151196][ T505] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.187914][ T534] FAULT_INJECTION: forcing a failure. [ 1774.187914][ T534] name failslab, interval 1, probability 0, space 0, times 0 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1774.204698][ T505] CPU: 0 PID: 505 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1774.212439][ T505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1774.222570][ T505] Call Trace: [ 1774.222587][ T505] dump_stack+0x1d8/0x2f8 [ 1774.222601][ T505] should_fail+0x555/0x770 [ 1774.222615][ T505] __should_failslab+0x11a/0x160 [ 1774.239623][ T505] ? batadv_tt_local_event+0x59/0x710 [ 1774.239636][ T505] should_failslab+0x9/0x20 [ 1774.239650][ T505] kmem_cache_alloc+0x56/0x2e0 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1774.254243][ T505] batadv_tt_local_event+0x59/0x710 [ 1774.254254][ T505] ? rcu_lock_release+0x26/0x30 [ 1774.264281][ T505] ? batadv_tt_hash_find+0x46c/0x500 [ 1774.269558][ T505] batadv_tt_local_remove+0x158/0x930 [ 1774.274924][ T505] batadv_interface_set_mac_addr+0x2d3/0x5b0 [ 1774.281202][ T505] dev_set_mac_address+0x278/0x480 [ 1774.286316][ T505] dev_ifsioc+0x5a0/0x9f0 [ 1774.290644][ T505] dev_ioctl+0x52e/0xce0 [ 1774.294892][ T505] sock_do_ioctl+0x16b/0x260 [ 1774.299487][ T505] sock_ioctl+0x461/0x680 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1774.304072][ T505] ? sock_poll+0x310/0x310 [ 1774.308490][ T505] do_vfs_ioctl+0x744/0x1730 [ 1774.313073][ T505] ? __fget+0x471/0x510 [ 1774.317219][ T505] ? tomoyo_file_ioctl+0x23/0x30 [ 1774.322136][ T505] ? security_file_ioctl+0xa1/0xd0 [ 1774.327245][ T505] __x64_sys_ioctl+0xe3/0x120 [ 1774.331916][ T505] do_syscall_64+0xfe/0x140 [ 1774.336410][ T505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1774.342291][ T505] RIP: 0033:0x459879 [ 1774.346259][ T505] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1774.346265][ T505] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1774.346275][ T505] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1774.346281][ T505] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1774.346287][ T505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:37:49 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1774.346292][ T505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1774.346301][ T505] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1774.434035][ T534] CPU: 1 PID: 534 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1774.441783][ T534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1774.451832][ T534] Call Trace: [ 1774.455122][ T534] dump_stack+0x1d8/0x2f8 [ 1774.459448][ T534] should_fail+0x555/0x770 [ 1774.463865][ T534] __should_failslab+0x11a/0x160 [ 1774.468801][ T534] should_failslab+0x9/0x20 [ 1774.473309][ T534] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1774.478592][ T534] ? btrfs_mount_root+0x1b2/0x1050 [ 1774.483794][ T534] btrfs_mount_root+0x1b2/0x1050 [ 1774.488757][ T534] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1774.494039][ T534] ? trace_kfree+0xa0/0x110 [ 1774.498538][ T534] legacy_get_tree+0xf9/0x1a0 [ 1774.503202][ T534] ? btrfs_control_open+0x40/0x40 [ 1774.508199][ T534] vfs_get_tree+0x8f/0x380 [ 1774.512587][ T534] vfs_kern_mount+0xc2/0x160 [ 1774.517151][ T534] btrfs_mount+0x34f/0x18f0 [ 1774.521632][ T534] ? legacy_parse_param+0x37b/0x880 [ 1774.526808][ T534] ? cap_capable+0x250/0x290 [ 1774.531610][ T534] legacy_get_tree+0xf9/0x1a0 [ 1774.536265][ T534] ? btrfs_resize_thread_pool+0x290/0x290 [ 1774.541965][ T534] vfs_get_tree+0x8f/0x380 [ 1774.546361][ T534] do_mount+0x169d/0x2490 [ 1774.550662][ T534] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1774.556176][ T534] ? copy_mount_options+0x5f/0x3c0 [ 1774.561264][ T534] ? copy_mount_options+0x308/0x3c0 [ 1774.566433][ T534] ksys_mount+0xcc/0x100 [ 1774.570647][ T534] __x64_sys_mount+0xbf/0xd0 [ 1774.575455][ T534] do_syscall_64+0xfe/0x140 [ 1774.580034][ T534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1774.585914][ T534] RIP: 0033:0x45c2ca [ 1774.589782][ T534] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1774.609356][ T534] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1774.617751][ T534] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1774.625694][ T534] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1774.633738][ T534] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1774.641684][ T534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1774.649626][ T534] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:50 executing program 2 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x600, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0189436, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:50 executing program 1 (fault-call:3 fault-nth:6): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc020660b, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x700, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1774.765015][ T638] FAULT_INJECTION: forcing a failure. [ 1774.765015][ T638] name failslab, interval 1, probability 0, space 0, times 0 [ 1774.798193][ T638] CPU: 0 PID: 638 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1774.806450][ T638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1774.816496][ T638] Call Trace: [ 1774.819787][ T638] dump_stack+0x1d8/0x2f8 [ 1774.824130][ T638] should_fail+0x555/0x770 [ 1774.828639][ T638] __should_failslab+0x11a/0x160 [ 1774.833575][ T638] ? batadv_tt_local_event+0x59/0x710 [ 1774.838959][ T638] should_failslab+0x9/0x20 [ 1774.843461][ T638] kmem_cache_alloc+0x56/0x2e0 [ 1774.848219][ T638] batadv_tt_local_event+0x59/0x710 [ 1774.853499][ T638] ? rcu_lock_release+0x26/0x30 [ 1774.858532][ T638] ? batadv_tt_hash_find+0x46c/0x500 20:37:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x900, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1774.863819][ T638] batadv_tt_local_remove+0x158/0x930 [ 1774.869177][ T638] batadv_interface_set_mac_addr+0x2d3/0x5b0 [ 1774.869193][ T638] dev_set_mac_address+0x278/0x480 [ 1774.869208][ T638] dev_ifsioc+0x5a0/0x9f0 [ 1774.869218][ T638] dev_ioctl+0x52e/0xce0 [ 1774.869231][ T638] sock_do_ioctl+0x16b/0x260 [ 1774.893421][ T638] sock_ioctl+0x461/0x680 [ 1774.897770][ T638] ? sock_poll+0x310/0x310 [ 1774.902182][ T638] do_vfs_ioctl+0x744/0x1730 [ 1774.906765][ T638] ? __fget+0x471/0x510 20:37:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1774.910921][ T638] ? tomoyo_file_ioctl+0x23/0x30 [ 1774.910933][ T638] ? security_file_ioctl+0xa1/0xd0 [ 1774.910946][ T638] __x64_sys_ioctl+0xe3/0x120 [ 1774.910960][ T638] do_syscall_64+0xfe/0x140 [ 1774.930467][ T638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1774.936351][ T638] RIP: 0033:0x459879 [ 1774.940239][ T638] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:37:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xa00, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1774.959830][ T638] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1774.959840][ T638] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1774.959846][ T638] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1774.959852][ T638] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1774.959858][ T638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1774.959863][ T638] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1775.018866][ T670] FAULT_INJECTION: forcing a failure. [ 1775.018866][ T670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1775.032163][ T670] CPU: 1 PID: 670 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1775.032170][ T670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1775.032173][ T670] Call Trace: [ 1775.032191][ T670] dump_stack+0x1d8/0x2f8 [ 1775.032212][ T670] should_fail+0x555/0x770 [ 1775.032228][ T670] should_fail_alloc_page+0x55/0x60 [ 1775.032236][ T670] prepare_alloc_pages+0x283/0x470 [ 1775.032247][ T670] __alloc_pages_nodemask+0xb2/0x5d0 [ 1775.032254][ T670] ? debug_smp_processor_id+0x1c/0x20 [ 1775.032269][ T670] kmem_getpages+0x56/0xa20 [ 1775.032279][ T670] ? trace_lock_release+0x135/0x1a0 [ 1775.032289][ T670] cache_grow_begin+0x7e/0x2c0 [ 1775.032300][ T670] cache_alloc_refill+0x311/0x3f0 [ 1775.032308][ T670] ? check_preemption_disabled+0xb7/0x2a0 [ 1775.032320][ T670] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1775.032330][ T670] ? btrfs_mount_root+0x1b2/0x1050 [ 1775.032340][ T670] btrfs_mount_root+0x1b2/0x1050 [ 1775.032356][ T670] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1775.032364][ T670] ? trace_kfree+0xa0/0x110 [ 1775.032375][ T670] legacy_get_tree+0xf9/0x1a0 [ 1775.032387][ T670] ? btrfs_control_open+0x40/0x40 [ 1775.072901][ T670] vfs_get_tree+0x8f/0x380 [ 1775.072919][ T670] vfs_kern_mount+0xc2/0x160 [ 1775.124296][ T670] btrfs_mount+0x34f/0x18f0 [ 1775.134043][ T670] ? legacy_parse_param+0x37b/0x880 [ 1775.134056][ T670] ? cap_capable+0x250/0x290 [ 1775.166938][ T670] legacy_get_tree+0xf9/0x1a0 [ 1775.171613][ T670] ? btrfs_resize_thread_pool+0x290/0x290 [ 1775.177332][ T670] vfs_get_tree+0x8f/0x380 [ 1775.181749][ T670] do_mount+0x169d/0x2490 [ 1775.186077][ T670] ? copy_mount_options+0x25e/0x3c0 [ 1775.191284][ T670] ? copy_mount_options+0x308/0x3c0 [ 1775.196477][ T670] ksys_mount+0xcc/0x100 [ 1775.200722][ T670] __x64_sys_mount+0xbf/0xd0 [ 1775.205312][ T670] do_syscall_64+0xfe/0x140 [ 1775.209819][ T670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1775.215696][ T670] RIP: 0033:0x45c2ca [ 1775.219564][ T670] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1775.239304][ T670] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1775.247696][ T670] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1775.255653][ T670] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1775.263608][ T670] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1775.271554][ T670] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1775.279507][ T670] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 20:37:50 executing program 2 (fault-call:0 fault-nth:84): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0305302, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xb00, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x02\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:50 executing program 1 (fault-call:3 fault-nth:7): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:50 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xc00, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x03\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1775.430173][ T771] FAULT_INJECTION: forcing a failure. [ 1775.430173][ T771] name failslab, interval 1, probability 0, space 0, times 0 [ 1775.462055][ T780] FAULT_INJECTION: forcing a failure. [ 1775.462055][ T780] name failslab, interval 1, probability 0, space 0, times 0 [ 1775.498807][ T771] CPU: 1 PID: 771 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1775.506554][ T771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1775.506558][ T771] Call Trace: [ 1775.506573][ T771] dump_stack+0x1d8/0x2f8 [ 1775.506588][ T771] should_fail+0x555/0x770 [ 1775.528728][ T771] __should_failslab+0x11a/0x160 [ 1775.533672][ T771] ? batadv_tt_local_add+0x35a/0x29d0 [ 1775.539043][ T771] should_failslab+0x9/0x20 [ 1775.543544][ T771] kmem_cache_alloc+0x56/0x2e0 [ 1775.548310][ T771] batadv_tt_local_add+0x35a/0x29d0 [ 1775.553500][ T771] ? refcount_dec_and_test_checked+0x1a/0x20 [ 1775.559474][ T771] ? batadv_tt_local_remove+0x736/0x930 [ 1775.559491][ T771] batadv_interface_set_mac_addr+0x2f3/0x5b0 [ 1775.559506][ T771] dev_set_mac_address+0x278/0x480 [ 1775.559521][ T771] dev_ifsioc+0x5a0/0x9f0 [ 1775.580422][ T771] dev_ioctl+0x52e/0xce0 [ 1775.584660][ T771] sock_do_ioctl+0x16b/0x260 [ 1775.589250][ T771] sock_ioctl+0x461/0x680 [ 1775.593573][ T771] ? sock_poll+0x310/0x310 [ 1775.597992][ T771] do_vfs_ioctl+0x744/0x1730 [ 1775.602565][ T771] ? __fget+0x471/0x510 [ 1775.606721][ T771] ? tomoyo_file_ioctl+0x23/0x30 [ 1775.611660][ T771] ? security_file_ioctl+0xa1/0xd0 [ 1775.616766][ T771] __x64_sys_ioctl+0xe3/0x120 [ 1775.621446][ T771] do_syscall_64+0xfe/0x140 [ 1775.625948][ T771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1775.631841][ T771] RIP: 0033:0x459879 [ 1775.635721][ T771] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1775.635727][ T771] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1775.635736][ T771] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1775.635741][ T771] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1775.635746][ T771] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1775.635756][ T771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 20:37:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0a85320, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0xc0bc5310, &(0x7f0000000040)={{0xffffffffffffff80}}) 20:37:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x04\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1775.695660][ T771] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1775.707564][ T780] CPU: 0 PID: 780 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1775.715298][ T780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1775.725345][ T780] Call Trace: [ 1775.728744][ T780] dump_stack+0x1d8/0x2f8 [ 1775.733067][ T780] should_fail+0x555/0x770 [ 1775.733082][ T780] __should_failslab+0x11a/0x160 [ 1775.742405][ T780] ? btrfs_mount_root+0x2f4/0x1050 [ 1775.747508][ T780] should_failslab+0x9/0x20 [ 1775.752007][ T780] __kmalloc_track_caller+0x79/0x340 [ 1775.757284][ T780] kstrdup+0x34/0x70 [ 1775.757297][ T780] btrfs_mount_root+0x2f4/0x1050 [ 1775.757313][ T780] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1775.757322][ T780] ? trace_kfree+0xa0/0x110 [ 1775.757334][ T780] legacy_get_tree+0xf9/0x1a0 [ 1775.771388][ T780] ? btrfs_control_open+0x40/0x40 [ 1775.771402][ T780] vfs_get_tree+0x8f/0x380 [ 1775.789959][ T780] vfs_kern_mount+0xc2/0x160 [ 1775.794549][ T780] btrfs_mount+0x34f/0x18f0 [ 1775.799051][ T780] ? legacy_parse_param+0x37b/0x880 [ 1775.804262][ T780] ? cap_capable+0x250/0x290 [ 1775.808856][ T780] legacy_get_tree+0xf9/0x1a0 [ 1775.813530][ T780] ? btrfs_resize_thread_pool+0x290/0x290 [ 1775.819241][ T780] vfs_get_tree+0x8f/0x380 [ 1775.823664][ T780] do_mount+0x169d/0x2490 [ 1775.827993][ T780] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1775.833534][ T780] ? copy_mount_options+0x5f/0x3c0 [ 1775.838635][ T780] ? copy_mount_options+0x308/0x3c0 [ 1775.838646][ T780] ksys_mount+0xcc/0x100 [ 1775.838657][ T780] __x64_sys_mount+0xbf/0xd0 [ 1775.838670][ T780] do_syscall_64+0xfe/0x140 [ 1775.838682][ T780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1775.838690][ T780] RIP: 0033:0x45c2ca [ 1775.838699][ T780] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1775.838707][ T780] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:37:51 executing program 2 (fault-call:0 fault-nth:85): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80, 0x2}}) 20:37:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:51 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x05\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:51 executing program 1 (fault-call:3 fault-nth:8): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xd00, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) [ 1775.848095][ T780] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1775.848101][ T780] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1775.848106][ T780] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1775.848111][ T780] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1775.848116][ T780] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1775.994351][ T1005] FAULT_INJECTION: forcing a failure. [ 1775.994351][ T1005] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.041181][ T1005] CPU: 0 PID: 1005 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1776.049122][ T1005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1776.049126][ T1005] Call Trace: [ 1776.049145][ T1005] dump_stack+0x1d8/0x2f8 [ 1776.049161][ T1005] should_fail+0x555/0x770 [ 1776.049176][ T1005] __should_failslab+0x11a/0x160 [ 1776.049190][ T1005] should_failslab+0x9/0x20 [ 1776.049201][ T1005] kmem_cache_alloc_node+0x65/0x280 20:37:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1776.049212][ T1005] ? __alloc_skb+0x9f/0x500 [ 1776.049225][ T1005] __alloc_skb+0x9f/0x500 [ 1776.049240][ T1005] rtmsg_ifinfo_build_skb+0x7f/0x190 [ 1776.049253][ T1005] rtnetlink_event+0xf2/0x1b0 [ 1776.049265][ T1005] raw_notifier_call_chain+0xec/0x190 [ 1776.049278][ T1005] dev_set_mac_address+0x334/0x480 [ 1776.049293][ T1005] dev_ifsioc+0x5a0/0x9f0 [ 1776.049306][ T1005] dev_ioctl+0x52e/0xce0 [ 1776.072674][ T1005] sock_do_ioctl+0x16b/0x260 [ 1776.072688][ T1005] sock_ioctl+0x461/0x680 20:37:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1776.072701][ T1005] ? sock_poll+0x310/0x310 [ 1776.089303][ T1054] FAULT_INJECTION: forcing a failure. [ 1776.089303][ T1054] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.091701][ T1005] do_vfs_ioctl+0x744/0x1730 [ 1776.091710][ T1005] ? __fget+0x471/0x510 [ 1776.091727][ T1005] ? tomoyo_file_ioctl+0x23/0x30 [ 1776.168868][ T1005] ? security_file_ioctl+0xa1/0xd0 [ 1776.173974][ T1005] __x64_sys_ioctl+0xe3/0x120 [ 1776.178648][ T1005] do_syscall_64+0xfe/0x140 [ 1776.183239][ T1005] entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:37:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80, 0x3}}) [ 1776.189122][ T1005] RIP: 0033:0x459879 [ 1776.193008][ T1005] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1776.212603][ T1005] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1776.221002][ T1005] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1776.228956][ T1005] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 20:37:51 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\x06\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0xe00, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:51 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\a\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1776.228961][ T1005] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1776.228966][ T1005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 [ 1776.228971][ T1005] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1776.265032][ T1054] CPU: 1 PID: 1054 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1776.272856][ T1054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1776.282903][ T1054] Call Trace: [ 1776.286192][ T1054] dump_stack+0x1d8/0x2f8 [ 1776.290527][ T1054] should_fail+0x555/0x770 [ 1776.294938][ T1054] __should_failslab+0x11a/0x160 [ 1776.299871][ T1054] ? getname_kernel+0x59/0x2f0 [ 1776.304633][ T1054] should_failslab+0x9/0x20 [ 1776.309130][ T1054] kmem_cache_alloc+0x56/0x2e0 [ 1776.313898][ T1054] getname_kernel+0x59/0x2f0 [ 1776.318486][ T1054] kern_path+0x1f/0x40 [ 1776.322562][ T1054] blkdev_get_by_path+0x71/0x270 [ 1776.327501][ T1054] btrfs_scan_one_device+0xbd/0x450 [ 1776.332695][ T1054] ? btrfs_mount_root+0x477/0x1050 [ 1776.337798][ T1054] ? trace_hardirqs_on+0x74/0x80 [ 1776.342741][ T1054] btrfs_mount_root+0x4af/0x1050 [ 1776.347683][ T1054] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1776.352962][ T1054] ? trace_kfree+0xa0/0x110 [ 1776.357457][ T1054] legacy_get_tree+0xf9/0x1a0 [ 1776.357468][ T1054] ? btrfs_control_open+0x40/0x40 [ 1776.357479][ T1054] vfs_get_tree+0x8f/0x380 [ 1776.367176][ T1054] vfs_kern_mount+0xc2/0x160 [ 1776.367186][ T1054] btrfs_mount+0x34f/0x18f0 [ 1776.367203][ T1054] ? legacy_parse_param+0x37b/0x880 [ 1776.367217][ T1054] ? cap_capable+0x250/0x290 [ 1776.376180][ T1054] legacy_get_tree+0xf9/0x1a0 [ 1776.376192][ T1054] ? btrfs_resize_thread_pool+0x290/0x290 [ 1776.376202][ T1054] vfs_get_tree+0x8f/0x380 [ 1776.376217][ T1054] do_mount+0x169d/0x2490 [ 1776.385871][ T1054] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1776.385881][ T1054] ? copy_mount_options+0x5f/0x3c0 [ 1776.385893][ T1054] ? copy_mount_options+0x308/0x3c0 [ 1776.385905][ T1054] ksys_mount+0xcc/0x100 [ 1776.395123][ T1054] __x64_sys_mount+0xbf/0xd0 [ 1776.395137][ T1054] do_syscall_64+0xfe/0x140 20:37:51 executing program 2 (fault-call:0 fault-nth:86): syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 20:37:51 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\b\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 20:37:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x1100, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:51 executing program 1 (fault-call:3 fault-nth:9): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) dup3(r1, r0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 20:37:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80, 0x4}}) 20:37:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) [ 1776.395149][ T1054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1776.395161][ T1054] RIP: 0033:0x45c2ca [ 1776.405234][ T1054] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1776.405241][ T1054] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1776.405250][ T1054] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1776.405256][ T1054] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1776.405261][ T1054] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1776.405266][ T1054] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1776.405274][ T1054] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1776.514168][ T1347] FAULT_INJECTION: forcing a failure. [ 1776.514168][ T1347] name failslab, interval 1, probability 0, space 0, times 0 20:37:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80, 0x5}}) 20:37:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x1200, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:51 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00\x00\x00\x00\x00\t\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) [ 1776.606614][ T1360] FAULT_INJECTION: forcing a failure. [ 1776.606614][ T1360] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.654775][ T1347] CPU: 1 PID: 1347 Comm: syz-executor.1 Not tainted 5.3.0-rc6 #93 [ 1776.662701][ T1347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1776.672751][ T1347] Call Trace: [ 1776.676041][ T1347] dump_stack+0x1d8/0x2f8 [ 1776.680382][ T1347] should_fail+0x555/0x770 [ 1776.684797][ T1347] __should_failslab+0x11a/0x160 [ 1776.689740][ T1347] should_failslab+0x9/0x20 [ 1776.694227][ T1347] kmem_cache_alloc_node+0x65/0x280 [ 1776.699415][ T1347] ? __alloc_skb+0x9f/0x500 [ 1776.703900][ T1347] __alloc_skb+0x9f/0x500 [ 1776.708217][ T1347] rtmsg_ifinfo_build_skb+0x7f/0x190 [ 1776.713486][ T1347] rtnetlink_event+0xf2/0x1b0 [ 1776.718149][ T1347] raw_notifier_call_chain+0xec/0x190 [ 1776.723510][ T1347] dev_set_mac_address+0x334/0x480 [ 1776.728609][ T1347] dev_ifsioc+0x5a0/0x9f0 [ 1776.732921][ T1347] dev_ioctl+0x52e/0xce0 [ 1776.737145][ T1347] sock_do_ioctl+0x16b/0x260 [ 1776.741723][ T1347] sock_ioctl+0x461/0x680 [ 1776.746036][ T1347] ? sock_poll+0x310/0x310 [ 1776.750438][ T1347] do_vfs_ioctl+0x744/0x1730 [ 1776.755012][ T1347] ? __fget+0x471/0x510 [ 1776.759156][ T1347] ? tomoyo_file_ioctl+0x23/0x30 [ 1776.764076][ T1347] ? security_file_ioctl+0xa1/0xd0 [ 1776.769169][ T1347] __x64_sys_ioctl+0xe3/0x120 [ 1776.773831][ T1347] do_syscall_64+0xfe/0x140 [ 1776.778317][ T1347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1776.784188][ T1347] RIP: 0033:0x459879 [ 1776.788068][ T1347] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1776.808074][ T1347] RSP: 002b:00007f348b558c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1776.816470][ T1347] RAX: ffffffffffffffda RBX: 00007f348b558c90 RCX: 0000000000459879 [ 1776.824423][ T1347] RDX: 0000000020000100 RSI: 0000000000008924 RDI: 0000000000000003 [ 1776.832461][ T1347] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1776.840416][ T1347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f348b5596d4 20:37:52 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x2500, 0x0}, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default]}) 20:37:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}, 0x0}], 0x2, 0x0) 20:37:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000001440)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0xffffffffffffff80, 0x6}}) [ 1776.848366][ T1347] R13: 00000000004c3c45 R14: 00000000004d7600 R15: 0000000000000005 [ 1776.856335][ T1360] CPU: 0 PID: 1360 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1776.864135][ T1360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1776.874180][ T1360] Call Trace: [ 1776.877474][ T1360] dump_stack+0x1d8/0x2f8 [ 1776.881800][ T1360] should_fail+0x555/0x770 [ 1776.886217][ T1360] __should_failslab+0x11a/0x160 [ 1776.891149][ T1360] should_failslab+0x9/0x20 [ 1776.895644][ T1360] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1776.900917][ T1360] ? btrfs_alloc_device+0x78/0x5a0 [ 1776.906021][ T1360] btrfs_alloc_device+0x78/0x5a0 [ 1776.910950][ T1360] ? blkdev_put+0x2c8/0x3b0 [ 1776.915452][ T1360] close_fs_devices+0x4ae/0x910 [ 1776.920304][ T1360] btrfs_close_devices+0x33/0x130 [ 1776.925326][ T1360] btrfs_mount_root+0xa9d/0x1050 [ 1776.930268][ T1360] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1776.935656][ T1360] ? trace_kfree+0xa0/0x110 [ 1776.940158][ T1360] legacy_get_tree+0xf9/0x1a0 [ 1776.944840][ T1360] ? btrfs_control_open+0x40/0x40 [ 1776.949862][ T1360] vfs_get_tree+0x8f/0x380 [ 1776.954280][ T1360] vfs_kern_mount+0xc2/0x160 [ 1776.958868][ T1360] btrfs_mount+0x34f/0x18f0 [ 1776.963460][ T1360] ? legacy_parse_param+0x37b/0x880 [ 1776.968984][ T1360] ? cap_capable+0x250/0x290 [ 1776.973576][ T1360] legacy_get_tree+0xf9/0x1a0 [ 1776.978246][ T1360] ? btrfs_resize_thread_pool+0x290/0x290 [ 1776.983946][ T1360] vfs_get_tree+0x8f/0x380 [ 1776.988358][ T1360] do_mount+0x169d/0x2490 [ 1776.992684][ T1360] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1776.998221][ T1360] ? copy_mount_options+0x5f/0x3c0 [ 1777.003334][ T1360] ? copy_mount_options+0x308/0x3c0 [ 1777.008537][ T1360] ksys_mount+0xcc/0x100 [ 1777.012774][ T1360] __x64_sys_mount+0xbf/0xd0 [ 1777.017362][ T1360] do_syscall_64+0xfe/0x140 [ 1777.021863][ T1360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1777.027750][ T1360] RIP: 0033:0x45c2ca [ 1777.031632][ T1360] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1777.051300][ T1360] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1777.051309][ T1360] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1777.051314][ T1360] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1777.051318][ T1360] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1777.051322][ T1360] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1777.051327][ T1360] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1777.100952][ T1360] ------------[ cut here ]------------ [ 1777.106417][ T1360] kernel BUG at fs/btrfs/volumes.c:1275! [ 1777.116058][ T1360] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1777.122141][ T1360] CPU: 0 PID: 1360 Comm: syz-executor.2 Not tainted 5.3.0-rc6 #93 [ 1777.129929][ T1360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1777.137457][ T3907] kobject: 'loop3' (000000000ef38497): kobject_uevent_env [ 1777.139981][ T1360] RIP: 0010:close_fs_devices+0x8ff/0x910 [ 1777.147124][ T3907] kobject: 'loop3' (000000000ef38497): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1777.152688][ T1360] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 fb 17 fb fe e9 56 ff ff ff e8 e1 25 c2 fe <0f> 0b e8 da 25 c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 1777.182395][ T1360] RSP: 0018:ffff88803f59f990 EFLAGS: 00010246 [ 1777.188456][ T1360] RAX: ffffffff82b164cf RBX: ffff888089c825a8 RCX: 0000000000040000 [ 1777.196410][ T1360] RDX: ffffc9000a37f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1777.204362][ T1360] RBP: ffff88803f59fa20 R08: ffffffff82b23948 R09: fffffbfff11204fa [ 1777.212302][ T1360] R10: fffffbfff11204fa R11: 0000000000000000 R12: dffffc0000000000 [ 1777.220243][ T1360] R13: ffff888089c825b0 R14: ffff888089c824c0 R15: ffff888099bf95c0 [ 1777.228272][ T1360] FS: 00007f1a4668f700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1777.237172][ T1360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1777.243855][ T1360] CR2: 0000000000625208 CR3: 000000009b4ac000 CR4: 00000000001426f0 [ 1777.251839][ T1360] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1777.259781][ T1360] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1777.267723][ T1360] Call Trace: [ 1777.270992][ T1360] btrfs_close_devices+0x33/0x130 [ 1777.275988][ T1360] btrfs_mount_root+0xa9d/0x1050 [ 1777.280899][ T1360] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1777.286184][ T1360] ? trace_kfree+0xa0/0x110 [ 1777.290657][ T1360] legacy_get_tree+0xf9/0x1a0 [ 1777.295301][ T1360] ? btrfs_control_open+0x40/0x40 [ 1777.300294][ T1360] vfs_get_tree+0x8f/0x380 [ 1777.304699][ T1360] vfs_kern_mount+0xc2/0x160 [ 1777.309259][ T1360] btrfs_mount+0x34f/0x18f0 [ 1777.313738][ T1360] ? legacy_parse_param+0x37b/0x880 [ 1777.318924][ T1360] ? cap_capable+0x250/0x290 [ 1777.323505][ T1360] legacy_get_tree+0xf9/0x1a0 [ 1777.328151][ T1360] ? btrfs_resize_thread_pool+0x290/0x290 [ 1777.333854][ T1360] vfs_get_tree+0x8f/0x380 [ 1777.338244][ T1360] do_mount+0x169d/0x2490 [ 1777.342564][ T1360] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1777.348080][ T1360] ? copy_mount_options+0x5f/0x3c0 [ 1777.353168][ T1360] ? copy_mount_options+0x308/0x3c0 [ 1777.358354][ T1360] ksys_mount+0xcc/0x100 [ 1777.362565][ T1360] __x64_sys_mount+0xbf/0xd0 [ 1777.367128][ T1360] do_syscall_64+0xfe/0x140 [ 1777.371604][ T1360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1777.377475][ T1360] RIP: 0033:0x45c2ca [ 1777.381344][ T1360] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1777.400917][ T1360] RSP: 002b:00007f1a4668ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1777.409310][ T1360] RAX: ffffffffffffffda RBX: 00007f1a4668eb40 RCX: 000000000045c2ca [ 1777.417254][ T1360] RDX: 00007f1a4668eae0 RSI: 0000000020000100 RDI: 00007f1a4668eb00 [ 1777.425194][ T1360] RBP: 0000000000000001 R08: 00007f1a4668eb40 R09: 00007f1a4668eae0 [ 1777.433136][ T1360] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1777.441076][ T1360] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 1777.449034][ T1360] Modules linked in: [ 1777.455625][ T1360] ---[ end trace 2c08b1355fa6371b ]--- [ 1777.457932][ T3907] kobject: 'loop2' (000000000d97fc62): kobject_uevent_env [ 1777.461095][ T1360] RIP: 0010:close_fs_devices+0x8ff/0x910 [ 1777.461108][ T1360] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 fb 17 fb fe e9 56 ff ff ff e8 e1 25 c2 fe <0f> 0b e8 da 25 c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 1777.470346][ T3907] kobject: 'loop2' (000000000d97fc62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1777.474313][ T1360] RSP: 0018:ffff88803f59f990 EFLAGS: 00010246 [ 1777.509769][ T1360] RAX: ffffffff82b164cf RBX: ffff888089c825a8 RCX: 0000000000040000 [ 1777.517772][ T1360] RDX: ffffc9000a37f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1777.525747][ T1360] RBP: ffff88803f59fa20 R08: ffffffff82b23948 R09: fffffbfff11204fa [ 1777.533708][ T1360] R10: fffffbfff11204fa R11: 0000000000000000 R12: dffffc0000000000 [ 1777.541684][ T1360] R13: ffff888089c825b0 R14: ffff888089c824c0 R15: ffff888099bf95c0 [ 1777.549808][ T1360] FS: 00007f1a4668f700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1777.558768][ T1360] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1777.565396][ T1360] CR2: 0000000000738000 CR3: 000000009b4ac000 CR4: 00000000001426f0 [ 1777.573359][ T1360] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1777.581700][ T1360] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1777.589798][ T1360] Kernel panic - not syncing: Fatal exception [ 1777.597318][ T1360] Kernel Offset: disabled [ 1777.601639][ T1360] Rebooting in 86400 seconds..