c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:33 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:34 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x22000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x10000006, 0xfffbffffffffffff, 0x0, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x5421, &(0x7f0000000080)=0x2) 22:07:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x10000006, 0xfffbffffffffffff, 0x0, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x541b, &(0x7f0000000080)=0x2) 22:07:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001db, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:34 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f00000000c0)={0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) 22:07:34 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x29010000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1068.556277] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:34 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1068.608941] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:34 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001dc, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:34 executing program 2: r0 = socket(0x200000000010, 0x8000a, 0x100000000001) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) sendmsg$nl_generic(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000040)={0x214, 0x39, 0x100, 0x70bd2c, 0x25dfdbff, {0x15}, [@typed={0x18, 0x24, @str='uservboxnet0ppp1\x00'}, @nested={0x5c, 0x7c, [@generic="4fddcfe89ad4ae07b2f75618f85f5e2531c920a73aef754fee7e8bf4818a87ef737e23525fcaf14c08dfcfa0af0e082e363a7b4c434597c13eefb82d51c006abac9197db026e6a400826acf3895dabf70c9d7a9771343271"]}, @generic="24b42c7348dfea9cf8f7a6ad9ea231b2dd4c8d96d3db7c47f064521d56b715412be259f94c06cdc6d9ac748fb84200162f68f38a645682f8fb98d9c37cb93b823a9c7136befd825c3aedddfc1e6594cf65bc7c331bea5c43f35d4ca65f2c1ccaf5324c1af74c231f4d8ce3b862978c269bad8624e01ca9592fa961cdb5bd8cffe34bb947c6033585e47e3f891cbcd3f6c0c4fa1189ea308a16c4c15a9c89630af574e9bc815c3f19c674166bd944f4c4aeaf39d94099454ab4376f21cd5fc189ceec34c80a0503f5bfcfd3b837e3a5db3680b68478dbc02b7c3ee28703114f7e1c837bf74cc30084af5edf654bb75caadaccf28444d92abc08", @generic="7f0a8a5b3516fbb35ba6af10a163b5b9e0b0ed7deefb9332eb5e63a014eb79a965560d4ce2cef5bad72d6dbc2a552c0c5674bf5ff009c535013607109d923e1623aa4afa438dc44ffc8c6a7ff10ab49806ceaa27b2842a1f3874e841bc5f82662adaa098a550abeadd3e154ca2b8cbade7439ff2d59bbd233837093d513c879e6aec66203beaeedebf77666ea4de2d41cc4ac2"]}, 0x214}, 0x1, 0x0, 0x0, 0x40c0}, 0x20004081) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x2, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/enforce\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000380)={0x2, "e6f3313617cc43f6ac67c9fecc00738a352cc3db50c56f006a770b3194c38897", 0x1, 0x1}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r3, 0x10, 0x70bd2b, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x8084}, 0x40) [ 1068.834571] FAULT_INJECTION: forcing a failure. [ 1068.834571] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.868530] CPU: 1 PID: 1361 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1068.875531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.884923] Call Trace: [ 1068.887556] dump_stack+0x172/0x1f0 [ 1068.891226] should_fail.cold+0xa/0x1b [ 1068.895162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1068.900303] ? lock_downgrade+0x810/0x810 [ 1068.904500] __should_failslab+0x121/0x190 [ 1068.908755] should_failslab+0x9/0x14 [ 1068.912583] __kmalloc+0x2e2/0x750 [ 1068.916156] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1068.921725] ? fput+0x128/0x1a0 [ 1068.925070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1068.930640] ? strnlen_user+0x15f/0x1e0 [ 1068.934649] ? __x64_sys_memfd_create+0x13c/0x470 [ 1068.939529] __x64_sys_memfd_create+0x13c/0x470 [ 1068.944241] ? memfd_fcntl+0x1a50/0x1a50 [ 1068.948330] ? do_syscall_64+0x26/0x620 [ 1068.952331] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1068.956985] ? trace_hardirqs_on+0x67/0x220 [ 1068.961346] do_syscall_64+0xfd/0x620 [ 1068.965193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.970406] RIP: 0033:0x459829 [ 1068.973620] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.992558] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1069.000308] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1069.007638] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1069.014940] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1069.022243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8415c6d4 [ 1069.029543] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x10000006, 0xfffbffffffffffff, 0x0, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x5421, &(0x7f0000000080)=0x2) 22:07:35 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:35 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x2}) 22:07:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:35 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001dd, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1069.593619] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1069.616950] FAULT_INJECTION: forcing a failure. [ 1069.616950] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.645919] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1069.657851] CPU: 0 PID: 1402 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1069.664848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.674247] Call Trace: [ 1069.676884] dump_stack+0x172/0x1f0 [ 1069.680553] should_fail.cold+0xa/0x1b [ 1069.684486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.689731] ? lock_downgrade+0x810/0x810 [ 1069.693931] __should_failslab+0x121/0x190 [ 1069.698208] should_failslab+0x9/0x14 [ 1069.702051] kmem_cache_alloc+0x2ae/0x700 [ 1069.706247] ? __alloc_fd+0x44d/0x560 [ 1069.710085] ? shmem_destroy_callback+0xc0/0xc0 [ 1069.714786] shmem_alloc_inode+0x1c/0x50 [ 1069.718944] alloc_inode+0x64/0x190 [ 1069.722595] new_inode_pseudo+0x19/0xf0 [ 1069.726590] new_inode+0x1f/0x40 [ 1069.729996] shmem_get_inode+0x84/0x780 [ 1069.734006] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1069.738898] shmem_file_setup+0x66/0x90 [ 1069.742890] __x64_sys_memfd_create+0x2a2/0x470 [ 1069.747571] ? memfd_fcntl+0x1a50/0x1a50 [ 1069.751671] ? do_syscall_64+0x26/0x620 [ 1069.755661] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1069.760252] ? trace_hardirqs_on+0x67/0x220 [ 1069.764590] do_syscall_64+0xfd/0x620 [ 1069.768408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.773602] RIP: 0033:0x459829 22:07:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1069.776836] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.801137] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1069.809053] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1069.816366] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1069.823662] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1069.830980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8415c6d4 [ 1069.838268] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:35 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) r1 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x1, 0x100) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000240)={0x8, &(0x7f0000000200)=""/8}) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{0xf000, 0x1000, 0x0, 0x0, 0x0, 0x7f, 0x3, 0x3, 0xffffffffffffff7f, 0xfffffffffffffffb, 0xfffffffffffffe01, 0x8000}, {0x7002, 0x6000, 0xc, 0x1, 0x2, 0x6, 0x7fffffff, 0xffffffffffff7fff, 0xd2fb, 0x1, 0x8000, 0x3}, {0x100000, 0x100000, 0xd, 0xf2, 0x9, 0x6c, 0x7, 0x2, 0xffffffffffffc3d8, 0xfffffffffffffff8, 0x1, 0x6f6a}, {0x5000, 0x3000, 0x8, 0x1000, 0xfffffffffffffffc, 0x4, 0x80000000, 0x40000000000, 0x9, 0x3, 0x10001}, {0x3000, 0x0, 0xea04a32ac2798ecc, 0x9, 0x6, 0x3, 0x1a8, 0x1000, 0x7, 0x80, 0x4, 0xc7}, {0xf000, 0x2, 0x0, 0xff, 0x3, 0x6, 0x1, 0x3, 0x9, 0x7, 0x6311}, {0x4000, 0x10000, 0x4, 0x4, 0x0, 0x2, 0x2, 0x100000000, 0xf7, 0x9, 0x7f, 0x87}, {0x5000, 0x0, 0xa, 0x3ff, 0xffffffff80000000, 0x7, 0x1, 0xb6e2, 0x8001, 0x1f, 0x10000, 0xffff}, {0xf000, 0x6000}, {0x10000, 0x4}, 0x10001, 0x0, 0x0, 0x10, 0x1, 0x8000, 0x0, [0x4, 0x0, 0x6, 0x81]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000002c0)={{0x1, 0x1}, 'port0\x00', 0xc0, 0x40, 0x80000001, 0x7, 0x3f, 0x3, 0x5534f649, 0x0, 0x2, 0xffffffffffffb929}) write(r0, &(0x7f0000000280)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 22:07:35 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001de, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:36 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1070.067974] FAULT_INJECTION: forcing a failure. [ 1070.067974] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.122357] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1070.146046] CPU: 0 PID: 1416 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1070.153054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.162436] Call Trace: [ 1070.165070] dump_stack+0x172/0x1f0 [ 1070.168740] should_fail.cold+0xa/0x1b [ 1070.172683] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.177830] ? percpu_ref_put_many+0x94/0x190 [ 1070.182373] __should_failslab+0x121/0x190 [ 1070.186645] should_failslab+0x9/0x14 [ 1070.190469] kmem_cache_alloc+0x2ae/0x700 [ 1070.194643] ? map_id_range_down+0x1ee/0x370 [ 1070.199082] ? __put_user_ns+0x70/0x70 [ 1070.203012] selinux_inode_alloc_security+0xb6/0x2a0 [ 1070.208158] security_inode_alloc+0x8a/0xd0 [ 1070.212518] inode_init_always+0x56e/0xb40 [ 1070.216787] alloc_inode+0x81/0x190 [ 1070.220439] new_inode_pseudo+0x19/0xf0 [ 1070.224448] new_inode+0x1f/0x40 [ 1070.227842] shmem_get_inode+0x84/0x780 [ 1070.231856] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1070.236739] shmem_file_setup+0x66/0x90 [ 1070.240795] __x64_sys_memfd_create+0x2a2/0x470 [ 1070.245511] ? memfd_fcntl+0x1a50/0x1a50 [ 1070.249605] ? do_syscall_64+0x26/0x620 [ 1070.253611] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1070.258232] ? trace_hardirqs_on+0x67/0x220 [ 1070.262593] do_syscall_64+0xfd/0x620 [ 1070.266429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.271648] RIP: 0033:0x459829 [ 1070.274861] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.293788] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1070.301529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1070.308819] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1070.316129] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1070.323425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8415c6d4 [ 1070.330722] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1070.360829] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:36 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:36 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:36 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f00000001c0)={0x80fb, 0x3}) r2 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xe239, 0x80000) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl(r2, 0x100, &(0x7f0000000200)="12494a9626092090e16810cd2766bc4e1d4e055f4cc7dc39f6e5e043ae868edc8937df01c88721d96c249b65fdb54e60853d6b556f07c0e32f") write$smack_current(r3, &(0x7f0000000040)='security\x00', 0x9) write(r3, &(0x7f0000000080)="71bcd121e24d686eafb8f6ebf31adb817f47c622d5b08a16824f95d5b68624b22c48521de3530da56c884fc079ddf61c4a47e5cf65ad04f8f4806ff461caccb15b37535379e4300e47ee32a6dfccbc673bf16be6b78e085a66c5bae827f73d7a705d2af5265ac3f55ac5a8f75f95355bba336252c59dad000fa19e3213ef04fd7058fb533e1a3dc0a79a4e72e5c9ee98dcb2c3e64df24fa993cc8678fe0fd99ad56d119ad4bb0d09242811e35af95a3fa335", 0xb2) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r4 = socket(0x200000000010, 0x3, 0x0) write(r4, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:36 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1070.558721] FAULT_INJECTION: forcing a failure. [ 1070.558721] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.593395] CPU: 1 PID: 1444 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1070.600405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.609803] Call Trace: [ 1070.612422] dump_stack+0x172/0x1f0 [ 1070.616093] should_fail.cold+0xa/0x1b [ 1070.620056] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.625185] ? lock_downgrade+0x810/0x810 [ 1070.629363] __should_failslab+0x121/0x190 [ 1070.633717] should_failslab+0x9/0x14 [ 1070.637578] __kmalloc+0x2e2/0x750 [ 1070.639049] FAULT_INJECTION: forcing a failure. [ 1070.639049] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.641145] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1070.641162] ? fput+0x128/0x1a0 [ 1070.641178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1070.641193] ? strnlen_user+0x15f/0x1e0 [ 1070.641223] ? __x64_sys_memfd_create+0x13c/0x470 [ 1070.655615] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1070.658105] __x64_sys_memfd_create+0x13c/0x470 [ 1070.658126] ? memfd_fcntl+0x1a50/0x1a50 [ 1070.658151] ? do_syscall_64+0x26/0x620 [ 1070.697082] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1070.701692] ? trace_hardirqs_on+0x67/0x220 [ 1070.706052] do_syscall_64+0xfd/0x620 [ 1070.709891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.715096] RIP: 0033:0x459829 [ 1070.718308] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.737233] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1070.744974] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1070.752359] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1070.759686] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1070.767011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b1993d6d4 [ 1070.774311] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1070.781636] CPU: 0 PID: 1450 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1070.788599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1070.797989] Call Trace: [ 1070.800611] dump_stack+0x172/0x1f0 [ 1070.804283] should_fail.cold+0xa/0x1b [ 1070.808204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1070.814659] ? lock_downgrade+0x810/0x810 [ 1070.818854] __should_failslab+0x121/0x190 [ 1070.823128] should_failslab+0x9/0x14 [ 1070.826989] kmem_cache_alloc+0x2ae/0x700 [ 1070.831194] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1070.836338] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1070.841011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1070.846601] ? timespec64_trunc+0xf0/0x180 [ 1070.850872] __d_alloc+0x2e/0x9c0 [ 1070.854370] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1070.859598] d_alloc_pseudo+0x1e/0x70 [ 1070.863427] alloc_file_pseudo+0xe2/0x280 [ 1070.867601] ? __lockdep_init_map+0x10c/0x5b0 [ 1070.872130] ? alloc_file+0x4d0/0x4d0 [ 1070.876066] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1070.881667] ? kasan_check_write+0x14/0x20 [ 1070.885939] __shmem_file_setup.part.0+0x108/0x2b0 [ 1070.890909] shmem_file_setup+0x66/0x90 [ 1070.894925] __x64_sys_memfd_create+0x2a2/0x470 [ 1070.899630] ? memfd_fcntl+0x1a50/0x1a50 [ 1070.903720] ? do_syscall_64+0x26/0x620 [ 1070.907725] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1070.912335] ? trace_hardirqs_on+0x67/0x220 [ 1070.916698] do_syscall_64+0xfd/0x620 [ 1070.920535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.925753] RIP: 0033:0x459829 [ 1070.928973] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.948075] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:07:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1070.955814] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1070.963107] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1070.970418] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1070.977720] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8415c6d4 [ 1070.985009] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:37 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1071.050326] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:37 executing program 2: r0 = socket(0x8, 0x7, 0x10000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x7, 0xda7, 0x3, 0x5, 0x9bfb, 0x0, 0x1, 0xb}}) write(r0, &(0x7f0000000300)="240000040000000014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x52000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001df, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1071.154697] FAULT_INJECTION: forcing a failure. [ 1071.154697] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.167217] CPU: 1 PID: 1463 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1071.174174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.183546] Call Trace: [ 1071.186158] dump_stack+0x172/0x1f0 [ 1071.189805] should_fail.cold+0xa/0x1b [ 1071.193713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.198834] ? lock_downgrade+0x810/0x810 [ 1071.203027] __should_failslab+0x121/0x190 [ 1071.207291] should_failslab+0x9/0x14 [ 1071.211103] kmem_cache_alloc+0x2ae/0x700 [ 1071.215261] ? __alloc_fd+0x44d/0x560 [ 1071.219077] ? shmem_destroy_callback+0xc0/0xc0 [ 1071.223756] shmem_alloc_inode+0x1c/0x50 [ 1071.227841] alloc_inode+0x64/0x190 [ 1071.231477] new_inode_pseudo+0x19/0xf0 [ 1071.235463] new_inode+0x1f/0x40 [ 1071.238837] shmem_get_inode+0x84/0x780 [ 1071.242823] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1071.247698] shmem_file_setup+0x66/0x90 [ 1071.251708] __x64_sys_memfd_create+0x2a2/0x470 [ 1071.256503] ? memfd_fcntl+0x1a50/0x1a50 [ 1071.260581] ? do_syscall_64+0x26/0x620 [ 1071.264575] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1071.269179] ? trace_hardirqs_on+0x67/0x220 [ 1071.273524] do_syscall_64+0xfd/0x620 [ 1071.277351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.282558] RIP: 0033:0x459829 [ 1071.285762] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:07:37 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1071.304684] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1071.312439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1071.319742] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1071.327035] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1071.334331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b1993d6d4 [ 1071.341617] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:37 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f00000006c0)="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", 0xffffffffffffffd9) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x5, 0x4) [ 1071.472230] FAULT_INJECTION: forcing a failure. [ 1071.472230] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.487647] CPU: 0 PID: 1481 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1071.494613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.503701] __ntfs_warning: 25 callbacks suppressed [ 1071.503718] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1071.504079] Call Trace: [ 1071.504111] dump_stack+0x172/0x1f0 [ 1071.504134] should_fail.cold+0xa/0x1b [ 1071.528906] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.528922] ? lock_downgrade+0x810/0x810 [ 1071.528947] __should_failslab+0x121/0x190 [ 1071.528969] should_failslab+0x9/0x14 [ 1071.528982] kmem_cache_alloc+0x2ae/0x700 [ 1071.529005] __alloc_file+0x27/0x330 [ 1071.529020] alloc_empty_file+0x72/0x170 [ 1071.529037] alloc_file+0x5e/0x4d0 22:07:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1071.529057] alloc_file_pseudo+0x189/0x280 [ 1071.576160] ? alloc_file+0x4d0/0x4d0 [ 1071.579993] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1071.580015] ? kasan_check_write+0x14/0x20 [ 1071.580037] __shmem_file_setup.part.0+0x108/0x2b0 [ 1071.580056] shmem_file_setup+0x66/0x90 [ 1071.598767] __x64_sys_memfd_create+0x2a2/0x470 [ 1071.603462] ? memfd_fcntl+0x1a50/0x1a50 [ 1071.607554] ? do_syscall_64+0x26/0x620 [ 1071.611553] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1071.616163] ? trace_hardirqs_on+0x67/0x220 [ 1071.620520] do_syscall_64+0xfd/0x620 [ 1071.624349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.629562] RIP: 0033:0x459829 [ 1071.632776] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.651786] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1071.651804] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 22:07:37 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1071.651811] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1071.651828] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1071.651836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8415c6d4 [ 1071.651845] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e0, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1071.720977] ntfs: (device loop4): parse_options(): NLS character set [ 1071.720977] p852 not found. Using previous one utf8. [ 1071.729439] FAULT_INJECTION: forcing a failure. [ 1071.729439] name failslab, interval 1, probability 0, space 0, times 0 22:07:37 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) r1 = dup(r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x1, 0x4) r2 = gettid() ptrace$getregs(0xc, r2, 0x8, &(0x7f0000000140)=""/185) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000040)=0x2) 22:07:37 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1071.770569] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1071.803931] CPU: 0 PID: 1491 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1071.810943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:07:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1071.820328] Call Trace: [ 1071.822949] dump_stack+0x172/0x1f0 [ 1071.826599] should_fail.cold+0xa/0x1b [ 1071.830600] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.835733] ? percpu_ref_put_many+0x94/0x190 [ 1071.840259] __should_failslab+0x121/0x190 [ 1071.844517] should_failslab+0x9/0x14 [ 1071.845336] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1071.848331] kmem_cache_alloc+0x2ae/0x700 [ 1071.848349] ? map_id_range_down+0x1ee/0x370 [ 1071.848367] ? __put_user_ns+0x70/0x70 22:07:37 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8800000004e) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000180)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x5, 0x87a7}) write(0xffffffffffffffff, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r2, 0x101, 0xc, &(0x7f0000000000), 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) [ 1071.848387] selinux_inode_alloc_security+0xb6/0x2a0 [ 1071.848406] security_inode_alloc+0x8a/0xd0 [ 1071.848425] inode_init_always+0x56e/0xb40 [ 1071.848443] alloc_inode+0x81/0x190 [ 1071.848456] new_inode_pseudo+0x19/0xf0 [ 1071.848470] new_inode+0x1f/0x40 [ 1071.848490] shmem_get_inode+0x84/0x780 [ 1071.898161] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1071.903036] shmem_file_setup+0x66/0x90 [ 1071.903059] __x64_sys_memfd_create+0x2a2/0x470 [ 1071.903077] ? memfd_fcntl+0x1a50/0x1a50 [ 1071.903098] ? do_syscall_64+0x26/0x620 [ 1071.920753] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1071.925355] ? trace_hardirqs_on+0x67/0x220 [ 1071.925379] do_syscall_64+0xfd/0x620 [ 1071.925400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.925417] RIP: 0033:0x459829 [ 1071.941967] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.961014] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1071.961032] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1071.961039] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1071.961046] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1071.961053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b1993d6d4 [ 1071.961061] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1072.018145] FAULT_INJECTION: forcing a failure. [ 1072.018145] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.031234] CPU: 0 PID: 1504 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1072.038208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.047592] Call Trace: [ 1072.050215] dump_stack+0x172/0x1f0 [ 1072.053878] should_fail.cold+0xa/0x1b [ 1072.057811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.062958] ? lock_downgrade+0x810/0x810 [ 1072.067148] __should_failslab+0x121/0x190 [ 1072.071422] should_failslab+0x9/0x14 [ 1072.075255] kmem_cache_alloc+0x2ae/0x700 [ 1072.079446] ? rcu_read_lock_sched_held+0x110/0x130 [ 1072.084502] selinux_file_alloc_security+0xb4/0x190 [ 1072.089545] security_file_alloc+0x63/0xa0 [ 1072.089568] __alloc_file+0xcf/0x330 [ 1072.089584] alloc_empty_file+0x72/0x170 [ 1072.089600] alloc_file+0x5e/0x4d0 [ 1072.089631] alloc_file_pseudo+0x189/0x280 [ 1072.089647] ? alloc_file+0x4d0/0x4d0 [ 1072.089670] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1072.101765] ? kasan_check_write+0x14/0x20 [ 1072.101789] __shmem_file_setup.part.0+0x108/0x2b0 [ 1072.101808] shmem_file_setup+0x66/0x90 [ 1072.109615] __x64_sys_memfd_create+0x2a2/0x470 [ 1072.109632] ? memfd_fcntl+0x1a50/0x1a50 [ 1072.109648] ? do_syscall_64+0x26/0x620 [ 1072.109662] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1072.109679] ? trace_hardirqs_on+0x67/0x220 [ 1072.109699] do_syscall_64+0xfd/0x620 [ 1072.119162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.119175] RIP: 0033:0x459829 [ 1072.119189] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.119196] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1072.119209] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1072.119216] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1072.119224] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1072.119232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8415c6d4 [ 1072.119239] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1072.231793] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1072.360117] ntfs: (device loop4): parse_options(): NLS character set [ 1072.360117] p852 not found. Using previous one utf8. [ 1072.397055] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:07:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:38 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:38 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e1, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:38 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed02007ad58a6fb1ace4c801000a0000000900000000000000", 0x2c) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 22:07:38 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:38 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x4, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'veth0_to_hsr\x00', {0x2, 0x4e22, @local}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'ip6_vti0\x00', {0x2, 0x4e20, @empty}}) r1 = socket(0x200000000010, 0x3, 0x0) recvfrom(r1, &(0x7f0000000000)=""/58, 0x3a, 0x40000061, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x2, 0x0, {0xa, 0x800, 0x6, @mcast2, 0x4}}}, 0x80) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) [ 1072.557125] FAULT_INJECTION: forcing a failure. [ 1072.557125] name failslab, interval 1, probability 0, space 0, times 0 22:07:38 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000f0", 0x24) [ 1072.599917] FAULT_INJECTION: forcing a failure. [ 1072.599917] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.611200] CPU: 0 PID: 1532 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1072.611213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.611219] Call Trace: [ 1072.611249] dump_stack+0x172/0x1f0 [ 1072.611273] should_fail.cold+0xa/0x1b [ 1072.627612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.642828] ? lock_downgrade+0x810/0x810 [ 1072.647033] __should_failslab+0x121/0x190 [ 1072.647054] should_failslab+0x9/0x14 [ 1072.647067] kmem_cache_alloc+0x2ae/0x700 [ 1072.647088] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1072.664405] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1072.669042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1072.674617] ? timespec64_trunc+0xf0/0x180 [ 1072.678891] __d_alloc+0x2e/0x9c0 [ 1072.682366] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1072.687614] d_alloc_pseudo+0x1e/0x70 [ 1072.691444] alloc_file_pseudo+0xe2/0x280 [ 1072.695617] ? __lockdep_init_map+0x10c/0x5b0 22:07:38 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000002", 0x24) [ 1072.700140] ? alloc_file+0x4d0/0x4d0 [ 1072.703980] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1072.709557] ? kasan_check_write+0x14/0x20 [ 1072.713835] __shmem_file_setup.part.0+0x108/0x2b0 [ 1072.718793] shmem_file_setup+0x66/0x90 [ 1072.722794] __x64_sys_memfd_create+0x2a2/0x470 [ 1072.727482] ? memfd_fcntl+0x1a50/0x1a50 [ 1072.731556] ? do_syscall_64+0x26/0x620 [ 1072.735551] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1072.740181] ? trace_hardirqs_on+0x67/0x220 [ 1072.744536] do_syscall_64+0xfd/0x620 [ 1072.748357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.748370] RIP: 0033:0x459829 [ 1072.748385] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.748393] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1072.748410] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1072.748419] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 22:07:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e2, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1072.748427] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1072.748435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b1993d6d4 [ 1072.748442] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1072.810382] nla_parse: 3 callbacks suppressed [ 1072.810393] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1072.817660] CPU: 1 PID: 1537 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1072.841366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.850742] Call Trace: [ 1072.853363] dump_stack+0x172/0x1f0 [ 1072.857026] should_fail.cold+0xa/0x1b [ 1072.860939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.866239] ? lock_downgrade+0x810/0x810 [ 1072.870428] __should_failslab+0x121/0x190 [ 1072.874689] should_failslab+0x9/0x14 [ 1072.878530] kmem_cache_alloc+0x2ae/0x700 [ 1072.882748] ? notify_change+0x6d5/0xfb0 [ 1072.886853] ? do_sys_ftruncate+0x41e/0x550 [ 1072.891228] getname_flags+0xd6/0x5b0 [ 1072.895075] getname+0x1a/0x20 [ 1072.898291] do_sys_open+0x2c9/0x550 [ 1072.902035] ? filp_open+0x80/0x80 [ 1072.905604] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.910388] ? do_syscall_64+0x26/0x620 [ 1072.914404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.919795] ? do_syscall_64+0x26/0x620 [ 1072.923813] __x64_sys_open+0x7e/0xc0 [ 1072.927654] do_syscall_64+0xfd/0x620 [ 1072.931496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.936717] RIP: 0033:0x413711 [ 1072.939935] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1072.958859] RSP: 002b:00007f8a8415ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1072.966599] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1072.973912] RDX: 00007f8a8415bb0a RSI: 0000000000000002 RDI: 00007f8a8415bb00 [ 1072.981208] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1072.988513] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 22:07:39 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:39 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) setsockopt(r0, 0x7ff, 0x4, &(0x7f00000000c0)="c8e77a50dc5622950e6c1abf596ffaa68305fc73a0db5924b7a0e9d3c17e1e6aee3bdb12024d89897ee13d45f6be23094d650a6d68b8a5a60aa20a7c9520349368ff53a91f85b42e6e7d1292abdb096bf93d8a4162f8377e6a64aea8037536a6ad28aac7ef8ed69f7f527863087b98d720d0e08abc22a217d898cb06c5b7032283e8df74aac9d03c21b81cf117f17ebede4ff7160e62dcafd1886766df917fc8605742a2df269f86f92f5adf73ad4a8c1490decf4165e1de67bd0378a4", 0xbd) [ 1072.995811] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1073.065432] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1073.138776] FAULT_INJECTION: forcing a failure. [ 1073.138776] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.144473] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1073.189441] ntfs: (device loop4): parse_options(): NLS character set [ 1073.189441] p852 not found. Using previous one utf8. [ 1073.197604] CPU: 1 PID: 1560 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1073.207990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.212683] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1073.217366] Call Trace: [ 1073.217396] dump_stack+0x172/0x1f0 [ 1073.217417] should_fail.cold+0xa/0x1b [ 1073.232196] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1073.232268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1073.248629] ? lock_downgrade+0x810/0x810 [ 1073.252819] __should_failslab+0x121/0x190 [ 1073.257099] should_failslab+0x9/0x14 [ 1073.260946] kmem_cache_alloc+0x2ae/0x700 [ 1073.265140] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1073.270290] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1073.274909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1073.280474] ? timespec64_trunc+0xf0/0x180 [ 1073.284726] __d_alloc+0x2e/0x9c0 [ 1073.288192] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1073.293402] d_alloc_pseudo+0x1e/0x70 [ 1073.297223] alloc_file_pseudo+0xe2/0x280 [ 1073.301387] ? __lockdep_init_map+0x10c/0x5b0 [ 1073.305904] ? alloc_file+0x4d0/0x4d0 [ 1073.309726] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1073.315280] ? kasan_check_write+0x14/0x20 [ 1073.319534] __shmem_file_setup.part.0+0x108/0x2b0 [ 1073.324488] shmem_file_setup+0x66/0x90 [ 1073.328484] __x64_sys_memfd_create+0x2a2/0x470 [ 1073.333165] ? memfd_fcntl+0x1a50/0x1a50 [ 1073.337233] ? do_syscall_64+0x26/0x620 [ 1073.341216] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1073.345836] ? trace_hardirqs_on+0x67/0x220 [ 1073.350178] do_syscall_64+0xfd/0x620 [ 1073.354004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.359204] RIP: 0033:0x459829 [ 1073.362420] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.381344] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1073.389249] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1073.396563] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1073.403851] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1073.411148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b1993d6d4 [ 1073.418440] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:39 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000003", 0x24) 22:07:39 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:39 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) bind$llc(r0, &(0x7f0000000080)={0x1a, 0x338, 0xffffffffffffffff, 0x2db362d7, 0x7, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f00000002c0)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @multicast2}}, [0x5, 0x100, 0x7, 0x4, 0x2, 0x3, 0x0, 0x329, 0xffffffffffffff81, 0x8, 0x4cf13c93, 0x9, 0x7, 0x1, 0x1]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x5}, 0x8) 22:07:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e3, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:39 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1073.571992] FAULT_INJECTION: forcing a failure. [ 1073.571992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1073.583872] CPU: 1 PID: 1575 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1073.590841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.600241] Call Trace: [ 1073.602876] dump_stack+0x172/0x1f0 [ 1073.606548] should_fail.cold+0xa/0x1b [ 1073.610479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1073.615614] ? mark_held_locks+0x100/0x100 [ 1073.619877] __alloc_pages_nodemask+0x1ee/0x750 [ 1073.624573] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1073.629603] ? find_held_lock+0x35/0x130 [ 1073.633703] cache_grow_begin+0x91/0x8c0 [ 1073.637787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1073.643350] ? check_preemption_disabled+0x48/0x290 [ 1073.648390] kmem_cache_alloc+0x63b/0x700 [ 1073.652560] ? notify_change+0x6d5/0xfb0 [ 1073.656643] ? do_sys_ftruncate+0x41e/0x550 [ 1073.660990] getname_flags+0xd6/0x5b0 [ 1073.664817] getname+0x1a/0x20 [ 1073.668026] do_sys_open+0x2c9/0x550 [ 1073.671761] ? filp_open+0x80/0x80 [ 1073.675326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1073.680101] ? do_syscall_64+0x26/0x620 [ 1073.684187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.689570] ? do_syscall_64+0x26/0x620 [ 1073.693576] __x64_sys_open+0x7e/0xc0 [ 1073.697404] do_syscall_64+0xfd/0x620 [ 1073.701229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.706457] RIP: 0033:0x413711 [ 1073.709673] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1073.728591] RSP: 002b:00007f8a8415ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1073.736326] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1073.743617] RDX: 00007f8a8415bb0a RSI: 0000000000000002 RDI: 00007f8a8415bb00 [ 1073.750902] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1073.758195] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1073.765491] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:39 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000004", 0x24) [ 1073.774886] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1073.813651] FAULT_INJECTION: forcing a failure. [ 1073.813651] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.840670] CPU: 1 PID: 1584 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1073.848278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.857675] Call Trace: [ 1073.860305] dump_stack+0x172/0x1f0 [ 1073.863970] should_fail.cold+0xa/0x1b [ 1073.867904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1073.873049] ? lock_downgrade+0x810/0x810 [ 1073.877255] __should_failslab+0x121/0x190 [ 1073.881551] should_failslab+0x9/0x14 [ 1073.885403] kmem_cache_alloc+0x2ae/0x700 [ 1073.889623] __alloc_file+0x27/0x330 [ 1073.893371] alloc_empty_file+0x72/0x170 [ 1073.897466] alloc_file+0x5e/0x4d0 [ 1073.901036] alloc_file_pseudo+0x189/0x280 [ 1073.905292] ? alloc_file+0x4d0/0x4d0 [ 1073.909110] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1073.914671] ? kasan_check_write+0x14/0x20 [ 1073.920420] __shmem_file_setup.part.0+0x108/0x2b0 [ 1073.925399] shmem_file_setup+0x66/0x90 [ 1073.929401] __x64_sys_memfd_create+0x2a2/0x470 [ 1073.934095] ? memfd_fcntl+0x1a50/0x1a50 [ 1073.938175] ? do_syscall_64+0x26/0x620 [ 1073.942180] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1073.946804] ? trace_hardirqs_on+0x67/0x220 [ 1073.951189] do_syscall_64+0xfd/0x620 [ 1073.955025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1073.960239] RIP: 0033:0x459829 [ 1073.963457] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1073.982382] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1073.990126] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1073.997420] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1074.004720] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1074.012014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0b1993d6d4 [ 1074.019307] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1074.035177] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1074.066355] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:07:40 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000005", 0x24) 22:07:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e4, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:40 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1074.149365] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:40 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:40 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0xc34, [0x0, 0x20000340, 0x20000f14, 0x20000f44], 0x0, &(0x7f0000000000), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{0x11, 0x10, 0x3, '\x00', 'bond0\x00', 'rose0\x00', 'erspan0\x00', @dev={[], 0x27}, [0xff, 0xff, 0x0, 0x0, 0xff], @random="cc06b62792bd", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xfe, 0x14e, 0x196, [@ip={'ip\x00', 0x20, {{@multicast2, @loopback, 0xffffffff, 0x0, 0x401, 0xeb, 0x20, 0x2, 0x4e23, 0x4e23, 0x4e21, 0x4e20}}}, @limit={'limit\x00', 0x20, {{0x1, 0x2a, 0x3ff, 0x10001, 0x7fffffff, 0x5}}}], [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x40, 'syz1\x00', 0x7}}}], @common=@ERROR={'ERROR\x00', 0x20, {"f193bcea6d0ffd4b34b6f7ed2328148cdbad3222183d243dee46a7254bdd"}}}, {0x11, 0x20, 0x8884, 'syzkaller1\x00', 'lapb0\x00', 'nr0\x00', 'netdevsim0\x00', @local, [0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0xff], 0x94e, 0x9d6, 0xa0e, [@m802_3={'802_3\x00', 0x8, {{0x4e, 0x6, 0x4, 0x4}}}, @among={'among\x00', 0x888, {{@zero, @offset, 0x2, {[0x42b7, 0x5, 0x80000001, 0x4, 0x9, 0x140000, 0x4, 0x800, 0x8, 0x0, 0x2, 0x7, 0x80, 0x9, 0x4, 0x2, 0x81, 0x401, 0xbb, 0x72, 0x69, 0xb281, 0x7, 0x8, 0x3, 0x2, 0x100000000, 0xffffffffffffff7f, 0x0, 0x0, 0x5, 0x80000001, 0x5, 0x4, 0x8, 0x5, 0xe2c, 0xc42, 0x3, 0x9, 0x3ff, 0x7f, 0x7, 0x7f, 0x7, 0xcf1, 0xffffffff, 0x20, 0xbe, 0x10001, 0xffff, 0x5, 0x4, 0xffffffff, 0x401, 0x94d, 0x7fffffff, 0x80, 0x6, 0x6, 0x2, 0x200, 0xffffffff00000001, 0x7, 0x2, 0x6e27, 0x9, 0xff, 0x5b63, 0x100000000, 0xffffffffffffffff, 0xd4, 0x9077, 0x80, 0x8, 0x40, 0x100000001, 0xfffffffffffffff8, 0x15, 0x0, 0x4, 0x0, 0x7, 0x9, 0x7, 0x80000000, 0x9, 0x1, 0x6, 0x8607, 0x9, 0x3f, 0x80, 0xffffffffffff0778, 0x7, 0x8, 0x5, 0x40000000000, 0xd9a, 0x4, 0x7f, 0x0, 0x7f, 0x0, 0x8, 0x6, 0x81, 0x8, 0x7, 0x7, 0x101, 0x0, 0x3, 0x3491, 0x9, 0x8, 0x0, 0x9, 0x0, 0xc0, 0xa27f, 0x7f, 0x2d3b, 0x7, 0x3, 0x1000, 0x400, 0x4, 0x6a, 0x8, 0xfffffffffffffffa, 0x40, 0x7, 0x1, 0x7fff, 0x5, 0xee, 0xfffffffffffffffd, 0x3, 0x2, 0x1, 0x0, 0xa182, 0x8, 0xfffffffffffffffe, 0x4, 0x0, 0x7, 0x0, 0x2, 0x4, 0x200, 0x0, 0x10001, 0x5, 0x6, 0x0, 0xfffffffffffffff7, 0x6, 0x2, 0x9, 0x3, 0x100000001, 0x1ff, 0xffffffffa67c94f0, 0x7, 0xfff, 0x9, 0x380000000000000, 0x3, 0x3, 0x4, 0x2, 0x0, 0x100000001, 0xf3d, 0x5, 0x100000001, 0x5, 0xfffffffffffffffc, 0x70e, 0x6, 0x6, 0x4, 0x0, 0x6, 0x5, 0x7, 0x40, 0xdd64, 0x1, 0x2, 0xffff, 0x6, 0x3, 0x0, 0x5, 0x9dc, 0x0, 0x1, 0x8, 0x101, 0xef89, 0x4, 0x2, 0x6a, 0x1000, 0x0, 0xfffffffffffffff7, 0xf2e, 0x6, 0x3, 0x9, 0x3, 0x80, 0x3f, 0x4, 0x5, 0x7, 0x0, 0xfff, 0x1, 0x9, 0x3, 0x3ff, 0x6, 0x80000001, 0x9618, 0x8, 0x6, 0x81, 0x3, 0x1, 0x3, 0x7, 0x7, 0x4, 0xff, 0x7fff, 0x2, 0x80, 0xb1, 0x10000, 0x6, 0xffffffff, 0x6, 0x3, 0x4, 0x6, 0x4, 0x1, 0x81, 0x7, 0x380000, 0x0, 0x2, 0xffff], 0x8, [{[0x4, 0x8], @empty}, {[0x9], @rand_addr=0x7}, {[0x2, 0x3], @loopback}, {[0x8f, 0xffffffff], @loopback}, {[0x7, 0x20], @loopback}, {[0x800000, 0x80], @broadcast}, {[0x8001, 0x344e], @remote}, {[0x0, 0x6], @rand_addr=0x5}]}, {[0x9, 0x0, 0x6, 0x2000000000000000, 0xdc, 0x7, 0x40, 0x1, 0x9, 0x1, 0x0, 0x2, 0x2, 0x6, 0x8, 0x7, 0x7, 0xa0, 0x7ff, 0x1000, 0x9, 0x1, 0x6, 0xff, 0x7, 0xe4, 0x10001, 0x3ff, 0xe52, 0x5, 0x6, 0x3, 0x10001, 0x800000000, 0xfffffffffffffffd, 0x0, 0x565, 0x8, 0x7, 0x1, 0x7, 0x1, 0x0, 0x8, 0x0, 0x0, 0x4, 0x90, 0x2ac, 0x8, 0x3, 0x0, 0x4, 0x43e5, 0x0, 0x1, 0x10001, 0x5, 0x7, 0x10000, 0x6, 0x8001, 0x1f, 0xa000000000000000, 0x5, 0x5, 0x40, 0x200, 0x81, 0x7, 0x1, 0x6, 0xe64, 0x7, 0x6, 0x5fd6, 0xffffffff, 0x0, 0x2, 0x9, 0x1f, 0x9, 0x3, 0x8, 0x273, 0x3, 0x101, 0x8, 0x1, 0x0, 0x1, 0x7, 0x0, 0x3, 0x3ff, 0x2, 0x3, 0x8, 0x3, 0x100, 0x0, 0x1ff, 0x20, 0x360, 0x0, 0x538ece7b, 0x7, 0x3, 0x2, 0x3, 0xffffffffffffff77, 0x8, 0x7fff, 0x8, 0x8, 0xffffffff, 0x2, 0x0, 0x5, 0x3, 0x3, 0x80000001, 0x100000001, 0x40400, 0x6, 0x4, 0x7f, 0x80000000, 0x3, 0x100000000, 0x100000000, 0x0, 0x1d4, 0x2, 0x5, 0x9, 0x8, 0x7, 0x2, 0x3, 0x20, 0x9, 0xbbd, 0x3, 0x2, 0x6, 0x6, 0x7, 0x6, 0x0, 0xfffffffffffeffff, 0x3a6, 0x7fffffff, 0x6, 0x1, 0x3ff, 0x7834, 0x4f99e050, 0x7, 0x44a, 0x1, 0x94f, 0x9, 0x185a094, 0x1000, 0x6, 0x7, 0xffffffffffffff01, 0x2, 0x0, 0x1ff, 0x1000, 0x6, 0xfffffffffffffffc, 0x1, 0x5, 0xe0, 0x2, 0xde, 0xffff, 0x7fffffff, 0x4914, 0x401, 0x1, 0x4, 0x7ff, 0x2, 0xffffffffffffffc1, 0x20, 0xc4, 0x1, 0x684, 0x2, 0x5, 0x4, 0x6dd, 0x10000, 0x7, 0x5, 0x74, 0x7fff, 0x1, 0x80, 0x3f, 0x2, 0x9bd, 0x6e, 0x0, 0x6, 0xffffffff, 0x1e9c4864, 0x4, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x7e77, 0x9, 0x0, 0x0, 0x7, 0x9, 0x10001, 0x5, 0x20a, 0x4, 0x10000, 0x81, 0xffffffff80000001, 0x3, 0x200, 0x80, 0x6, 0x1, 0xffffffffffffff91, 0xeea, 0x1, 0x9, 0xe0, 0x3f, 0x1, 0x5, 0x4, 0x80000000, 0x3, 0x4, 0xfffffffffffffff8, 0xfffffffffffffffd, 0xe2, 0x6, 0x800, 0x5, 0x234f, 0x400, 0x8, 0x4], 0x1, [{[0x0, 0x1000], @remote}]}}}}], [@common=@dnat={'dnat\x00', 0x10, {{@random="a46577d2d8e8", 0xfffffffffffffffd}}}, @common=@log={'log\x00', 0x28, {{0x0, "3a7c0a56b372a7ac8cf88365e27f2cec39588170d0d88d055c6f10829f18", 0x9}}}], @common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0xcac) [ 1074.294997] FAULT_INJECTION: forcing a failure. [ 1074.294997] name failslab, interval 1, probability 0, space 0, times 0 22:07:40 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000006", 0x24) [ 1074.352544] FAULT_INJECTION: forcing a failure. [ 1074.352544] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.354247] CPU: 0 PID: 1610 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1074.371035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.380413] Call Trace: [ 1074.380438] dump_stack+0x172/0x1f0 [ 1074.380457] should_fail.cold+0xa/0x1b [ 1074.380475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1074.380489] ? lock_downgrade+0x810/0x810 [ 1074.380514] __should_failslab+0x121/0x190 [ 1074.390630] should_failslab+0x9/0x14 [ 1074.390647] kmem_cache_alloc+0x2ae/0x700 [ 1074.390666] ? notify_change+0x6d5/0xfb0 [ 1074.416167] ? do_sys_ftruncate+0x41e/0x550 [ 1074.420508] getname_flags+0xd6/0x5b0 [ 1074.424327] getname+0x1a/0x20 [ 1074.427533] do_sys_open+0x2c9/0x550 [ 1074.431266] ? filp_open+0x80/0x80 [ 1074.434833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1074.439602] ? do_syscall_64+0x26/0x620 [ 1074.443639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.449012] ? do_syscall_64+0x26/0x620 [ 1074.453002] __x64_sys_open+0x7e/0xc0 [ 1074.456850] do_syscall_64+0xfd/0x620 [ 1074.460660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.465856] RIP: 0033:0x413711 [ 1074.469072] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1074.487993] RSP: 002b:00007f0b1993ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1074.495720] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1074.503008] RDX: 00007f0b1993cb0a RSI: 0000000000000002 RDI: 00007f0b1993cb00 [ 1074.510284] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1074.517564] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1074.524849] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1074.542904] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1074.554354] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1074.565297] CPU: 1 PID: 1612 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1074.572277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.572286] Call Trace: [ 1074.572319] dump_stack+0x172/0x1f0 [ 1074.572344] should_fail.cold+0xa/0x1b [ 1074.591826] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1074.596982] ? lock_downgrade+0x810/0x810 [ 1074.601182] __should_failslab+0x121/0x190 [ 1074.601208] should_failslab+0x9/0x14 [ 1074.609283] kmem_cache_alloc+0x2ae/0x700 [ 1074.613472] ? __save_stack_trace+0x99/0x100 [ 1074.617941] __alloc_file+0x27/0x330 [ 1074.621716] alloc_empty_file+0x72/0x170 [ 1074.625830] path_openat+0xef/0x45e0 [ 1074.629587] ? __lock_acquire+0x6ee/0x49c0 [ 1074.633860] ? getname+0x1a/0x20 [ 1074.637265] ? do_sys_open+0x2c9/0x550 [ 1074.641189] ? __x64_sys_open+0x7e/0xc0 [ 1074.645208] ? do_syscall_64+0xfd/0x620 [ 1074.649202] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.654615] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1074.659306] ? __lock_is_held+0xb6/0x140 [ 1074.663399] ? __alloc_fd+0x44d/0x560 [ 1074.667222] do_filp_open+0x1a1/0x280 [ 1074.671045] ? may_open_dev+0x100/0x100 [ 1074.675038] ? lock_downgrade+0x810/0x810 [ 1074.679209] ? kasan_check_read+0x11/0x20 [ 1074.683371] ? do_raw_spin_unlock+0x57/0x270 [ 1074.687800] ? _raw_spin_unlock+0x2d/0x50 [ 1074.691973] ? __alloc_fd+0x44d/0x560 [ 1074.695842] do_sys_open+0x3fe/0x550 [ 1074.699584] ? filp_open+0x80/0x80 [ 1074.703155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1074.707933] ? do_syscall_64+0x26/0x620 [ 1074.711940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.717337] ? do_syscall_64+0x26/0x620 [ 1074.721339] __x64_sys_open+0x7e/0xc0 [ 1074.725180] do_syscall_64+0xfd/0x620 [ 1074.729013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1074.734225] RIP: 0033:0x413711 22:07:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e5, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1074.737433] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1074.756362] RSP: 002b:00007f8a8415ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1074.764116] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1074.771494] RDX: 00007f8a8415bb0a RSI: 0000000000000002 RDI: 00007f8a8415bb00 [ 1074.778789] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1074.786078] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1074.793374] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:40 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) write(r0, &(0x7f00000000c0)="2400000052003c0014f9f407112c04091c0007ed020001000a775e0020000900000000000000", 0xfffffffffffffefe) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 22:07:40 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:40 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000008", 0x24) 22:07:40 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1075.022546] FAULT_INJECTION: forcing a failure. [ 1075.022546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.034417] CPU: 1 PID: 1640 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1075.041384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.050781] Call Trace: [ 1075.053417] dump_stack+0x172/0x1f0 [ 1075.057109] should_fail.cold+0xa/0x1b [ 1075.061044] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1075.066177] ? mark_held_locks+0x100/0x100 [ 1075.070442] __alloc_pages_nodemask+0x1ee/0x750 [ 1075.075140] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1075.080198] ? find_held_lock+0x35/0x130 [ 1075.084297] cache_grow_begin+0x91/0x8c0 [ 1075.088384] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1075.093955] ? check_preemption_disabled+0x48/0x290 [ 1075.099010] kmem_cache_alloc+0x63b/0x700 [ 1075.103321] ? notify_change+0x6d5/0xfb0 [ 1075.107402] ? do_sys_ftruncate+0x41e/0x550 [ 1075.111747] getname_flags+0xd6/0x5b0 [ 1075.115571] getname+0x1a/0x20 [ 1075.118779] do_sys_open+0x2c9/0x550 [ 1075.122523] ? filp_open+0x80/0x80 [ 1075.126087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1075.130958] ? do_syscall_64+0x26/0x620 [ 1075.134959] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.140349] ? do_syscall_64+0x26/0x620 [ 1075.144362] __x64_sys_open+0x7e/0xc0 [ 1075.148195] do_syscall_64+0xfd/0x620 [ 1075.152021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.157228] RIP: 0033:0x413711 [ 1075.160438] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1075.179360] RSP: 002b:00007f0b1993ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1075.187102] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1075.194487] RDX: 00007f0b1993cb0a RSI: 0000000000000002 RDI: 00007f0b1993cb00 [ 1075.201783] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1075.209083] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1075.216468] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:41 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x50}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e24, @loopback}}, [0x2, 0x4, 0x4, 0x6ebd, 0xffffffffffff41fe, 0x3, 0x10000, 0x1, 0x4, 0x8, 0x6, 0x8c, 0x1, 0xf0e, 0xca8]}, &(0x7f00000001c0)=0x100) write(0xffffffffffffffff, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e6, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1075.264479] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:41 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000009", 0x24) 22:07:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xa0010000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:41 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000000c0)=""/210, &(0x7f00000001c0)=0xd2) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000002c0)={0x1, &(0x7f0000000340)=""/180, &(0x7f0000000080)=[{0x200, 0x1000, 0x2, &(0x7f0000000400)=""/4096}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001400)={0x5, 0x3, 0x820c, 0x2, 0x5, 0x25, 0x0, 0xffffffffffff7fff, 0x0}, &(0x7f0000001440)=0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001480)={r3, 0x6, 0x1, [0x81]}, &(0x7f00000014c0)=0xa) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000040)=0x268) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xbac, @null, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) [ 1075.405862] FAULT_INJECTION: forcing a failure. [ 1075.405862] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.437356] CPU: 0 PID: 1655 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1075.444355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.454171] Call Trace: [ 1075.456790] dump_stack+0x172/0x1f0 [ 1075.460431] should_fail.cold+0xa/0x1b [ 1075.464355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1075.469478] ? lock_downgrade+0x810/0x810 [ 1075.473654] __should_failslab+0x121/0x190 [ 1075.477904] should_failslab+0x9/0x14 [ 1075.481721] kmem_cache_alloc_trace+0x2cc/0x760 [ 1075.486416] ? __lockdep_init_map+0x10c/0x5b0 [ 1075.490948] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1075.495742] __kthread_create_on_node+0xf2/0x460 [ 1075.500510] ? lock_acquire+0x16f/0x3f0 [ 1075.504497] ? __kthread_parkme+0x1b0/0x1b0 [ 1075.508848] ? lo_ioctl+0x1c4/0x20e0 [ 1075.512563] ? lock_downgrade+0x810/0x810 [ 1075.516721] ? mutex_trylock+0x1e0/0x1e0 [ 1075.520791] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1075.525555] kthread_create_on_node+0xbb/0xf0 [ 1075.530058] ? __kthread_create_on_node+0x460/0x460 [ 1075.535089] ? __lockdep_init_map+0x10c/0x5b0 [ 1075.539595] ? __lockdep_init_map+0x10c/0x5b0 [ 1075.544115] lo_ioctl+0xaf2/0x20e0 [ 1075.547667] ? lo_rw_aio_complete+0x350/0x350 [ 1075.552190] blkdev_ioctl+0xc38/0x1ab6 [ 1075.556088] ? blkpg_ioctl+0xa90/0xa90 [ 1075.559986] ? find_held_lock+0x35/0x130 [ 1075.564058] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1075.568851] ? __fget+0x340/0x540 [ 1075.572318] block_ioctl+0xee/0x130 [ 1075.575944] ? blkdev_fallocate+0x410/0x410 [ 1075.580280] do_vfs_ioctl+0xd5f/0x1380 [ 1075.584188] ? selinux_file_ioctl+0x46f/0x5e0 [ 1075.588690] ? selinux_file_ioctl+0x125/0x5e0 [ 1075.593206] ? ioctl_preallocate+0x210/0x210 [ 1075.597621] ? selinux_file_mprotect+0x620/0x620 [ 1075.602398] ? iterate_fd+0x360/0x360 [ 1075.606211] ? do_sys_open+0x31d/0x550 [ 1075.610113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1075.615670] ? security_file_ioctl+0x8d/0xc0 [ 1075.620102] ksys_ioctl+0xab/0xd0 [ 1075.623570] __x64_sys_ioctl+0x73/0xb0 [ 1075.627484] do_syscall_64+0xfd/0x620 [ 1075.631311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.636517] RIP: 0033:0x459697 22:07:41 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1075.639724] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.660547] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.668773] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1075.676062] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1075.683453] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1075.690740] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1075.698037] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e7, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:41 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1075.857509] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1075.863409] FAULT_INJECTION: forcing a failure. [ 1075.863409] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.878454] CPU: 0 PID: 1672 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1075.885434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.894803] Call Trace: [ 1075.894832] dump_stack+0x172/0x1f0 [ 1075.894850] should_fail.cold+0xa/0x1b [ 1075.894865] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1075.894877] ? lock_downgrade+0x810/0x810 [ 1075.914761] __should_failslab+0x121/0x190 [ 1075.920120] should_failslab+0x9/0x14 [ 1075.923943] kmem_cache_alloc+0x2ae/0x700 [ 1075.928121] ? __save_stack_trace+0x99/0x100 [ 1075.932574] __alloc_file+0x27/0x330 [ 1075.936314] alloc_empty_file+0x72/0x170 [ 1075.936335] path_openat+0xef/0x45e0 [ 1075.936355] ? __lock_acquire+0x6ee/0x49c0 [ 1075.948473] ? getname+0x1a/0x20 [ 1075.951864] ? do_sys_open+0x2c9/0x550 [ 1075.955773] ? __x64_sys_open+0x7e/0xc0 [ 1075.959797] ? do_syscall_64+0xfd/0x620 [ 1075.963795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.969208] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1075.973905] ? __lock_is_held+0xb6/0x140 [ 1075.973931] ? __alloc_fd+0x44d/0x560 [ 1075.973959] do_filp_open+0x1a1/0x280 [ 1075.985638] ? may_open_dev+0x100/0x100 [ 1075.989633] ? lock_downgrade+0x810/0x810 [ 1075.993804] ? kasan_check_read+0x11/0x20 [ 1075.997991] ? do_raw_spin_unlock+0x57/0x270 [ 1076.002441] ? _raw_spin_unlock+0x2d/0x50 [ 1076.006611] ? __alloc_fd+0x44d/0x560 [ 1076.010455] do_sys_open+0x3fe/0x550 [ 1076.014192] ? filp_open+0x80/0x80 [ 1076.017764] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1076.022545] ? do_syscall_64+0x26/0x620 [ 1076.026536] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.031936] ? do_syscall_64+0x26/0x620 [ 1076.035970] __x64_sys_open+0x7e/0xc0 [ 1076.039797] do_syscall_64+0xfd/0x620 [ 1076.043631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.048840] RIP: 0033:0x413711 [ 1076.052065] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1076.071082] RSP: 002b:00007f0b1993ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1076.078830] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1076.086123] RDX: 00007f0b1993cb0a RSI: 0000000000000002 RDI: 00007f0b1993cb00 [ 1076.093436] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1076.100720] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 22:07:42 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000000a", 0x24) [ 1076.108002] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:42 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x7fff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xf4, 0x8000) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000180)={@multicast2, @broadcast}, &(0x7f00000001c0)=0x8) r2 = socket(0x20000000001f, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f00000000c0)={0x3, @remote}) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) 22:07:42 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e8, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1076.202114] FAULT_INJECTION: forcing a failure. [ 1076.202114] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.222379] CPU: 0 PID: 1686 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1076.229451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.238829] Call Trace: [ 1076.241446] dump_stack+0x172/0x1f0 [ 1076.245097] should_fail.cold+0xa/0x1b [ 1076.249017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1076.254239] ? lock_downgrade+0x810/0x810 [ 1076.258418] __should_failslab+0x121/0x190 [ 1076.262677] should_failslab+0x9/0x14 [ 1076.266594] kmem_cache_alloc_trace+0x2cc/0x760 [ 1076.271327] ? __lockdep_init_map+0x10c/0x5b0 [ 1076.275860] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1076.280676] __kthread_create_on_node+0xf2/0x460 [ 1076.285454] ? lock_acquire+0x16f/0x3f0 [ 1076.289447] ? __kthread_parkme+0x1b0/0x1b0 [ 1076.293788] ? lo_ioctl+0x1c4/0x20e0 [ 1076.297510] ? lock_downgrade+0x810/0x810 [ 1076.301794] ? mutex_trylock+0x1e0/0x1e0 [ 1076.305886] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1076.310670] kthread_create_on_node+0xbb/0xf0 [ 1076.315198] ? __kthread_create_on_node+0x460/0x460 [ 1076.320241] ? __lockdep_init_map+0x10c/0x5b0 [ 1076.324766] ? __lockdep_init_map+0x10c/0x5b0 [ 1076.329292] lo_ioctl+0xaf2/0x20e0 [ 1076.332860] ? lo_rw_aio_complete+0x350/0x350 [ 1076.337383] blkdev_ioctl+0xc38/0x1ab6 [ 1076.341296] ? blkpg_ioctl+0xa90/0xa90 [ 1076.345208] ? find_held_lock+0x35/0x130 [ 1076.349311] ? debug_check_no_obj_freed+0x200/0x464 [ 1076.354348] ? __fget+0x340/0x540 [ 1076.357819] block_ioctl+0xee/0x130 [ 1076.361453] ? blkdev_fallocate+0x410/0x410 [ 1076.365795] do_vfs_ioctl+0xd5f/0x1380 [ 1076.369707] ? selinux_file_ioctl+0x46f/0x5e0 [ 1076.374216] ? selinux_file_ioctl+0x125/0x5e0 [ 1076.378747] ? ioctl_preallocate+0x210/0x210 [ 1076.383173] ? selinux_file_mprotect+0x620/0x620 [ 1076.387959] ? iterate_fd+0x360/0x360 [ 1076.391784] ? do_sys_open+0x31d/0x550 [ 1076.395705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1076.401270] ? security_file_ioctl+0x8d/0xc0 [ 1076.405725] ksys_ioctl+0xab/0xd0 [ 1076.409207] __x64_sys_ioctl+0x73/0xb0 [ 1076.413135] do_syscall_64+0xfd/0x620 [ 1076.416968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.422201] RIP: 0033:0x459697 [ 1076.425415] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1076.444344] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:07:42 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000000b", 0x24) 22:07:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1076.452170] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1076.459467] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1076.466760] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1076.474052] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1076.481345] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:42 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:42 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) [ 1076.657930] FAULT_INJECTION: forcing a failure. [ 1076.657930] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.677034] __ntfs_warning: 11 callbacks suppressed [ 1076.677055] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:07:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001e9, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1076.793824] CPU: 0 PID: 1704 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1076.795608] FAULT_INJECTION: forcing a failure. [ 1076.795608] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.800824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.800833] Call Trace: [ 1076.800862] dump_stack+0x172/0x1f0 [ 1076.800885] should_fail.cold+0xa/0x1b [ 1076.800908] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1076.800925] ? lock_downgrade+0x810/0x810 [ 1076.800966] __should_failslab+0x121/0x190 [ 1076.800990] should_failslab+0x9/0x14 [ 1076.801009] kmem_cache_alloc+0x2ae/0x700 [ 1076.801036] ? rcu_read_lock_sched_held+0x110/0x130 [ 1076.801057] selinux_file_alloc_security+0xb4/0x190 [ 1076.801080] security_file_alloc+0x63/0xa0 [ 1076.801101] __alloc_file+0xcf/0x330 [ 1076.801120] alloc_empty_file+0x72/0x170 [ 1076.801156] path_openat+0xef/0x45e0 [ 1076.880035] ? __lock_acquire+0x6ee/0x49c0 [ 1076.884289] ? getname+0x1a/0x20 [ 1076.887672] ? do_sys_open+0x2c9/0x550 [ 1076.890839] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1076.900154] ? __x64_sys_open+0x7e/0xc0 [ 1076.900171] ? do_syscall_64+0xfd/0x620 [ 1076.900199] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.900233] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1076.900248] ? __lock_is_held+0xb6/0x140 [ 1076.900262] ? find_held_lock+0x35/0x130 [ 1076.900282] ? find_held_lock+0x35/0x130 [ 1076.900296] ? __alloc_fd+0x44d/0x560 [ 1076.900315] do_filp_open+0x1a1/0x280 [ 1076.900334] ? may_open_dev+0x100/0x100 [ 1076.900351] ? lock_downgrade+0x810/0x810 [ 1076.900374] ? kasan_check_read+0x11/0x20 [ 1076.950578] ? do_raw_spin_unlock+0x57/0x270 [ 1076.955022] ? _raw_spin_unlock+0x2d/0x50 [ 1076.959196] ? __alloc_fd+0x44d/0x560 [ 1076.963050] do_sys_open+0x3fe/0x550 [ 1076.966224] ntfs: (device loop4): parse_options(): NLS character set [ 1076.966224] p852 not found. Using previous one utf8. [ 1076.966795] ? filp_open+0x80/0x80 [ 1076.981910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1076.986699] ? do_syscall_64+0x26/0x620 22:07:43 executing program 2: r0 = socket(0xa, 0xf, 0xffffffffffff8c59) write(r0, &(0x7f0000000140)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000a9c2d6", 0xfffffffffffffe37) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xbebad19af547333a, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x36, 0x1a, 0x10, 0xe, 0xb, 0x9, 0x5, 0x153, 0xffffffffffffffff}}) [ 1076.990700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1076.996106] ? do_syscall_64+0x26/0x620 [ 1077.000124] __x64_sys_open+0x7e/0xc0 [ 1077.000324] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1077.003974] do_syscall_64+0xfd/0x620 [ 1077.003997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.004014] RIP: 0033:0x413711 [ 1077.023580] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1077.042511] RSP: 002b:00007f0b1993ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1077.050249] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1077.057544] RDX: 00007f0b1993cb0a RSI: 0000000000000002 RDI: 00007f0b1993cb00 [ 1077.064856] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1077.072183] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1077.079488] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1077.086823] CPU: 1 PID: 1711 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1077.093788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.103166] Call Trace: [ 1077.105794] dump_stack+0x172/0x1f0 [ 1077.109449] should_fail.cold+0xa/0x1b [ 1077.113386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1077.118540] ? lock_downgrade+0x810/0x810 [ 1077.122756] __should_failslab+0x121/0x190 [ 1077.127038] should_failslab+0x9/0x14 [ 1077.130921] kmem_cache_alloc+0x2ae/0x700 [ 1077.135110] ? __lock_acquire+0x6ee/0x49c0 [ 1077.139400] __kernfs_new_node+0xef/0x680 [ 1077.143583] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1077.148366] ? __lock_acquire+0x6ee/0x49c0 [ 1077.152633] ? __lock_is_held+0xb6/0x140 [ 1077.156735] kernfs_new_node+0x99/0x130 [ 1077.160734] kernfs_create_dir_ns+0x52/0x160 [ 1077.165179] internal_create_group+0x1cb/0xc30 [ 1077.169780] ? bd_set_size+0x89/0xb0 [ 1077.173531] ? remove_files.isra.0+0x190/0x190 [ 1077.178158] sysfs_create_group+0x20/0x30 [ 1077.182333] lo_ioctl+0xf8f/0x20e0 [ 1077.185906] ? lo_rw_aio_complete+0x350/0x350 [ 1077.190427] blkdev_ioctl+0xc38/0x1ab6 [ 1077.194363] ? blkpg_ioctl+0xa90/0xa90 [ 1077.198269] ? find_held_lock+0x35/0x130 [ 1077.202356] ? debug_check_no_obj_freed+0x200/0x464 [ 1077.207584] ? __fget+0x340/0x540 [ 1077.211067] block_ioctl+0xee/0x130 [ 1077.214708] ? blkdev_fallocate+0x410/0x410 [ 1077.219048] do_vfs_ioctl+0xd5f/0x1380 [ 1077.222954] ? selinux_file_ioctl+0x46f/0x5e0 [ 1077.227469] ? selinux_file_ioctl+0x125/0x5e0 [ 1077.231985] ? ioctl_preallocate+0x210/0x210 [ 1077.236411] ? selinux_file_mprotect+0x620/0x620 [ 1077.241195] ? iterate_fd+0x360/0x360 [ 1077.245012] ? do_sys_open+0x31d/0x550 [ 1077.248923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1077.254507] ? security_file_ioctl+0x8d/0xc0 [ 1077.258940] ksys_ioctl+0xab/0xd0 [ 1077.262429] __x64_sys_ioctl+0x73/0xb0 [ 1077.266440] do_syscall_64+0xfd/0x620 [ 1077.270265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.275487] RIP: 0033:0x459697 22:07:43 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000000c", 0x24) 22:07:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001ea, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1077.278686] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1077.297606] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.305339] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1077.312623] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1077.319904] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1077.327193] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1077.334482] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:43 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1077.414453] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:07:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:43 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000000e", 0x24) 22:07:43 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xd8010000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1077.622940] FAULT_INJECTION: forcing a failure. [ 1077.622940] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.634658] CPU: 0 PID: 1746 Comm: syz-executor.0 Not tainted 4.19.66 #40 [ 1077.641877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.651347] Call Trace: [ 1077.651928] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1077.653979] dump_stack+0x172/0x1f0 [ 1077.666271] should_fail.cold+0xa/0x1b [ 1077.670181] ? is_bpf_text_address+0xd3/0x170 [ 1077.674711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1077.679840] ? __kernel_text_address+0xd/0x40 [ 1077.684379] ? unwind_get_return_address+0x61/0xa0 [ 1077.689338] __should_failslab+0x121/0x190 [ 1077.693597] should_failslab+0x9/0x14 [ 1077.697501] kmem_cache_alloc+0x47/0x700 [ 1077.701594] ? save_stack+0xa9/0xd0 [ 1077.705250] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 1077.710902] idr_get_free+0x50f/0xa13 [ 1077.714730] idr_alloc_u32+0x1d6/0x390 [ 1077.718733] ? __fprop_inc_percpu_max+0x230/0x230 [ 1077.723613] ? __lock_is_held+0xb6/0x140 [ 1077.727714] ? should_fail+0x14d/0x85c [ 1077.731673] ? __lock_is_held+0xb6/0x140 [ 1077.735797] idr_alloc_cyclic+0x132/0x270 [ 1077.740035] ? idr_alloc+0x150/0x150 [ 1077.743786] ? kasan_check_write+0x14/0x20 [ 1077.748167] ? do_raw_spin_lock+0xc8/0x240 [ 1077.752457] __kernfs_new_node+0x171/0x680 [ 1077.756730] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1077.761516] ? __lock_acquire+0x6ee/0x49c0 [ 1077.765766] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1077.770280] ? __schedule+0x1495/0x1dc0 [ 1077.774272] ? __lock_is_held+0xb6/0x140 [ 1077.778357] kernfs_new_node+0x99/0x130 [ 1077.782363] kernfs_create_dir_ns+0x52/0x160 [ 1077.786795] internal_create_group+0x1cb/0xc30 [ 1077.791410] ? bd_set_size+0x89/0xb0 [ 1077.795152] ? remove_files.isra.0+0x190/0x190 [ 1077.799775] sysfs_create_group+0x20/0x30 [ 1077.803964] lo_ioctl+0xf8f/0x20e0 [ 1077.807551] ? lo_rw_aio_complete+0x350/0x350 [ 1077.812103] blkdev_ioctl+0xc38/0x1ab6 [ 1077.816118] ? blkpg_ioctl+0xa90/0xa90 [ 1077.820027] ? find_held_lock+0x35/0x130 [ 1077.824114] ? debug_check_no_obj_freed+0x200/0x464 [ 1077.829340] ? __fget+0x340/0x540 [ 1077.832825] block_ioctl+0xee/0x130 [ 1077.836474] ? blkdev_fallocate+0x410/0x410 [ 1077.840821] do_vfs_ioctl+0xd5f/0x1380 [ 1077.844746] ? selinux_file_ioctl+0x46f/0x5e0 [ 1077.849278] ? selinux_file_ioctl+0x125/0x5e0 [ 1077.853915] ? ioctl_preallocate+0x210/0x210 [ 1077.858344] ? selinux_file_mprotect+0x620/0x620 [ 1077.863131] ? iterate_fd+0x360/0x360 [ 1077.867040] ? do_sys_open+0x31d/0x550 [ 1077.870963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1077.876518] ? security_file_ioctl+0x8d/0xc0 [ 1077.880947] ksys_ioctl+0xab/0xd0 [ 1077.884433] __x64_sys_ioctl+0x73/0xb0 [ 1077.888345] do_syscall_64+0xfd/0x620 [ 1077.892178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1077.897391] RIP: 0033:0x459697 [ 1077.900609] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:07:43 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000000f", 0x24) 22:07:43 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) [ 1077.920372] RSP: 002b:00007f8a8415ba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.928109] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1077.935405] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1077.942695] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1077.950073] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1077.957375] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001eb, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1077.978895] FAULT_INJECTION: forcing a failure. [ 1077.978895] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.005350] CPU: 0 PID: 1748 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1078.012342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.021721] Call Trace: [ 1078.024346] dump_stack+0x172/0x1f0 [ 1078.028024] should_fail.cold+0xa/0x1b [ 1078.031977] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1078.037141] ? lock_downgrade+0x810/0x810 [ 1078.041364] __should_failslab+0x121/0x190 [ 1078.045664] should_failslab+0x9/0x14 [ 1078.049520] kmem_cache_alloc_trace+0x2cc/0x760 [ 1078.054260] ? __lockdep_init_map+0x10c/0x5b0 [ 1078.058803] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1078.063610] __kthread_create_on_node+0xf2/0x460 [ 1078.068571] ? lock_acquire+0x16f/0x3f0 [ 1078.072569] ? __kthread_parkme+0x1b0/0x1b0 [ 1078.077005] ? lo_ioctl+0x1c4/0x20e0 [ 1078.080731] ? lock_downgrade+0x810/0x810 [ 1078.084893] ? mutex_trylock+0x1e0/0x1e0 [ 1078.088970] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1078.093747] kthread_create_on_node+0xbb/0xf0 [ 1078.098251] ? __kthread_create_on_node+0x460/0x460 [ 1078.103292] ? __lockdep_init_map+0x10c/0x5b0 [ 1078.107804] ? __lockdep_init_map+0x10c/0x5b0 [ 1078.112319] lo_ioctl+0xaf2/0x20e0 [ 1078.115880] ? lo_rw_aio_complete+0x350/0x350 [ 1078.120388] blkdev_ioctl+0xc38/0x1ab6 [ 1078.124284] ? blkpg_ioctl+0xa90/0xa90 [ 1078.128184] ? find_held_lock+0x35/0x130 [ 1078.132257] ? debug_check_no_obj_freed+0x200/0x464 [ 1078.137292] ? __fget+0x340/0x540 [ 1078.140766] block_ioctl+0xee/0x130 [ 1078.144488] ? blkdev_fallocate+0x410/0x410 [ 1078.148824] do_vfs_ioctl+0xd5f/0x1380 [ 1078.152720] ? selinux_file_ioctl+0x46f/0x5e0 [ 1078.157223] ? selinux_file_ioctl+0x125/0x5e0 [ 1078.161733] ? ioctl_preallocate+0x210/0x210 [ 1078.166162] ? selinux_file_mprotect+0x620/0x620 [ 1078.170962] ? iterate_fd+0x360/0x360 [ 1078.174792] ? do_sys_open+0x31d/0x550 [ 1078.178705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1078.184258] ? security_file_ioctl+0x8d/0xc0 [ 1078.188685] ksys_ioctl+0xab/0xd0 [ 1078.192160] __x64_sys_ioctl+0x73/0xb0 [ 1078.196063] do_syscall_64+0xfd/0x620 [ 1078.199890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.205097] RIP: 0033:0x459697 [ 1078.208820] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.227742] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.235804] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1078.243094] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1078.250386] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1078.257675] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1078.264975] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1078.356786] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1078.370795] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:07:44 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1078.404243] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:44 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000010", 0x24) 22:07:44 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x7fffffff, 0x2}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, &(0x7f0000000000)=0x3) 22:07:44 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1078.478652] ntfs: (device loop4): parse_options(): NLS character set [ 1078.478652] p852 not found. Using previous one utf8. [ 1078.507819] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1078.583689] FAULT_INJECTION: forcing a failure. [ 1078.583689] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.602969] CPU: 0 PID: 1774 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1078.609985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.619364] Call Trace: [ 1078.621985] dump_stack+0x172/0x1f0 [ 1078.625646] should_fail.cold+0xa/0x1b [ 1078.629563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1078.634687] ? lock_downgrade+0x810/0x810 [ 1078.638864] __should_failslab+0x121/0x190 [ 1078.643126] should_failslab+0x9/0x14 [ 1078.646938] kmem_cache_alloc+0x2ae/0x700 [ 1078.651108] ? __schedule+0x1495/0x1dc0 [ 1078.655115] __kernfs_new_node+0xef/0x680 [ 1078.659282] ? _raw_spin_unlock_irq+0x28/0x90 [ 1078.663911] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1078.668883] ? __lock_acquire+0x6ee/0x49c0 [ 1078.673139] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1078.677652] ? __schedule+0x1495/0x1dc0 [ 1078.681644] ? __lock_is_held+0xb6/0x140 [ 1078.685732] kernfs_new_node+0x99/0x130 [ 1078.689726] kernfs_create_dir_ns+0x52/0x160 [ 1078.694157] internal_create_group+0x1cb/0xc30 [ 1078.698757] ? bd_set_size+0x89/0xb0 [ 1078.702495] ? remove_files.isra.0+0x190/0x190 [ 1078.707118] sysfs_create_group+0x20/0x30 [ 1078.711288] lo_ioctl+0xf8f/0x20e0 [ 1078.714847] ? lo_rw_aio_complete+0x350/0x350 [ 1078.719357] blkdev_ioctl+0xc38/0x1ab6 [ 1078.723262] ? blkpg_ioctl+0xa90/0xa90 [ 1078.727168] ? find_held_lock+0x35/0x130 [ 1078.731256] ? debug_check_no_obj_freed+0x200/0x464 [ 1078.736295] ? __fget+0x340/0x540 [ 1078.739769] block_ioctl+0xee/0x130 [ 1078.743405] ? blkdev_fallocate+0x410/0x410 [ 1078.747740] do_vfs_ioctl+0xd5f/0x1380 [ 1078.751646] ? selinux_file_ioctl+0x46f/0x5e0 [ 1078.756162] ? selinux_file_ioctl+0x125/0x5e0 [ 1078.760707] ? ioctl_preallocate+0x210/0x210 [ 1078.765142] ? selinux_file_mprotect+0x620/0x620 [ 1078.769927] ? iterate_fd+0x360/0x360 [ 1078.773764] ? do_sys_open+0x31d/0x550 [ 1078.777676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1078.783250] ? security_file_ioctl+0x8d/0xc0 [ 1078.787692] ksys_ioctl+0xab/0xd0 [ 1078.791344] __x64_sys_ioctl+0x73/0xb0 [ 1078.795248] do_syscall_64+0xfd/0x620 [ 1078.799061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1078.804256] RIP: 0033:0x459697 [ 1078.807471] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:07:44 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000060", 0x24) 22:07:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001ec, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1078.827915] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.835665] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1078.842963] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1078.850250] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1078.857538] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1078.864825] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1078.909207] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1078.944979] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1078.954416] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:45 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000e0", 0x24) 22:07:45 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000000140)=0xe8) connect$can_bcm(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xffff, 0xe0, 0x3d, 0x8c, 0x7f}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r2, 0x7ca5, 0x3, 0x6, 0xac1, 0x200}, &(0x7f0000000280)=0x14) 22:07:45 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001ed, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1079.138387] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:07:45 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000f0", 0x24) 22:07:45 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='\neiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1079.243690] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1079.266422] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1079.281376] FAULT_INJECTION: forcing a failure. [ 1079.281376] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.325869] CPU: 1 PID: 1819 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1079.332875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.342271] Call Trace: [ 1079.344920] dump_stack+0x172/0x1f0 [ 1079.348589] should_fail.cold+0xa/0x1b [ 1079.352513] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1079.357671] ? lock_downgrade+0x810/0x810 [ 1079.361942] __should_failslab+0x121/0x190 [ 1079.366206] should_failslab+0x9/0x14 [ 1079.370030] kmem_cache_alloc+0x2ae/0x700 [ 1079.374203] ? find_held_lock+0x35/0x130 [ 1079.378287] ? kernfs_activate+0x192/0x1f0 [ 1079.382565] __kernfs_new_node+0xef/0x680 [ 1079.386744] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1079.391523] ? lock_downgrade+0x810/0x810 [ 1079.395700] ? kasan_check_write+0x14/0x20 [ 1079.399961] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1079.404839] ? wait_for_completion+0x440/0x440 [ 1079.409460] kernfs_new_node+0x99/0x130 [ 1079.413461] __kernfs_create_file+0x51/0x33b [ 1079.417895] sysfs_add_file_mode_ns+0x222/0x560 [ 1079.422601] internal_create_group+0x383/0xc30 [ 1079.427212] ? bd_set_size+0x89/0xb0 [ 1079.430975] ? remove_files.isra.0+0x190/0x190 [ 1079.435593] sysfs_create_group+0x20/0x30 [ 1079.439756] lo_ioctl+0xf8f/0x20e0 [ 1079.443314] ? lo_rw_aio_complete+0x350/0x350 [ 1079.447815] blkdev_ioctl+0xc38/0x1ab6 [ 1079.451713] ? blkpg_ioctl+0xa90/0xa90 [ 1079.455606] ? find_held_lock+0x35/0x130 [ 1079.459674] ? debug_check_no_obj_freed+0x200/0x464 [ 1079.464703] ? __fget+0x340/0x540 [ 1079.468176] block_ioctl+0xee/0x130 [ 1079.471812] ? blkdev_fallocate+0x410/0x410 [ 1079.476170] do_vfs_ioctl+0xd5f/0x1380 [ 1079.480167] ? selinux_file_ioctl+0x46f/0x5e0 [ 1079.484691] ? selinux_file_ioctl+0x125/0x5e0 [ 1079.489222] ? ioctl_preallocate+0x210/0x210 [ 1079.493648] ? selinux_file_mprotect+0x620/0x620 [ 1079.498434] ? iterate_fd+0x360/0x360 [ 1079.502263] ? do_sys_open+0x31d/0x550 [ 1079.506180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1079.511748] ? security_file_ioctl+0x8d/0xc0 [ 1079.516459] ksys_ioctl+0xab/0xd0 [ 1079.519969] __x64_sys_ioctl+0x73/0xb0 [ 1079.523903] do_syscall_64+0xfd/0x620 [ 1079.527780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1079.533001] RIP: 0033:0x459697 [ 1079.536215] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1079.555401] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1079.563156] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1079.570547] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1079.577839] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1079.585135] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1079.592443] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:45 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000000c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000080)=0xed, 0x4) r1 = socket(0x5, 0x80000, 0x697) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x1) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x180000}, 0xf) [ 1079.623799] ntfs: (device loop4): parse_options(): NLS character set [ 1079.623799] p852 not found. Using previous one utf8. 22:07:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001ee, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1079.687788] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1079.716032] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1079.807432] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:07:45 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000a0", 0x24) 22:07:45 executing program 2: r0 = socket(0x200000000010, 0x1, 0x4800000000000) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000005c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000700)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000800)=0xe8) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x5, r2}, {0x2, 0x6, r3}, {0x2, 0x1, r4}, {0x2, 0x5, r5}, {0x2, 0x5, r6}, {0x2, 0x5, r7}], {0x4, 0x4}, [{0x8, 0x6, r8}], {0x10, 0x4}, {0x20, 0x2086583cc0c7f668}}, 0x64, 0x3) 22:07:45 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffff1f00, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:46 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='%eiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001ef, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:46 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ca", 0x24) [ 1080.112854] FAULT_INJECTION: forcing a failure. [ 1080.112854] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.137545] CPU: 0 PID: 1868 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1080.144563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.154060] Call Trace: [ 1080.156701] dump_stack+0x172/0x1f0 [ 1080.160374] should_fail.cold+0xa/0x1b [ 1080.164286] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1080.169407] ? lock_downgrade+0x810/0x810 [ 1080.173851] __should_failslab+0x121/0x190 [ 1080.178124] should_failslab+0x9/0x14 [ 1080.181974] kmem_cache_alloc+0x2ae/0x700 [ 1080.186329] ? lock_downgrade+0x810/0x810 [ 1080.190599] __kernfs_new_node+0xef/0x680 [ 1080.194785] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1080.199576] ? wait_for_completion+0x440/0x440 [ 1080.204201] ? mutex_unlock+0xd/0x10 [ 1080.207937] ? kernfs_activate+0x192/0x1f0 [ 1080.212209] kernfs_new_node+0x99/0x130 [ 1080.216205] __kernfs_create_file+0x51/0x33b [ 1080.220642] sysfs_add_file_mode_ns+0x222/0x560 [ 1080.225353] internal_create_group+0x383/0xc30 [ 1080.229962] ? bd_set_size+0x89/0xb0 [ 1080.233716] ? remove_files.isra.0+0x190/0x190 [ 1080.238327] sysfs_create_group+0x20/0x30 [ 1080.242502] lo_ioctl+0xf8f/0x20e0 [ 1080.246071] ? lo_rw_aio_complete+0x350/0x350 [ 1080.250587] blkdev_ioctl+0xc38/0x1ab6 [ 1080.254510] ? blkpg_ioctl+0xa90/0xa90 [ 1080.258414] ? find_held_lock+0x35/0x130 [ 1080.262493] ? debug_check_no_obj_freed+0x200/0x464 [ 1080.267531] ? __fget+0x340/0x540 [ 1080.271027] block_ioctl+0xee/0x130 [ 1080.274669] ? blkdev_fallocate+0x410/0x410 [ 1080.279015] do_vfs_ioctl+0xd5f/0x1380 [ 1080.283529] ? selinux_file_ioctl+0x46f/0x5e0 [ 1080.288043] ? selinux_file_ioctl+0x125/0x5e0 [ 1080.292562] ? ioctl_preallocate+0x210/0x210 [ 1080.296993] ? selinux_file_mprotect+0x620/0x620 [ 1080.301787] ? iterate_fd+0x360/0x360 [ 1080.305616] ? do_sys_open+0x31d/0x550 [ 1080.309532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1080.315094] ? security_file_ioctl+0x8d/0xc0 [ 1080.319527] ksys_ioctl+0xab/0xd0 [ 1080.323014] __x64_sys_ioctl+0x73/0xb0 [ 1080.326917] do_syscall_64+0xfd/0x620 [ 1080.330767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.335969] RIP: 0033:0x459697 [ 1080.339172] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:07:46 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f00000014c0)=[{&(0x7f0000000080)="02d59e69e73c9e55fdb73500a902d598db08c72ad956b8130b349b903719cbc72789117e5b9b6a01f1cbf4502508f1dcc7aa531bf75a63007a84c85c05584d63b306dd88baf3cb20396e3fe9e550d1ad2dfa99eaded4317db2b5189d5599a07336b2af6f178349e61b977970d60e40988ba212ee9d3f442bfe57be411f02639f886a9d1fc45a8bee39230aa6489bdfed04873000ed0de7013c6e7bb67e79f8dc7aff9eefbf76743d83fc15d8aac00f5249aa4cb71169059fd2d02982e232105db420c98948b95bfd52ff748a9705483519b8652cfb", 0xd5, 0x3}, {&(0x7f0000000180)="46aa66d20a5133b44e19de21a1c8410d6757c3f691e7e2fa1b43a4a269efb1c7afef24d0283f808a4095a8489879d94e12702094849a5c84a8d39a5d968b8a1ab11c220e913e7212ac96d3a500e0898944118314c53016c019cebb430f69eae7fcf82725958430d535e01d27a920e72b480ff6631ac5bb592294a347f3d5c5ff1bfbcee94aa36dd14b58d2d34beaa59942637b6d41ae70fd0bcebdfe7b38ae87a7959fc242521fad1c8ce3f48f5189", 0xaf, 0x6}, {&(0x7f0000000240)="35a9edfa69455ee720e989c2b0d6dff5bfba6d8f30fd4719e3faa93aebfd82964624e43c67913eb3bf19a942274c0701cc666a7b6954b5058bf0092ff4a57da0", 0x40, 0x80000001}, {&(0x7f0000000340)="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", 0x1000, 0x94e}, {&(0x7f0000001340)="069854e61c9b13ff03083d5ae2e78f9ad5510f89b0f51b700b2fb52736dec76823210ab9cf2ab055b9fe719018dc214c588efceb82cbeb521416880322862c06b0de79831663f23ee02fad60b045ab8d0b772684bb09f79200437181a9a7079944a6323eb0ecad7d1e70c222d22f305175bfd1b6b27bb372f7e26627e357f6e480be34871b430c68ea097b19f3a7dd4e32ffffa3fbb5c9a5949b8629bfca8fb99f9a4676e10ac99f", 0xa8, 0x9}, {&(0x7f0000000280)="0ab3439879c0ef44", 0x8, 0x2}, {&(0x7f0000001400)="7bc9458e447de933a622958e3b8f899afb7a63da97494404b766157b42a07475258e8d9d2aa7124d519b1069f13650cdb525c33c178e08f12b256f2631c1a64f055497b4e636f78a890ed106205024fd4c9cce2caad8acf5b53d6f92a556fdc709c919017f11969210b3729ca771f1321c0c5dab2dbf9a51282d03fb1ab10482f7ef4e3930330de973627f789dcad384c97ed40745df6b91d4e614b8fc", 0x9d, 0x2}], 0x8, &(0x7f00000002c0)='\x00') [ 1080.358182] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.365918] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1080.373212] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1080.380505] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1080.387795] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1080.395092] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1080.527043] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:46 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1080.571287] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:46 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1080.671840] ceph: device name is missing path (no : separator in /dev/loop2) 22:07:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f0, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:46 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:46 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='r\niserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1080.821582] FAULT_INJECTION: forcing a failure. [ 1080.821582] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.837921] CPU: 1 PID: 1902 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1080.845274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.854650] Call Trace: [ 1080.857277] dump_stack+0x172/0x1f0 [ 1080.860934] should_fail.cold+0xa/0x1b [ 1080.864874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1080.870004] ? lock_downgrade+0x810/0x810 [ 1080.874209] __should_failslab+0x121/0x190 [ 1080.878477] should_failslab+0x9/0x14 [ 1080.882305] kmem_cache_alloc+0x2ae/0x700 [ 1080.886482] ? lock_downgrade+0x810/0x810 [ 1080.890663] __kernfs_new_node+0xef/0x680 [ 1080.894842] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1080.899632] ? wait_for_completion+0x440/0x440 [ 1080.904253] ? mutex_unlock+0xd/0x10 [ 1080.907984] ? kernfs_activate+0x192/0x1f0 [ 1080.912240] kernfs_new_node+0x99/0x130 [ 1080.916233] __kernfs_create_file+0x51/0x33b [ 1080.920673] sysfs_add_file_mode_ns+0x222/0x560 [ 1080.925368] internal_create_group+0x383/0xc30 [ 1080.929983] ? bd_set_size+0x89/0xb0 [ 1080.933727] ? remove_files.isra.0+0x190/0x190 [ 1080.938332] sysfs_create_group+0x20/0x30 [ 1080.942499] lo_ioctl+0xf8f/0x20e0 [ 1080.946054] ? lo_rw_aio_complete+0x350/0x350 [ 1080.950558] blkdev_ioctl+0xc38/0x1ab6 [ 1080.954468] ? blkpg_ioctl+0xa90/0xa90 [ 1080.958373] ? find_held_lock+0x35/0x130 [ 1080.962460] ? debug_check_no_obj_freed+0x200/0x464 [ 1080.967514] ? __fget+0x340/0x540 [ 1080.971000] block_ioctl+0xee/0x130 [ 1080.974653] ? blkdev_fallocate+0x410/0x410 [ 1080.979003] do_vfs_ioctl+0xd5f/0x1380 [ 1080.982916] ? selinux_file_ioctl+0x46f/0x5e0 [ 1080.987427] ? selinux_file_ioctl+0x125/0x5e0 [ 1080.991986] ? ioctl_preallocate+0x210/0x210 [ 1080.996411] ? selinux_file_mprotect+0x620/0x620 [ 1081.001197] ? iterate_fd+0x360/0x360 [ 1081.005025] ? do_sys_open+0x31d/0x550 [ 1081.008935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.014532] ? security_file_ioctl+0x8d/0xc0 [ 1081.018977] ksys_ioctl+0xab/0xd0 [ 1081.022461] __x64_sys_ioctl+0x73/0xb0 [ 1081.026383] do_syscall_64+0xfd/0x620 [ 1081.030207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.035415] RIP: 0033:0x459697 [ 1081.038650] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.057580] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.065322] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1081.072614] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1081.079900] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1081.087204] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1081.094767] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1081.252629] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1081.321019] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:47 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:47 executing program 2: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth1_to_hsr\x00', {0x2, 0x4e23, @broadcast}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) 22:07:47 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f1, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:47 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='r\"iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1081.550031] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1081.577788] FAULT_INJECTION: forcing a failure. [ 1081.577788] name failslab, interval 1, probability 0, space 0, times 0 22:07:47 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x2000) setsockopt(r0, 0x20, 0x4, &(0x7f0000000040)="a4c5187919f05a02d1d9dc6fd9b988d17e0ae9338b3226f2ef27e684066924aa0abc1f148a9a0ab3536509e11545af851aa4c457876d1c00831eed0d6eadc4417252722069b3cacb9ab86508c254b144ffd0a31190e54f7263ff5a5668dfd0713f5945b1b34a80ca62e0418e80a4bd847c60afe0e5c40f2770c08308e6b0044bd06d2f85278afc79e12b0093003f9f51513797367b25c605ece2392bfbd055e9bd68eb40d1", 0xa5) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:47 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1081.627887] CPU: 0 PID: 1945 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1081.635023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.644499] Call Trace: [ 1081.647118] dump_stack+0x172/0x1f0 [ 1081.650815] should_fail.cold+0xa/0x1b [ 1081.654767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1081.659925] ? lock_downgrade+0x810/0x810 [ 1081.664117] __should_failslab+0x121/0x190 [ 1081.668379] should_failslab+0x9/0x14 [ 1081.672227] kmem_cache_alloc+0x2ae/0x700 [ 1081.676397] ? lock_downgrade+0x810/0x810 [ 1081.680604] __kernfs_new_node+0xef/0x680 [ 1081.684792] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1081.689578] ? wait_for_completion+0x440/0x440 [ 1081.694285] ? mutex_unlock+0xd/0x10 [ 1081.698024] ? kernfs_activate+0x192/0x1f0 [ 1081.702297] kernfs_new_node+0x99/0x130 [ 1081.706313] __kernfs_create_file+0x51/0x33b [ 1081.710754] sysfs_add_file_mode_ns+0x222/0x560 [ 1081.715459] internal_create_group+0x383/0xc30 [ 1081.720065] ? bd_set_size+0x89/0xb0 [ 1081.723810] ? remove_files.isra.0+0x190/0x190 [ 1081.728426] sysfs_create_group+0x20/0x30 [ 1081.732594] lo_ioctl+0xf8f/0x20e0 [ 1081.736153] ? lo_rw_aio_complete+0x350/0x350 [ 1081.740663] blkdev_ioctl+0xc38/0x1ab6 [ 1081.744569] ? blkpg_ioctl+0xa90/0xa90 [ 1081.748469] ? find_held_lock+0x35/0x130 [ 1081.752546] ? debug_check_no_obj_freed+0x200/0x464 [ 1081.757586] ? __fget+0x340/0x540 [ 1081.761067] block_ioctl+0xee/0x130 [ 1081.764705] ? blkdev_fallocate+0x410/0x410 [ 1081.769052] do_vfs_ioctl+0xd5f/0x1380 [ 1081.773051] ? selinux_file_ioctl+0x46f/0x5e0 [ 1081.777649] ? selinux_file_ioctl+0x125/0x5e0 [ 1081.782183] ? ioctl_preallocate+0x210/0x210 [ 1081.786605] ? selinux_file_mprotect+0x620/0x620 [ 1081.791377] ? iterate_fd+0x360/0x360 [ 1081.795184] ? do_sys_open+0x31d/0x550 [ 1081.799084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.804637] ? security_file_ioctl+0x8d/0xc0 [ 1081.809557] ksys_ioctl+0xab/0xd0 [ 1081.813042] __x64_sys_ioctl+0x73/0xb0 [ 1081.816961] do_syscall_64+0xfd/0x620 [ 1081.820789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.826001] RIP: 0033:0x459697 [ 1081.829211] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.848158] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.855908] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1081.863202] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1081.870489] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:07:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f2, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1081.877783] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1081.885170] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1082.026534] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1082.087681] __ntfs_warning: 11 callbacks suppressed [ 1082.087696] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:07:48 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1082.140062] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:48 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1082.198467] ntfs: (device loop4): parse_options(): NLS character set [ 1082.198467] p852 not found. Using previous one utf8. 22:07:48 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) r1 = socket(0x4, 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)=@ccm_128={{0x303}, "6b2fa7c2f1a9a4c7", "88b8d2153f5d38bdf56c528bad205b1a", "d19e8d0a", "2a84f464201a3f54"}, 0x28) write(0xffffffffffffffff, &(0x7f0000000200)="240000005200a90014f9f407112c04091c0007edf9c3b13f5a3889fef4000000000000003a205ed2fb95320f539f0356b06d07ce93486ee983c53944a23abddba2413d594cd40f3698a090bff21f7d0c6242facfd4117fe81672a0f847ac68bd08e20da29ae343f9e354b1c6f637611c25a4089ca583158c1ad37edc698628583226002b7c75a385cd470de6304844af2815598dfd1b09a22a43e97cc60e480bb8535c3bbff9119d30241e6d1276984abec0c0e828e26a490c189dd520ad6e15ee288debd448d8bc5aeb7a3c08e37f54cec0656747", 0x2ab) [ 1082.252107] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1082.259238] FAULT_INJECTION: forcing a failure. [ 1082.259238] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.315565] CPU: 1 PID: 1979 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1082.322574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.331967] Call Trace: [ 1082.334585] dump_stack+0x172/0x1f0 [ 1082.338237] should_fail.cold+0xa/0x1b [ 1082.342173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1082.347305] ? lock_downgrade+0x810/0x810 [ 1082.351513] __should_failslab+0x121/0x190 [ 1082.355787] should_failslab+0x9/0x14 [ 1082.359612] kmem_cache_alloc+0x2ae/0x700 [ 1082.363784] ? lock_downgrade+0x810/0x810 [ 1082.368402] __kernfs_new_node+0xef/0x680 [ 1082.372681] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1082.377475] ? wait_for_completion+0x440/0x440 [ 1082.382095] ? mutex_unlock+0xd/0x10 [ 1082.385830] ? kernfs_activate+0x192/0x1f0 [ 1082.390079] kernfs_new_node+0x99/0x130 [ 1082.394065] __kernfs_create_file+0x51/0x33b [ 1082.398499] sysfs_add_file_mode_ns+0x222/0x560 [ 1082.403202] internal_create_group+0x383/0xc30 [ 1082.407816] ? bd_set_size+0x89/0xb0 [ 1082.411564] ? remove_files.isra.0+0x190/0x190 [ 1082.416184] sysfs_create_group+0x20/0x30 [ 1082.420362] lo_ioctl+0xf8f/0x20e0 [ 1082.423935] ? lo_rw_aio_complete+0x350/0x350 [ 1082.428460] blkdev_ioctl+0xc38/0x1ab6 [ 1082.432363] ? blkpg_ioctl+0xa90/0xa90 [ 1082.436265] ? find_held_lock+0x35/0x130 [ 1082.440341] ? debug_check_no_obj_freed+0x200/0x464 [ 1082.445372] ? __fget+0x340/0x540 [ 1082.448845] block_ioctl+0xee/0x130 [ 1082.452491] ? blkdev_fallocate+0x410/0x410 [ 1082.456832] do_vfs_ioctl+0xd5f/0x1380 [ 1082.460735] ? selinux_file_ioctl+0x46f/0x5e0 [ 1082.465243] ? selinux_file_ioctl+0x125/0x5e0 [ 1082.469748] ? ioctl_preallocate+0x210/0x210 [ 1082.474164] ? selinux_file_mprotect+0x620/0x620 [ 1082.478940] ? iterate_fd+0x360/0x360 [ 1082.482767] ? do_sys_open+0x31d/0x550 [ 1082.486978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1082.492538] ? security_file_ioctl+0x8d/0xc0 [ 1082.496972] ksys_ioctl+0xab/0xd0 [ 1082.500458] __x64_sys_ioctl+0x73/0xb0 [ 1082.504372] do_syscall_64+0xfd/0x620 [ 1082.508200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1082.513412] RIP: 0033:0x459697 [ 1082.516623] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.535908] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.543641] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1082.550927] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1082.558217] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1082.565597] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1082.572911] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f3, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:48 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:48 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='r%iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1082.714650] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:48 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1082.895495] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:07:48 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) socket(0x200000000010, 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1091c0, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0x2, 0xd000, 0x1f, 0xaf, 0x8001}) write(r0, &(0x7f00000005c0)="240000ef51001f0014f9f400f1ffff081c0007ed020001000a000000090000000000000093f8269b481655a7f34c1b4c4ed45970f39da33f445878d20d3d1885dffc2c2164cd9082b86899f99318edd463fbc370b5f2a3565bb6c08065022534eb028ea6153bbb0a80077b87846bb8a8ab5eaef721e99a1e5004c4956566a6bed06d1ef4c9bd4644ff817922b17a3cf4cb28db542b188dfc7a3daf8a4f37e62b2d6b275869f86c7c0a80f8fa89e020ecf75e986bf2fe1110b2227a5e58923248149324a8dbd1fe6ea5338e47eaa915cc52722d1e9698125b67e0c02a15f501e7d47f6ba620fe1de1acf5491b0c39ab59a3934370d1e02ab60937ed3b041795b60997328bae0d39fff7333c01e381c3b2e82a1e63246edbf06ee62211b21a07ab241768e06b5e8797428297c3ad8d3622877f1854479ef5d047db4498d030dbeff9d5cf0629679c8b9fd239ba8e2864ca732e4bfdd8c76791af52211509de0625075932b9b19e676e23513bef978cc80a6f06c52a44544f398718c138341df0c08ad4af0149a8309146d1581e1f1c1b5a519fb030f8c16152224d3d0c37ee252b9d317da395ee422f52cde2ff1e28fb12fa6a6635289f1a651637e71a3cc4e20e043b830073e9b625f32d0168cf135d6a4d896fe7f2bfd36a04052b4c1685113d6273ffa43fc7b138f1d1e9a05f5c4c9b43a02580ac7c27a021fec0189e22a9e836c86b5f69f025711aaa86074b6ffd7fa3a426f4ce982bcd4f226ac094c8b25c52f037bf2a01f00cf2a970b5ed2f556e86ec6cb0499453778371161a6901413aefb2c3adbb", 0xfffffffffffffe13) 22:07:49 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f4, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1082.976616] ntfs: (device loop4): parse_options(): NLS character set [ 1082.976616] p852 not found. Using previous one utf8. 22:07:49 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='r,iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:49 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1083.088618] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1083.133401] FAULT_INJECTION: forcing a failure. [ 1083.133401] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.155376] CPU: 0 PID: 2029 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1083.162371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.171741] Call Trace: [ 1083.174362] dump_stack+0x172/0x1f0 [ 1083.178017] should_fail.cold+0xa/0x1b [ 1083.181932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.187058] ? lock_downgrade+0x810/0x810 [ 1083.191228] __should_failslab+0x121/0x190 [ 1083.195493] should_failslab+0x9/0x14 [ 1083.199310] kmem_cache_alloc+0x2ae/0x700 [ 1083.203481] ? lock_downgrade+0x810/0x810 [ 1083.207650] __kernfs_new_node+0xef/0x680 [ 1083.211825] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1083.216592] ? wait_for_completion+0x440/0x440 [ 1083.221216] ? mutex_unlock+0xd/0x10 [ 1083.224933] ? kernfs_activate+0x192/0x1f0 [ 1083.229180] kernfs_new_node+0x99/0x130 [ 1083.233173] __kernfs_create_file+0x51/0x33b [ 1083.237679] sysfs_add_file_mode_ns+0x222/0x560 [ 1083.242387] internal_create_group+0x383/0xc30 [ 1083.246986] ? bd_set_size+0x89/0xb0 [ 1083.250722] ? remove_files.isra.0+0x190/0x190 [ 1083.255323] sysfs_create_group+0x20/0x30 [ 1083.259566] lo_ioctl+0xf8f/0x20e0 [ 1083.263122] ? lo_rw_aio_complete+0x350/0x350 [ 1083.267850] blkdev_ioctl+0xc38/0x1ab6 [ 1083.271763] ? blkpg_ioctl+0xa90/0xa90 [ 1083.275756] ? find_held_lock+0x35/0x130 [ 1083.280016] ? debug_check_no_obj_freed+0x200/0x464 [ 1083.285147] ? __fget+0x340/0x540 [ 1083.288627] block_ioctl+0xee/0x130 [ 1083.292351] ? blkdev_fallocate+0x410/0x410 [ 1083.296689] do_vfs_ioctl+0xd5f/0x1380 [ 1083.300584] ? selinux_file_ioctl+0x46f/0x5e0 [ 1083.305086] ? selinux_file_ioctl+0x125/0x5e0 [ 1083.309597] ? ioctl_preallocate+0x210/0x210 [ 1083.314014] ? selinux_file_mprotect+0x620/0x620 [ 1083.318785] ? iterate_fd+0x360/0x360 [ 1083.322596] ? do_sys_open+0x31d/0x550 [ 1083.326496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1083.332059] ? security_file_ioctl+0x8d/0xc0 [ 1083.336487] ksys_ioctl+0xab/0xd0 [ 1083.339960] __x64_sys_ioctl+0x73/0xb0 [ 1083.343987] do_syscall_64+0xfd/0x620 [ 1083.347813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.353018] RIP: 0033:0x459697 [ 1083.356234] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.375243] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:07:49 executing program 2: r0 = socket(0x8, 0x3, 0x51) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) accept4$rose(r0, &(0x7f0000000000)=@short={0xb, @dev, @default}, &(0x7f0000000040)=0x1c, 0x80000) [ 1083.383090] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1083.390384] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1083.397862] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1083.405161] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1083.412548] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:49 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f5, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1083.511751] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1083.533118] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:49 executing program 2: write(0xffffffffffffffff, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) [ 1083.672939] ntfs: (device loop4): parse_options(): NLS character set [ 1083.672939] p852 not found. Using previous one utf8. [ 1083.778009] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:07:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:49 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:49 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:49 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rliserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:49 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'ip_vti0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}) 22:07:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f6, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:49 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000065", 0x24) [ 1083.899059] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1083.906479] FAULT_INJECTION: forcing a failure. [ 1083.906479] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.923284] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1083.934347] CPU: 1 PID: 2073 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1083.941401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.950770] Call Trace: [ 1083.953388] dump_stack+0x172/0x1f0 [ 1083.957060] should_fail.cold+0xa/0x1b [ 1083.960975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.966127] ? lock_downgrade+0x810/0x810 [ 1083.970335] __should_failslab+0x121/0x190 [ 1083.974616] should_failslab+0x9/0x14 [ 1083.978463] kmem_cache_alloc+0x2ae/0x700 [ 1083.982637] ? lock_downgrade+0x810/0x810 [ 1083.986812] __kernfs_new_node+0xef/0x680 [ 1083.990978] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1083.995762] ? wait_for_completion+0x440/0x440 [ 1084.000373] ? mutex_unlock+0xd/0x10 [ 1084.004102] ? kernfs_activate+0x192/0x1f0 [ 1084.008366] kernfs_new_node+0x99/0x130 [ 1084.012368] __kernfs_create_file+0x51/0x33b [ 1084.016804] sysfs_add_file_mode_ns+0x222/0x560 [ 1084.021515] internal_create_group+0x383/0xc30 [ 1084.026125] ? bd_set_size+0x89/0xb0 [ 1084.029891] ? remove_files.isra.0+0x190/0x190 [ 1084.034515] sysfs_create_group+0x20/0x30 [ 1084.038683] lo_ioctl+0xf8f/0x20e0 [ 1084.042259] ? lo_rw_aio_complete+0x350/0x350 [ 1084.046776] blkdev_ioctl+0xc38/0x1ab6 [ 1084.050691] ? blkpg_ioctl+0xa90/0xa90 [ 1084.054605] ? find_held_lock+0x35/0x130 [ 1084.058688] ? debug_check_no_obj_freed+0x200/0x464 [ 1084.063731] ? __fget+0x340/0x540 [ 1084.067210] block_ioctl+0xee/0x130 [ 1084.070846] ? blkdev_fallocate+0x410/0x410 [ 1084.075180] do_vfs_ioctl+0xd5f/0x1380 [ 1084.079075] ? selinux_file_ioctl+0x46f/0x5e0 [ 1084.083578] ? selinux_file_ioctl+0x125/0x5e0 [ 1084.088082] ? ioctl_preallocate+0x210/0x210 [ 1084.092500] ? selinux_file_mprotect+0x620/0x620 [ 1084.097273] ? iterate_fd+0x360/0x360 [ 1084.101088] ? do_sys_open+0x31d/0x550 [ 1084.104995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.110566] ? security_file_ioctl+0x8d/0xc0 [ 1084.114998] ksys_ioctl+0xab/0xd0 [ 1084.118504] __x64_sys_ioctl+0x73/0xb0 [ 1084.122420] do_syscall_64+0xfd/0x620 [ 1084.126268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.131476] RIP: 0033:0x459697 22:07:49 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = socket(0x1, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000000)=""/49, &(0x7f0000000040)=0x31) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0xf49e68917df05723, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xa00}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, r4}}, {@subj_type={'subj_type', 0x3d, '+md5sum#+ppp1-}'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1084.134690] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.153818] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1084.161547] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1084.168832] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1084.176127] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1084.183416] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1084.190701] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1084.319526] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1084.324572] QAT: Invalid ioctl 22:07:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f7, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1084.352815] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:07:50 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1084.432441] QAT: Invalid ioctl 22:07:50 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14, 0x800) getresuid(&(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@dev={0xfe, 0x80, [], 0xb}, @in=@multicast2, 0x4e20, 0x1, 0x4e23, 0x8, 0x2, 0x20, 0x92e2a14d6f8563cf, 0xff, r2, r3}, {0x80000001, 0x7fff, 0x6, 0x1, 0x101, 0x0, 0x0, 0x2b}, {0x80, 0x7, 0x81, 0x2}, 0x6, 0x6e6bb6, 0x0, 0x0, 0x3}, {{@in=@multicast2, 0x4d4, 0xa6aeaf5fc6f22794}, 0xa, @in6=@rand_addr="7a8978fe2a3c58b096acf6d31719e00a", 0x3504, 0x4, 0x1, 0x6, 0x6, 0x6, 0x3ff}}, 0xe8) write(r0, &(0x7f0000000340)="2400000052001f0014f9f407112c04091c0007ed020001000a00000009000000000000001392df06f9d7c82aec3d444cc725b34654aa65fe5a0331a875cb94a6455bcdb907da6be026db33e576433511b2746d1ee26c9c71e3d0ebd5e8ed621f8c755373e3b3ae7085ed8b473cdbd486f444100a325a0810c0264710af32ac45b89b93e94780159166b3fa57dd35cfde6bc060e210636fb3a955689170918558b63855d2082f94fae895ece63f16f5bdf670cd7c2be167a84f0dd7458ea253acc16029a8ea06f1b4e194d3ac28336d8ff6c3a2dacbc32aef5d8ac60e6d90a66cb36bd6242441826f72fe194b61980ef957f3bfb2b8a99e6b13c6943ecaa197ee41040069df13c4d3aa6b15d5899e64486b9b1b76d3f162b99b7dd345eb25d84632004b88", 0x472) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0xa7e7) 22:07:50 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='re\nserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x1a0ffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:50 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:50 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000058", 0x24) [ 1084.675102] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1084.705337] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1084.711591] FAULT_INJECTION: forcing a failure. [ 1084.711591] name failslab, interval 1, probability 0, space 0, times 0 22:07:50 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x2000) [ 1084.729429] CPU: 0 PID: 2123 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1084.736392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.745856] Call Trace: [ 1084.748648] dump_stack+0x172/0x1f0 [ 1084.752310] should_fail.cold+0xa/0x1b [ 1084.756231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1084.761540] ? lock_downgrade+0x810/0x810 [ 1084.765819] __should_failslab+0x121/0x190 [ 1084.770104] should_failslab+0x9/0x14 [ 1084.773944] kmem_cache_alloc_trace+0x2cc/0x760 [ 1084.778687] kobject_uevent_env+0x387/0x101d [ 1084.783153] kobject_uevent+0x20/0x26 [ 1084.787011] lo_ioctl+0x100b/0x20e0 [ 1084.790967] ? lo_rw_aio_complete+0x350/0x350 [ 1084.802789] blkdev_ioctl+0xc38/0x1ab6 [ 1084.806715] ? blkpg_ioctl+0xa90/0xa90 [ 1084.811855] ? find_held_lock+0x35/0x130 [ 1084.815933] ? debug_check_no_obj_freed+0x200/0x464 [ 1084.820979] ? __fget+0x340/0x540 [ 1084.824451] block_ioctl+0xee/0x130 [ 1084.828089] ? blkdev_fallocate+0x410/0x410 [ 1084.832429] do_vfs_ioctl+0xd5f/0x1380 [ 1084.836333] ? selinux_file_ioctl+0x46f/0x5e0 [ 1084.840836] ? selinux_file_ioctl+0x125/0x5e0 [ 1084.845346] ? ioctl_preallocate+0x210/0x210 [ 1084.849869] ? selinux_file_mprotect+0x620/0x620 [ 1084.854649] ? iterate_fd+0x360/0x360 [ 1084.858465] ? do_sys_open+0x31d/0x550 [ 1084.862372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1084.867945] ? security_file_ioctl+0x8d/0xc0 [ 1084.872390] ksys_ioctl+0xab/0xd0 [ 1084.875945] __x64_sys_ioctl+0x73/0xb0 [ 1084.879852] do_syscall_64+0xfd/0x620 [ 1084.883674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1084.888872] RIP: 0033:0x459697 [ 1084.892076] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1084.911199] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1084.918928] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1084.926233] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1084.933522] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1084.940804] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1084.948092] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f8, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:51 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1085.076587] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1085.094619] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1085.165167] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:51 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='re%serfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:51 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000001", 0x24) 22:07:51 executing program 2: r0 = socket(0x1c96f5d6f07b5f16, 0x6104eddae3129d2f, 0xfffffffffffffffc) time(&(0x7f0000000000)) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001f9, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:51 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:51 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r1 = semget(0x3, 0x4, 0x10) semctl$SEM_INFO(r1, 0x3, 0x13, &(0x7f0000000040)=""/61) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000440)={0x1, 0x0, @pic={0x5, 0x0, 0x2b, 0x3, 0x1, 0x9, 0xc0ac, 0x101, 0xa0d0, 0x6d0ecb44, 0xffffffff00000001, 0x7fffffff, 0x7, 0x7f, 0x76ba, 0x20}}) [ 1085.470336] FAULT_INJECTION: forcing a failure. [ 1085.470336] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.494414] CPU: 0 PID: 2173 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1085.501477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.510868] Call Trace: [ 1085.513486] dump_stack+0x172/0x1f0 [ 1085.517146] should_fail.cold+0xa/0x1b [ 1085.521053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1085.526176] ? lock_downgrade+0x810/0x810 [ 1085.530441] __should_failslab+0x121/0x190 [ 1085.534709] should_failslab+0x9/0x14 [ 1085.538535] kmem_cache_alloc_trace+0x2cc/0x760 [ 1085.543329] kobject_uevent_env+0x387/0x101d [ 1085.547767] kobject_uevent+0x20/0x26 [ 1085.551593] lo_ioctl+0x100b/0x20e0 [ 1085.555357] ? lo_rw_aio_complete+0x350/0x350 [ 1085.559878] blkdev_ioctl+0xc38/0x1ab6 [ 1085.563782] ? blkpg_ioctl+0xa90/0xa90 [ 1085.567690] ? find_held_lock+0x35/0x130 [ 1085.571765] ? debug_check_no_obj_freed+0x200/0x464 [ 1085.576800] ? __fget+0x340/0x540 [ 1085.580282] block_ioctl+0xee/0x130 [ 1085.583929] ? blkdev_fallocate+0x410/0x410 [ 1085.588281] do_vfs_ioctl+0xd5f/0x1380 [ 1085.592196] ? selinux_file_ioctl+0x46f/0x5e0 [ 1085.596744] ? selinux_file_ioctl+0x125/0x5e0 [ 1085.601261] ? ioctl_preallocate+0x210/0x210 [ 1085.605685] ? selinux_file_mprotect+0x620/0x620 [ 1085.610473] ? iterate_fd+0x360/0x360 [ 1085.614293] ? do_sys_open+0x31d/0x550 [ 1085.618204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1085.623766] ? security_file_ioctl+0x8d/0xc0 [ 1085.628207] ksys_ioctl+0xab/0xd0 [ 1085.631678] __x64_sys_ioctl+0x73/0xb0 [ 1085.635688] do_syscall_64+0xfd/0x620 [ 1085.639512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1085.644718] RIP: 0033:0x459697 [ 1085.647923] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:07:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1085.666846] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1085.674583] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1085.681873] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1085.689159] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1085.696471] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1085.703786] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1085.785871] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:51 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:52 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='relserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1086.051594] FAULT_INJECTION: forcing a failure. [ 1086.051594] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.084263] CPU: 1 PID: 2194 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1086.091268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.100648] Call Trace: [ 1086.103280] dump_stack+0x172/0x1f0 [ 1086.106944] should_fail.cold+0xa/0x1b [ 1086.110862] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1086.115995] ? lock_downgrade+0x810/0x810 [ 1086.120352] __should_failslab+0x121/0x190 [ 1086.124617] should_failslab+0x9/0x14 [ 1086.128439] kmem_cache_alloc_node_trace+0x274/0x720 [ 1086.133577] ? __alloc_skb+0xd5/0x5f0 [ 1086.137434] __kmalloc_node_track_caller+0x3d/0x80 [ 1086.142402] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1086.147111] __alloc_skb+0x10b/0x5f0 [ 1086.150859] ? skb_scrub_packet+0x490/0x490 [ 1086.155208] ? kasan_check_read+0x11/0x20 [ 1086.159383] alloc_uevent_skb+0x83/0x1e2 [ 1086.163480] kobject_uevent_env+0xaa3/0x101d [ 1086.167930] kobject_uevent+0x20/0x26 [ 1086.171756] lo_ioctl+0x100b/0x20e0 [ 1086.175409] ? lo_rw_aio_complete+0x350/0x350 [ 1086.179923] blkdev_ioctl+0xc38/0x1ab6 [ 1086.183837] ? blkpg_ioctl+0xa90/0xa90 [ 1086.187750] ? find_held_lock+0x35/0x130 [ 1086.192178] ? debug_check_no_obj_freed+0x200/0x464 [ 1086.197217] ? __fget+0x340/0x540 [ 1086.200692] block_ioctl+0xee/0x130 [ 1086.204329] ? blkdev_fallocate+0x410/0x410 [ 1086.208659] do_vfs_ioctl+0xd5f/0x1380 [ 1086.212552] ? selinux_file_ioctl+0x46f/0x5e0 [ 1086.217051] ? selinux_file_ioctl+0x125/0x5e0 [ 1086.221554] ? ioctl_preallocate+0x210/0x210 [ 1086.225969] ? selinux_file_mprotect+0x620/0x620 [ 1086.230742] ? iterate_fd+0x360/0x360 [ 1086.234588] ? do_sys_open+0x31d/0x550 [ 1086.238498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.244058] ? security_file_ioctl+0x8d/0xc0 [ 1086.248494] ksys_ioctl+0xab/0xd0 [ 1086.251969] __x64_sys_ioctl+0x73/0xb0 [ 1086.255882] do_syscall_64+0xfd/0x620 [ 1086.259705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.264918] RIP: 0033:0x459697 [ 1086.268131] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1086.287047] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.294777] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1086.302063] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1086.309488] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1086.316783] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1086.324084] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 22:07:52 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001fa, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1086.378850] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1086.406415] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:52 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:52 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei\nerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1086.725055] FAULT_INJECTION: forcing a failure. [ 1086.725055] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.741464] CPU: 0 PID: 2228 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1086.748455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.757843] Call Trace: [ 1086.760461] dump_stack+0x172/0x1f0 [ 1086.764124] should_fail.cold+0xa/0x1b [ 1086.768050] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1086.773206] ? lock_downgrade+0x810/0x810 [ 1086.777388] __should_failslab+0x121/0x190 [ 1086.781654] should_failslab+0x9/0x14 [ 1086.785469] kmem_cache_alloc_node+0x26c/0x710 [ 1086.790074] ? find_held_lock+0x35/0x130 [ 1086.794165] __alloc_skb+0xd5/0x5f0 [ 1086.797809] ? skb_scrub_packet+0x490/0x490 [ 1086.802149] ? kasan_check_read+0x11/0x20 [ 1086.806323] alloc_uevent_skb+0x83/0x1e2 [ 1086.811969] kobject_uevent_env+0xaa3/0x101d [ 1086.816422] kobject_uevent+0x20/0x26 [ 1086.820252] lo_ioctl+0x100b/0x20e0 [ 1086.823900] ? lo_rw_aio_complete+0x350/0x350 [ 1086.828411] blkdev_ioctl+0xc38/0x1ab6 [ 1086.832334] ? blkpg_ioctl+0xa90/0xa90 [ 1086.836251] ? find_held_lock+0x35/0x130 [ 1086.840351] ? debug_check_no_obj_freed+0x200/0x464 [ 1086.845392] ? __fget+0x340/0x540 [ 1086.848878] block_ioctl+0xee/0x130 [ 1086.852524] ? blkdev_fallocate+0x410/0x410 [ 1086.856982] do_vfs_ioctl+0xd5f/0x1380 [ 1086.860900] ? selinux_file_ioctl+0x46f/0x5e0 [ 1086.865447] ? selinux_file_ioctl+0x125/0x5e0 [ 1086.869989] ? ioctl_preallocate+0x210/0x210 [ 1086.874435] ? selinux_file_mprotect+0x620/0x620 [ 1086.879225] ? iterate_fd+0x360/0x360 [ 1086.883064] ? do_sys_open+0x31d/0x550 [ 1086.886992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.892540] ? security_file_ioctl+0x8d/0xc0 [ 1086.896972] ksys_ioctl+0xab/0xd0 [ 1086.900553] __x64_sys_ioctl+0x73/0xb0 [ 1086.904464] do_syscall_64+0xfd/0x620 [ 1086.908296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.913506] RIP: 0033:0x459697 [ 1086.916704] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1086.935775] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.943495] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1086.950793] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1086.958089] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1086.965383] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 22:07:53 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1086.972662] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1086.985299] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r1, 0x6}, 0x8) r2 = socket(0x200000000010, 0x3, 0x0) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) [ 1087.046492] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:53 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1087.166361] __ntfs_warning: 17 callbacks suppressed [ 1087.166378] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1087.340664] FAULT_INJECTION: forcing a failure. [ 1087.340664] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.357520] CPU: 1 PID: 2262 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1087.364500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.373879] Call Trace: [ 1087.376502] dump_stack+0x172/0x1f0 [ 1087.380163] should_fail.cold+0xa/0x1b [ 1087.384085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1087.389205] ? lock_downgrade+0x810/0x810 [ 1087.393390] __should_failslab+0x121/0x190 [ 1087.397658] should_failslab+0x9/0x14 [ 1087.401575] kmem_cache_alloc+0x2ae/0x700 [ 1087.405748] ? refcount_add_not_zero_checked+0x240/0x240 [ 1087.411221] ? lock_downgrade+0x810/0x810 [ 1087.415589] skb_clone+0x156/0x3e0 [ 1087.419154] netlink_broadcast_filtered+0x86e/0xb20 [ 1087.424212] netlink_broadcast+0x3a/0x50 [ 1087.428923] kobject_uevent_env+0xad4/0x101d [ 1087.433364] kobject_uevent+0x20/0x26 [ 1087.437282] lo_ioctl+0x100b/0x20e0 [ 1087.440950] ? lo_rw_aio_complete+0x350/0x350 [ 1087.445478] blkdev_ioctl+0xc38/0x1ab6 [ 1087.449379] ? blkpg_ioctl+0xa90/0xa90 [ 1087.453285] ? find_held_lock+0x35/0x130 [ 1087.457366] ? debug_check_no_obj_freed+0x200/0x464 [ 1087.462414] ? __fget+0x340/0x540 [ 1087.465902] block_ioctl+0xee/0x130 [ 1087.469540] ? blkdev_fallocate+0x410/0x410 [ 1087.473889] do_vfs_ioctl+0xd5f/0x1380 [ 1087.477798] ? selinux_file_ioctl+0x46f/0x5e0 [ 1087.482314] ? selinux_file_ioctl+0x125/0x5e0 [ 1087.486824] ? ioctl_preallocate+0x210/0x210 [ 1087.491246] ? selinux_file_mprotect+0x620/0x620 [ 1087.496021] ? iterate_fd+0x360/0x360 [ 1087.499833] ? do_sys_open+0x31d/0x550 [ 1087.503783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1087.508703] ntfs: (device loop4): parse_options(): NLS character set [ 1087.508703] p852 not found. Using previous one utf8. [ 1087.509316] ? security_file_ioctl+0x8d/0xc0 [ 1087.521193] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1087.525328] ksys_ioctl+0xab/0xd0 [ 1087.525349] __x64_sys_ioctl+0x73/0xb0 [ 1087.525376] do_syscall_64+0xfd/0x620 [ 1087.544534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.549737] RIP: 0033:0x459697 [ 1087.552925] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1087.571998] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1087.579726] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1087.587093] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1087.594370] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1087.601680] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1087.608962] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1087.628746] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001fb, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1087.639419] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:53 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei\"erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:53 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:53 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1087.868592] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1087.958707] ntfs: (device loop4): parse_options(): NLS character set [ 1087.958707] p852 not found. Using previous one utf8. [ 1087.988939] FAULT_INJECTION: forcing a failure. [ 1087.988939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1088.000824] CPU: 1 PID: 2287 Comm: syz-executor.1 Not tainted 4.19.66 #40 [ 1088.007784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.017167] Call Trace: [ 1088.019792] dump_stack+0x172/0x1f0 [ 1088.023496] should_fail.cold+0xa/0x1b [ 1088.027430] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1088.032570] ? mark_held_locks+0x100/0x100 [ 1088.036835] ? blkdev_ioctl+0x12e/0x1ab6 [ 1088.040932] __alloc_pages_nodemask+0x1ee/0x750 [ 1088.045629] ? debug_check_no_obj_freed+0x200/0x464 [ 1088.050682] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1088.055728] ? find_held_lock+0x35/0x130 [ 1088.059825] cache_grow_begin+0x91/0x8c0 [ 1088.063928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1088.069499] ? check_preemption_disabled+0x48/0x290 [ 1088.074550] kmem_cache_alloc+0x63b/0x700 [ 1088.078731] getname_flags+0xd6/0x5b0 [ 1088.082566] do_mkdirat+0xa0/0x2a0 [ 1088.086132] ? __ia32_sys_mknod+0xb0/0xb0 [ 1088.090307] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1088.095095] ? do_syscall_64+0x26/0x620 [ 1088.099098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.104490] ? do_syscall_64+0x26/0x620 [ 1088.108492] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1088.113101] __x64_sys_mkdir+0x5c/0x80 [ 1088.117021] do_syscall_64+0xfd/0x620 [ 1088.120844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1088.126061] RIP: 0033:0x458c47 [ 1088.129281] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1088.148291] RSP: 002b:00007f0b1993ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1088.156063] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1088.163376] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 1088.170674] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1088.177962] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1088.185257] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000003 [ 1088.200293] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:07:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x6b6b6b00000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei#erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1088.389422] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1088.414971] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:54 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:07:54 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="b4240000000000000000008000000000030000000800000001000000000000200600000000fa00000000020000000000000600000000000000220b93ddcc36e1160000000000000000000000000000000035bab1e3000000"]) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="cc010000a70b8da53c788b46f3c7c379b8625bdf4196a25cb47254931c2be1e38b04b872bda200"/53, @ANYRES16=r1, @ANYBLOB="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"], 0x1dc}, 0x1, 0x0, 0x0, 0x80}, 0xa97c16798c6719bc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) connect(r0, &(0x7f00000003c0)=@xdp={0x2c, 0x5, r2, 0x26}, 0x80) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x821c1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) [ 1088.500975] ntfs: (device loop4): parse_options(): NLS character set [ 1088.500975] p852 not found. Using previous one utf8. 22:07:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei%erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1088.561928] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1088.699014] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1088.719606] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:07:54 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei*erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001fc, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1088.946110] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1088.977450] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:55 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000006b", 0x24) 22:07:55 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='\neiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:55 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei+erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:55 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='%eiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1089.518003] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:55 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ff", 0x24) 22:07:55 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) userfaultfd(0x800) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x8, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000080), 0x0}, 0x18) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="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") 22:07:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:55 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei,erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:55 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='r\niserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001fd, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:56 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1089.953262] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1089.975935] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:56 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'erspan0\x00', &(0x7f00000000c0)=@ethtool_stats={0x1d, 0x6, [0x0, 0x3, 0x8, 0xff, 0xa9a9, 0x1f]}}) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x0, 0x8d, 0xfffffffffffffffc}}, 0x28) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000000)=0x81) 22:07:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:56 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei-erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1090.120097] QAT: Invalid ioctl 22:07:56 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='r\"iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:56 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei.erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:56 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1090.513109] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1090.536727] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:56 executing program 2: fanotify_init(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x1000000000e6) ioctl$PPPIOCDISCONN(r2, 0x7439) r3 = socket(0x200000000010, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x4, 0x7, 0x9, 0x5, 0x13}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r4, @ANYBLOB="000007003700020001d0a0a683226550bf65"], 0x16) write(r3, &(0x7f0000000040)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:07:56 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='r%iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1090.729386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=2434 comm=syz-executor.2 22:07:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000001fe, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:07:57 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei0erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:57 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='r,iserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1091.139118] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:57 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1091.191778] IPVS: stopping master sync thread 25463 ... [ 1091.200181] device bridge_slave_1 left promiscuous mode [ 1091.205740] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.266837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=2433 comm=syz-executor.2 [ 1091.297152] device bridge_slave_0 left promiscuous mode [ 1091.304713] bridge0: port 1(bridge_slave_0) entered disabled state 22:07:57 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rdiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:07:57 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiKerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:07:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1098.781329] device hsr_slave_1 left promiscuous mode [ 1098.824110] device hsr_slave_0 left promiscuous mode [ 1098.883512] team0 (unregistering): Port device team_slave_1 removed [ 1098.906326] team0 (unregistering): Port device team_slave_0 removed [ 1098.947711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1099.103810] bond0 (unregistering): Released all slaves 22:08:05 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f001c0007ed02000000000900"/28, 0x35) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x5, 0xfffffffffffffff7, 0x774ce473, 0x3ff, 0x7ff, 0x6, 0x3dd}, 0xa) preadv(r0, &(0x7f0000000080), 0x0, 0x1000000004f) 22:08:05 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiXerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:05 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rfiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000201, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:05 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1099.168815] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:05 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) kcmp(r1, r2, 0x0, r0, r0) 22:08:05 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1099.326215] __ntfs_warning: 47 callbacks suppressed [ 1099.326228] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:05 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rliserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1099.400095] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1099.423182] ntfs: (device loop4): parse_options(): NLS character set [ 1099.423182] p852 not found. Using previous one utf8. [ 1099.469201] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000202, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:05 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiaerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:05 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1099.511007] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:05 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x2) accept4$tipc(r0, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10, 0x800) socket(0x4, 0x4, 0xffffffffffffffff) 22:08:05 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1099.615064] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1099.694962] ntfs: (device loop4): parse_options(): NLS character set [ 1099.694962] p852 not found. Using previous one utf8. 22:08:05 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='re\nserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:05 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1099.756655] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2901000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000203, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:05 executing program 2: r0 = socket(0x200000000010, 0xf, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:05 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiberfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:05 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:06 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x9, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x1) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000080)={0x6, 0x6, 0x4}) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1100.071304] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1100.101037] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:06 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1100.119752] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000204, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:06 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='re%serfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:06 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x10000, 0x937, 0x7}) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) sendto$packet(r0, &(0x7f0000000040)="99c8eb47236a0e847a667b6a12cdcc227102c2272814a065225362446b29a59700ce7cee78786f2d23607df8cfe94b0fec4d2f6b9af4abbf71274404bbcb60f60b94a886a0489db4d07ce8d23dcb835f122b591cb0d475f12945fe4563f7ffbba13824737db1fdf3a7", 0x69, 0x80, 0x0, 0x0) 22:08:06 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reicerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1100.268385] ntfs: (device loop4): parse_options(): NLS character set [ 1100.268385] p852 not found. Using previous one utf8. [ 1100.301676] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27171 sclass=netlink_route_socket pig=2595 comm=syz-executor.2 22:08:06 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1100.307967] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1100.440319] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000205, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:06 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:06 executing program 2: r0 = socket(0x200000000010, 0x3, 0x8) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x8, 0x10000) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000440)=""/68) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e24, @multicast2}, 0x80, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000000)='syzkaller1\x00', 0x80000000, 0x3, 0xfffffffffffffffc}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0xff, 0xff, 0x8001, 0x401, 0x81, 0x4, 0xd8f3, 0x7, 0x0}, &(0x7f0000000100)=0x20) r3 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x4, 0x4000) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000340)=""/223) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r2, 0x2, 0x62, 0x10000}, &(0x7f0000000180)=0x10) write(r3, &(0x7f0000000300)="2400000052060007ed10deac61143cc5020001000a000000094f2c956bd0600a", 0xffffff7c) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) prctl$PR_SVE_GET_VL(0x33, 0x305a) 22:08:06 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='relserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:06 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiderfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:06 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000206, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:06 executing program 2: r0 = socket(0x8, 0xa, 0xfffffffffffffff8) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:06 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:06 executing program 2: r0 = socket(0x4, 0x1, 0x4) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000080)=0xc2) fcntl$setflags(r0, 0x2, 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x100, 0x1f, 0x800}, 0xc) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) 22:08:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000207, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:07 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiherfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:07 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei\nerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:07 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:07 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x0, 0x1, 0x0, 0x1, 0x2}}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'veth1_to_team\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "5244baae3f10cbd3993c1ec325854ef6a5187e894350ef68f8803efc282dede7752a"}, 0x26) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:07 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000208, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:07 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1101.337994] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:07 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiierfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:07 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000200)={0x0, 0x1f, 0x9, [], &(0x7f00000001c0)=0x7}) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0xbd50404cc9af5fe4, @bt={0x2, 0x4, 0x1, 0x553d54c41aa81ca7, 0x6, 0x4, 0x8, 0x100000000, 0x10000, 0x1, 0x8, 0x6314, 0xc11, 0xdf, 0x4, 0x1}}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:08:07 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei\"erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:07 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1101.495028] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000209, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1101.536519] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x5200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:07 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x1000000b5) fgetxattr(r0, &(0x7f0000000000)=@known='security.apparmor\x00', &(0x7f0000000040)=""/17, 0x11) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000100)) 22:08:07 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000020a, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:07 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reikerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:07 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)={0x4000, 0x2000}) fcntl$notify(r0, 0x402, 0x5) write(r0, &(0x7f0000000080)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$PPPIOCDISCONN(r1, 0x7439) 22:08:07 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei#erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:07 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ff", 0x24) [ 1101.895389] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1101.919078] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ff", 0x24) 22:08:08 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f0014f9f407112c020001007e0d0000000000000000008d000000000000", 0x24) 22:08:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000020b, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:08 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reilerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:08 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) fcntl$setstatus(r0, 0x4, 0x4400) 22:08:08 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei%erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000020c, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:08 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xdf1, 0x8000, 0x20}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x0, 0x4}, 0x8) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x3}, 0x28, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:08 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reioerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:08 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)={0x1, 0x0, [{0x5, 0x1, 0x0, 0x0, @irqchip={0xe9, 0x88}}]}) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8000, 0x0) 22:08:08 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei*erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ff", 0x24) 22:08:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000020d, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:08 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e751001f0014f9f4076c509532f48a7c0900000000000005", 0x1b) 22:08:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xd801000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000088", 0x24) 22:08:08 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x480) recvfrom$x25(r0, &(0x7f0000000040)=""/168, 0xa8, 0x2, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000340)={{0x1, 0x2, 0x100, 0x2, '\x00', 0xb38}, 0x6, 0x10000200, 0x1, 0x0, 0x9, 0xfffffffffffffffe, 'syz0\x00', &(0x7f0000000180)=[' \x00', '[keyringtrusted\x00', '/dev/snd/pcmC#D#p\x00', '\x00', '/dev/snd/pcmC#D#p\x00', '\x00', ' \x00', ',!$vboxnet0]security:\x00', '/dev/snd/pcmC#D#p\x00'], 0x7e, [], [0x27f, 0x6, 0x401, 0x1]}) 22:08:08 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiperfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000020e, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:08 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:09 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei+erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:09 executing program 2: r0 = socket(0x200000000010, 0x7, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/221, 0xdd) prctl$PR_SET_PDEATHSIG(0x1, 0x12) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:09 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed1000010035000000090000000000009e", 0x24) 22:08:09 executing program 2: r0 = socket(0x200000000010, 0x4, 0x3) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000020f, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:09 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiterfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:09 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000f0", 0x24) 22:08:09 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000180)={0x80000000, 0x4, 0x2, 0x7fff, &(0x7f0000000080)=[{}, {}, {}, {}]}) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x1}, 0x18) 22:08:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000210, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:09 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ff", 0x24) 22:08:09 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei,erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:09 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f00000000c0)="2400000052001f0014f904000000000000000705020001000a00000009000000000000006b4f366ff34c53e74de2e237a07ed119a16f3ed19e1719927f02ff52a338212605e5e14f581e35ce3b6d52dfd727077a4609b49cf9b85eb34f", 0xffffffffffffff45) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) recvfrom$x25(r0, &(0x7f0000000040)=""/36, 0x24, 0x12020, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="00000001"]) fchdir(r0) 22:08:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffff1f0000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:09 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000211, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:09 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiuerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:09 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:09 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei-erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed100001003500000009000000000000ff", 0x24) 22:08:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000212, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reixerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1104.404899] __ntfs_warning: 52 callbacks suppressed [ 1104.404914] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1104.431404] ntfs: (device loop4): parse_options(): NLS character set [ 1104.431404] p852 not found. Using previous one utf8. 22:08:10 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) socket(0x11, 0x1, 0x0) 22:08:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000213, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:10 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei.erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1104.450780] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiyerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1104.553571] nla_parse: 9 callbacks suppressed [ 1104.553582] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:10 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000140)="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", 0x101) [ 1104.598587] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000214, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:10 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='rei0erfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1104.729198] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:10 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400ba49bb634b06524a000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x2c) [ 1104.769746] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reizerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1104.847335] ntfs: (device loop4): parse_options(): NLS character set [ 1104.847335] p852 not found. Using previous one utf8. 22:08:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000215, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:10 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1104.896835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25531 sclass=netlink_route_socket pig=3026 comm=syz-executor.2 [ 1104.902311] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:11 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'bpq0\x00', &(0x7f0000000140)=@ethtool_perm_addr={0x20, 0x7e, "b39ea9694619b6f6a5d24f746c773ddef7d071f9d2b3a9524356fdefc086baac9aaba6e05b02d9c858c6a616108de8d078de4bd67e17311f2f177fb4e2ec9f9adef44af937c3094f9ea1e6518c4cb5759731b1157e2ec55341d063c9c045c70d5f743130b691d950561ed77aefb90fe31c19d541cb720249a92b24fd920f"}}) lookup_dcookie(0x800, &(0x7f0000000240)=""/111, 0x6f) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x24a3}, 0x4) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000040)={{0x2, 0x20}, 'port0\x00', 0x10, 0x10, 0x91, 0xc0d3, 0x4, 0x100000001, 0xad, 0x0, 0x3}) 22:08:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffa0010000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1105.094244] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000216, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:11 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiKerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1105.136077] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:11 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis\nrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1105.198846] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:11 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x1, {0xa, 0x4e20, 0x3f, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xe4, 0x2) ioctl$CAPI_SET_FLAGS(r3, 0x80044324, &(0x7f0000000200)=0x1) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000080)={{0x1, @name="9a7b03027e477bebe3697abe2625bc74973820823c99c49b3fdb06432c25528f"}, 0x8, 0x9, 0x8000}) set_mempolicy(0x0, &(0x7f0000000000)=0x8, 0x1) 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1105.327012] ntfs: (device loop4): parse_options(): NLS character set [ 1105.327012] p852 not found. Using previous one utf8. [ 1105.349780] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1105.354440] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:11 executing program 2: getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/sctp\x00') ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f00000000c0)) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = socket(0x200000000010, 0x3, 0x0) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000100)={0x17, "fd3cda0632100e517676a8100cdc83dfbd27f92698b9cce67cd66f1e5ad4a31196c552d4e02bb2ae1237bd197de1a83dbdb5a6848c111d31f0c7c84a3b2d8f9dd824418719b5ca1863ea74881e1b6f5ff2d364d4c48b656a98b2eed753216e562df0cd70f5e3ccff07b8a53ca45c822ee0f483cd42ec0f46c77f7792529dd371"}) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) [ 1105.389400] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:11 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiXerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000217, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1105.539411] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1105.566876] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:11 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis\"rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:11 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='\x00', r1}, 0x10) 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000218, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1105.728616] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:11 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiaerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:11 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'mangle\x00', 0x3c, "9a7145f6ab5d619c3fb2b6e297095382b9434fa2c168e52df2d26b541efe682fd75e954a5c75a06d9cca3f9add903f730a03f836377aa5ca02f687aa"}, &(0x7f0000000100)=0x60) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) [ 1105.769239] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:11 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:11 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e20, @local}}, 0x24) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x4, 0x4) r1 = socket(0x200000000010, 0x3, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000000)={0x6, {{0xa, 0x4e23, 0xa486, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xff}}}, 0x88) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000219, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:12 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis%rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:12 executing program 2: r0 = socket(0x5, 0x7, 0x2) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:12 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiberfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:12 executing program 2: r0 = socket(0x1, 0x80a, 0x3) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0xfffffff4) 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000021a, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:12 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0xfffffffffffffffe, @remote}}, 0x12) write(0xffffffffffffffff, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x180, 0x0) 22:08:12 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis,rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:12 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000100)=0x5) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400001}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="010025bd7000fcdbdf2503000000600002000800060081b0000008000500070000000800030003000000080004000500000008000d006100000008000d0000000000080002004e24000014000100fe8000000000000000000000000000aa08000e004e22000008000700f90000000800060061000000"], 0x7c}, 0x1, 0x0, 0x0, 0x20008010}, 0x20000000) ioctl$FIBMAP(r2, 0x2284, &(0x7f0000000040)=0x40000000002) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r4 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) r6 = geteuid() mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x4c, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}, {@privport='privport'}, {@posixacl='posixacl'}, {@fscache='fscache'}, {@cache_loose='cache=loose'}, {@fscache='fscache'}], [{@fowner_gt={'fowner>', r5}}, {@euid_gt={'euid>', r6}}]}}) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x8be6f2f4535be00a, 0x0) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r8) ioctl$BLKGETSIZE(r7, 0x1260, &(0x7f00000000c0)) 22:08:12 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reicerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000021b, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1106.633755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48421 sclass=netlink_route_socket pig=3195 comm=syz-executor.2 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1106.706411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48421 sclass=netlink_route_socket pig=3207 comm=syz-executor.2 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:12 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reislrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:12 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:udev_helper_exec_t:s0\x00', 0x28, 0x1) 22:08:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000021c, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:12 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiderfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18ece5728fa49da258a3532ac6dbedeb130000912becf8c5bd298edb07ffd0e4dbf66f27b6bc85e90e2a3a1dcc818994acf119f4bf33b6ca723720cc620d880000c2f7bb3cb4d7ef33fc4df0bbf0f202a5398d503a79c6fb489d68b76a16", @ANYRES32=0x1, @ANYBLOB="000000000000000095000000000000008500000053000000"], &(0x7f0000000100)='syzkaller\x00', 0x5, 0x66, &(0x7f0000000140)=""/102, 0x40f00, 0x2, [], 0x0, 0x8c8e7e16b57bab78, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x3, 0xfffffffffffffff9, 0xfffffffffffffd9a}, 0x10}, 0x70) r1 = accept4$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x10, 0x800) tee(r0, r1, 0xd, 0x4) r2 = socket(0x200000000010, 0x3, 0x0) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x515, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000040)={{0x87, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x3, 'nq\x00', 0x24, 0x1, 0x7c}, {@local, 0x4e23, 0x12001, 0x401, 0x3, 0x9}}, 0x44) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x7) 22:08:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:12 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:13 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x170) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @loopback, @empty}, &(0x7f0000000440)=0xc) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) accept4$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14, 0x80000) accept$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000006c0)=0x14) accept$packet(r0, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000a00)={@mcast2, 0x0}, &(0x7f0000000a40)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000e40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000a80)={0x37c, r1, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x130, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xe1}}}]}}, {{0x8, 0x1, r6}, {0xf8, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x128, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff7f}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}]}, 0x37c}}, 0x40) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) 22:08:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000021d, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reise\nfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:13 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:13 executing program 2: r0 = socket(0x200000000010, 0x0, 0xa71e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'syzkaller1\x00'}}) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14, 0x800) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r1, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x27}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r2}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x14) 22:08:13 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiherfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000021e, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x52, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:13 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="4d653268de1eaefcc20200e251a14543c3177324ecfd782f5c3a227ecf7f9397ac30141e08f2baff90214fba9bdb", 0x2e, r0) r1 = socket(0x11, 0x3, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="4ff9ff93a9f078ce4114dd1e76cba8299226552aee601dc9479d9755863aeee54aab91fa7936b5d0a007da64e5ac9e9dfc58f86dc31efe516899864f82b0bb5e4342fd61c37af313b744b9f7589f885506d3d5624519772dfb4890a37aec4ee4450d105172708771f7b8293515996a3dc9e338ba8023b8589fec2a88a0d893010ac7145e98ed69db9da0aded39f45a73c105774ddb5ba4f1c6e73b21f0a6a9546675e692d200e2127d9dcc2fd844", 0xae, 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='($\xa8\x00', 0xfffffffffffffffa) keyctl$negate(0xd, r2, 0x20000000, r3) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:13 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000021f, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reise%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:13 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:13 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) r1 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r1, 0x400) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000100)) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed020001000a0000000900000000000000", 0x24) 22:08:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x129, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:13 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiierfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:13 executing program 2: connect$tipc(0xffffffffffffffff, &(0x7f00000000c0)=@id={0x1e, 0x3, 0x2, {0x0, 0x2}}, 0x10) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x9) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), &(0x7f00000001c0)=0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0xffffff35) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x2) 22:08:13 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser\ns\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000220, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:14 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:14 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reikerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1d8, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:14 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000221, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:14 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser\"s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:14 executing program 2: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'ip6_vti0\x00'}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'team_slave_0\x00'}, 0x18) 22:08:14 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reilerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:14 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xf) 22:08:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000222, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:14 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser%s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:14 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x10) 22:08:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000223, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:15 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x35) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x4521b3de5ecb2f8c) r1 = gettid() write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0xffffffffffffffab) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) tkill(r1, 0x1000000000016) 22:08:15 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reioerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:15 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser,s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:15 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x52) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000224, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1109.215398] IPVS: sync thread started: state = MASTER, mcast_ifn = team_slave_0, syncid = 0, id = 0 [ 1109.227033] IPVS: stopping master sync thread 3393 ... 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xc0) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2901, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/172, 0xac}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000180)=""/161, 0xa1}, {0x0}], 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r7, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r6, 0x0) recvfrom$inet(r7, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r5, 0x0) shutdown(r2, 0x0) 22:08:15 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000225, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiperfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:15 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xec0) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000226, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:15 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xfdef) 22:08:15 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5200, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:16 executing program 2: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="73c775ccefbbc44b0a03a9e45afc4ef1be01fa8dff6aa640797ea9ed66a4f8fdeaef0ad9cfbe93fc6bbbc58165ebea25878b8a8da2563090b8f323579e28943ebc6c05f442ec8ab4712531e6e3d021fdf6b8ff2137a52dc71c80e2c56001709c67a1ec8cb09597ca220c3fc3486e96c86a85e981c45aa49593e75cc30a05287e"], 0x80) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) removexattr(&(0x7f00000001c0)='./file0/file0\x00', 0x0) 22:08:16 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x33fe0) 22:08:16 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiterfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000227, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:16 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reisercs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd801, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1110.589523] kauditd_printk_skb: 6 callbacks suppressed [ 1110.589541] audit: type=1400 audit(1565474896.604:121): avc: denied { map } for pid=3490 comm="syz-executor.2" path=2F6D656D66643A73797374656D2E736F636B70726F746F6E616D65202864656C6574656429 dev="tmpfs" ino=262213 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 22:08:16 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x20000324) 22:08:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000228, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:16 executing program 2: clone(0x8441fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x100, 0x0) 22:08:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:16 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reisergs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:16 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiuerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:16 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xfffffdef) 22:08:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:16 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xfffffffffffffdef) 22:08:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000229, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:17 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserjs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:17 executing program 3: r0 = socket(0x1, 0x7, 0xfffffffffffffffd) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x80001, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000040)) 22:08:17 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reixerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:17 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1fffff, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:17 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000000)="30f6d082c3e6eeba664b00badfb6fe0584e452edc377238c073e9c85adb650260c0b02c03b9f9140fd64bd5e20475d212b491ec26fbe602bc220c69bab8d3662e35aae593a5bb9b3d3b12aad677fb86ba5c50bab905211a6865044e44d2635f0442aadbe5888c37c0936abb073d1e77b2be3a645e63f0e9d3fd8bfc37990f069fb694a4bad59b72d0fcd2069a3af09361f1d3a44a5d87ce7493d6d8b") 22:08:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000022a, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:17 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiyerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:17 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserls\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:17 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x359, 0x4) 22:08:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:17 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) clock_settime(0x7, &(0x7f0000000000)={0x0, 0x989680}) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x6, 0x1, 0x1, 0x3, 0x8, 0x9, 0xb953, 0x0, 0x8000, 0x3000000, 0x4, 0x5, 0xffffffff, 0x40, 0x1, 0xa}}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x613790d105bd944a, 0x0) 22:08:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000022b, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:17 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reizerfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:17 executing program 2: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:17 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserrs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1111.950478] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:18 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) syncfs(r0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:18 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) getsockopt(r0, 0x776b, 0x7ff, &(0x7f0000000000)=""/204, &(0x7f0000000100)=0xcc) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1112.062406] ntfs: (device loop2): parse_options(): NLS character set [ 1112.062406] p852 not found. Using previous one utf8. [ 1112.095373] ntfs: (device loop2): parse_options(): Unrecognized mount option . 22:08:18 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000022c, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:18 executing program 3: r0 = socket(0x4, 0x3, 0xfffffffff7fffffe) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:18 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis\nrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:18 executing program 2 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:18 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200000, 0x0) write$capi20(r1, &(0x7f00000000c0)={0x10, 0x4, 0x83, 0x82, 0x10001, 0x5}, 0x10) connect$rds(r1, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04a4c4d0091c0007ed10000100350000000900000000000000e2961a011bb44d162f57e6f1624d9f118bb77d7f6e89e466c69dfc", 0x42) 22:08:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1112.421432] FAULT_INJECTION: forcing a failure. [ 1112.421432] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.454136] CPU: 1 PID: 3637 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1112.461127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:08:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000022d, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1112.470510] Call Trace: [ 1112.473142] dump_stack+0x172/0x1f0 [ 1112.476921] should_fail.cold+0xa/0x1b [ 1112.480850] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.486078] ? lock_downgrade+0x810/0x810 [ 1112.490447] __should_failslab+0x121/0x190 [ 1112.494735] should_failslab+0x9/0x14 [ 1112.498662] __kmalloc+0x2e2/0x750 [ 1112.502234] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1112.507845] ? fput+0x128/0x1a0 [ 1112.511156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1112.516736] ? strnlen_user+0x15f/0x1e0 [ 1112.520749] ? __x64_sys_memfd_create+0x13c/0x470 [ 1112.525638] __x64_sys_memfd_create+0x13c/0x470 [ 1112.530346] ? memfd_fcntl+0x1a50/0x1a50 [ 1112.534444] ? do_syscall_64+0x26/0x620 [ 1112.538463] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1112.543084] ? trace_hardirqs_on+0x67/0x220 [ 1112.547437] do_syscall_64+0xfd/0x620 [ 1112.551271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1112.556485] RIP: 0033:0x459829 [ 1112.559696] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1112.578622] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1112.586358] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1112.593653] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1112.600961] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1112.608258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a1c6426d4 22:08:18 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) accept4$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x80800) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1112.615552] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:18 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserws\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:18 executing program 2 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1112.742983] FAULT_INJECTION: forcing a failure. [ 1112.742983] name failslab, interval 1, probability 0, space 0, times 0 22:08:18 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis\"rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1112.796637] CPU: 1 PID: 3648 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1112.803639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.814053] Call Trace: [ 1112.816681] dump_stack+0x172/0x1f0 [ 1112.820356] should_fail.cold+0xa/0x1b [ 1112.824294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.829429] ? lock_downgrade+0x810/0x810 [ 1112.833625] __should_failslab+0x121/0x190 [ 1112.837896] should_failslab+0x9/0x14 [ 1112.841735] kmem_cache_alloc+0x2ae/0x700 [ 1112.845932] ? __alloc_fd+0x44d/0x560 [ 1112.849774] ? shmem_destroy_callback+0xc0/0xc0 [ 1112.854487] shmem_alloc_inode+0x1c/0x50 [ 1112.858591] alloc_inode+0x64/0x190 [ 1112.862274] new_inode_pseudo+0x19/0xf0 [ 1112.866290] new_inode+0x1f/0x40 [ 1112.869692] shmem_get_inode+0x84/0x780 [ 1112.873706] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1112.878678] shmem_file_setup+0x66/0x90 [ 1112.882690] __x64_sys_memfd_create+0x2a2/0x470 [ 1112.887402] ? memfd_fcntl+0x1a50/0x1a50 [ 1112.891696] ? do_syscall_64+0x26/0x620 [ 1112.895708] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1112.900334] ? trace_hardirqs_on+0x67/0x220 [ 1112.904697] do_syscall_64+0xfd/0x620 [ 1112.908542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1112.913765] RIP: 0033:0x459829 [ 1112.916983] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1112.936040] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:08:19 executing program 3: r0 = socket(0x10, 0x1, 0xffffffff) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000000)=0xcf2, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x0, 0x30}, &(0x7f0000000080)=0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xc7, 0x42, &(0x7f0000000100)="aa0dd96d62ba9bcf507443ce3aa491c1aeca3110fa4376de5b4ea4478ac291102ac28c90e097addc47d3b693d07423410419ffe0bb5c1d7dabf405bd3212bbf4f809c043850be88c0ce58d25083284d75ba5871cfa14b3775bd20d75a4f0428ac4c8ac5ed2889a0c2ae1fe2854495408cd792f557ab68e0f19f802ea88c5d2f18c5ab3018b86f67c137580bfb0641d689c60607327160b1d13b31123cde4949a29866a52715173514baaa5af81d7ccfb2c678893264cd4342add3bb86f4cc6410bfb786ce43bf0", &(0x7f0000000200)=""/66, 0xbd17}, 0x28) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x0, 0x20}, 0xc) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007de9d67bfff938e18330000000000000000", 0x24) [ 1112.943795] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1112.951196] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1112.958518] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1112.965822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a1c6426d4 [ 1112.973131] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000022e, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:19 executing program 2 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:19 executing program 3: r0 = socket(0x200000000011, 0x3, 0xffffffffffffffff) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf\n\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1113.187002] FAULT_INJECTION: forcing a failure. [ 1113.187002] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.222891] CPU: 0 PID: 3675 Comm: syz-executor.2 Not tainted 4.19.66 #40 22:08:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1113.229902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.239285] Call Trace: [ 1113.241906] dump_stack+0x172/0x1f0 [ 1113.245562] should_fail.cold+0xa/0x1b [ 1113.249497] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.254627] ? percpu_ref_put_many+0x94/0x190 [ 1113.259160] __should_failslab+0x121/0x190 [ 1113.263420] should_failslab+0x9/0x14 [ 1113.267239] kmem_cache_alloc+0x2ae/0x700 [ 1113.271409] ? map_id_range_down+0x1ee/0x370 [ 1113.275840] ? __put_user_ns+0x70/0x70 [ 1113.279759] selinux_inode_alloc_security+0xb6/0x2a0 [ 1113.284895] security_inode_alloc+0x8a/0xd0 [ 1113.289253] inode_init_always+0x56e/0xb40 [ 1113.293514] alloc_inode+0x81/0x190 [ 1113.297162] new_inode_pseudo+0x19/0xf0 [ 1113.301156] new_inode+0x1f/0x40 [ 1113.304550] shmem_get_inode+0x84/0x780 [ 1113.308570] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1113.313455] shmem_file_setup+0x66/0x90 [ 1113.317470] __x64_sys_memfd_create+0x2a2/0x470 [ 1113.322180] ? memfd_fcntl+0x1a50/0x1a50 [ 1113.326266] ? do_syscall_64+0x26/0x620 [ 1113.330288] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1113.334903] ? trace_hardirqs_on+0x67/0x220 [ 1113.339267] do_syscall_64+0xfd/0x620 [ 1113.343111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1113.348328] RIP: 0033:0x459829 [ 1113.351551] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1113.370667] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1113.378402] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1113.385701] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1113.393135] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1113.400519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a1c6426d4 [ 1113.407817] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:19 executing program 2 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:19 executing program 3: r0 = socket(0x4, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'teql0\x00', {0x2, 0x4e20, @rand_addr=0x20}}) r1 = semget$private(0x0, 0x39d513728251e0be, 0x202) semctl$SETVAL(r1, 0xd6cfd059732d4f08, 0x10, &(0x7f0000000000)=0x1f) 22:08:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000022f, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1113.531213] FAULT_INJECTION: forcing a failure. [ 1113.531213] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.557252] CPU: 0 PID: 3687 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1113.564247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.573636] Call Trace: [ 1113.576256] dump_stack+0x172/0x1f0 [ 1113.579921] should_fail.cold+0xa/0x1b [ 1113.583848] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.588991] ? lock_downgrade+0x810/0x810 [ 1113.593189] __should_failslab+0x121/0x190 [ 1113.597727] should_failslab+0x9/0x14 [ 1113.601557] kmem_cache_alloc+0x2ae/0x700 [ 1113.605743] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1113.610896] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1113.615502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.621082] ? timespec64_trunc+0xf0/0x180 [ 1113.625349] __d_alloc+0x2e/0x9c0 [ 1113.628832] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1113.634066] d_alloc_pseudo+0x1e/0x70 [ 1113.637890] alloc_file_pseudo+0xe2/0x280 [ 1113.642066] ? __lockdep_init_map+0x10c/0x5b0 [ 1113.646584] ? alloc_file+0x4d0/0x4d0 [ 1113.646607] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1113.646627] ? kasan_check_write+0x14/0x20 [ 1113.646668] __shmem_file_setup.part.0+0x108/0x2b0 [ 1113.646688] shmem_file_setup+0x66/0x90 [ 1113.656063] __x64_sys_memfd_create+0x2a2/0x470 [ 1113.656095] ? memfd_fcntl+0x1a50/0x1a50 [ 1113.656112] ? do_syscall_64+0x26/0x620 [ 1113.656131] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1113.665321] ? trace_hardirqs_on+0x67/0x220 [ 1113.665346] do_syscall_64+0xfd/0x620 [ 1113.665367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1113.665379] RIP: 0033:0x459829 [ 1113.665409] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:08:19 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis%rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x22000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:19 executing program 2 (fault-call:2 fault-nth:4): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:19 executing program 3: r0 = socket(0x200000000010, 0x3, 0x40000000) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) fcntl$setpipe(r0, 0x407, 0x7f) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@empty, @dev={0xfe, 0x80, [], 0x21}, @dev={0xfe, 0x80, [], 0x14}, 0x2, 0x4, 0x4, 0x400, 0x3, 0x4, r1}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x1, @remote, 0x1}}, [0x5, 0x800, 0x3, 0xe729, 0x8, 0x1f, 0x0, 0xfff, 0xde2, 0x1, 0x3, 0x3, 0x8, 0x0, 0x1]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={r3, @in={{0x2, 0x4e24, @remote}}, 0x9, 0x0, 0x1000, 0x7f, 0x1f}, &(0x7f0000000280)=0x98) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28c0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40800) [ 1113.674033] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1113.674050] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1113.674058] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1113.674068] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1113.674077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a1c6426d4 [ 1113.674086] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf\"\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000230, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x29010000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:19 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@nat={'nat\x00', 0x1b, 0x5, 0x640, 0x180, 0x460, 0x2f8, 0x180, 0x0, 0x570, 0x570, 0x570, 0x570, 0x570, 0x5, &(0x7f0000000480), {[{{@uncond, 0x0, 0x138, 0x180, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x9, 0x5, 0x1, [0x3, 0x400, 0x4, 0x6, 0x3, 0x10001, 0x2, 0x80000000, 0x3f, 0x1000, 0x1, 0x1, 0x10000, 0x1ceb, 0x2, 0x80000000], 0x8}}, @common=@eui64={0x28, 'eui64\x00'}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xe, @ipv6=@mcast1, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}, @port=0x4e23, @port=0x4e21}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0xff000000], [0xffffffff, 0xff000000], 'vlan0\x00', 'syzkaller1\x00', {}, {0xff}, 0x62, 0x8, 0x1, 0x45}, 0x0, 0x130, 0x178, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}, @common=@unspec=@connlimit={0x40, 'connlimit\x00', 0x1, {[0xffffff00, 0xff000000, 0x89f41ca1cb50824b], 0x0, 0x3}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xb84f40c47bb0df6, @ipv4=@dev={0xac, 0x14, 0x14, 0x25}, @ipv6=@empty, @gre_key=0xf1b, @gre_key=0x2}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xb, 0x9, 0x5}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x2, 0x6, 0x5, 0xc, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0xc, @ipv4=@multicast2, @ipv4=@loopback, @icmp_id=0x66, @gre_key=0x9}}}, {{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@dev={0xac, 0x14, 0x14, 0x25}, @port=0x4e24, @icmp_id=0x64}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a0) sendmsg$nl_netfilter(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x224, 0x11, 0x3, 0x320, 0x70bd28, 0x25dfdbff, {0x9ec9cf5a76fdc0cb, 0x0, 0xa}, [@typed={0x8, 0x17, @fd=r0}, @generic="23029329c36307bce72845a61445292dcca950d0057cd75d7e00885847ac543ed4bf3e16550242a0f5413cf96b45b82a959646fe031826c06c52d47a2fb82569e1501adcd2f3f5cdc02281de9cbf4ddf217e85d4ff95b59604aaf6fd5f6fde62fe610bb7d50af7032ea071162d1c1dede4368b5acb15844da42e8dc12c54e54e9acee2752aafb4317252d30e46eb3bacba795a287cc4afd87ab8665e172d20ff475e57b6f1f9a3659f0b655c6afb7223e4dce325d4c520402bd3fd5db8b5a3ccd54a65ca614b48a99494672bbae8296019d153847a650addc2ca1deaf78539", @typed={0x8, 0x6e, @uid=r1}, @generic="8adf11", @generic="fd8c54cd59bc3edc0f88510fdcc7f21c762766a31255f78c39f3fd4a2f292885966d2ab41ff4bd6b27cdce32c8cba7867e1aec74f6c3b764f1124e46b39a174aa6b42a0990c481770f505c9ba5f2c6cbc294acda6c0e59a1e7c51ce0f7606dbfc2f689773cb15cb4583a83dea6d95cfcdb3be8232f8a1abd77f8c86dead9d24106b272fe1d0f3e637476c34d6af718c21c2ba87af9b14287064f7ce4b5fc86d574b8b9417ebb70890eb0043e3c0ca086931e3e7050c1c08e81879c280554b4312020f3fde35817f45b643aa25e78e4cdb9b7e3cfc38e16ab03c25c3dc24b856b39bea4c63c7e3c7ef6759a2af8dce0cad45c347b1ec699", @generic="6a31f7994bc428b9a32f13852159a57aacd6ece17dddc6ff819e451f3ba816", @typed={0x8, 0x50, @fd=r0}]}, 0x224}, 0x1, 0x0, 0x0, 0x4008081}, 0x41) write(r0, &(0x7f0000000600)="2400000052001f0014f9f407112c04091c0007ed1000010035000008090000000000000087d1c711b6cd88ac002ed584a6a8b43a167b841c9f0c599369fa30e9dc98fb4e73e0faad7030cdff92ce79cb4178dcc25d5730d7eed282c4110c353b", 0xffffffffffffff9b) [ 1113.893800] FAULT_INJECTION: forcing a failure. [ 1113.893800] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.972425] CPU: 1 PID: 3712 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1113.979431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.988823] Call Trace: [ 1113.991448] dump_stack+0x172/0x1f0 [ 1113.995119] should_fail.cold+0xa/0x1b [ 1113.999038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.004168] ? lock_downgrade+0x810/0x810 [ 1114.008798] __should_failslab+0x121/0x190 [ 1114.013064] should_failslab+0x9/0x14 [ 1114.016933] kmem_cache_alloc+0x2ae/0x700 [ 1114.021124] __alloc_file+0x27/0x330 [ 1114.024865] alloc_empty_file+0x72/0x170 [ 1114.028975] alloc_file+0x5e/0x4d0 [ 1114.032547] alloc_file_pseudo+0x189/0x280 [ 1114.036808] ? alloc_file+0x4d0/0x4d0 [ 1114.040635] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1114.046203] ? kasan_check_write+0x14/0x20 [ 1114.050474] __shmem_file_setup.part.0+0x108/0x2b0 [ 1114.055442] shmem_file_setup+0x66/0x90 [ 1114.059462] __x64_sys_memfd_create+0x2a2/0x470 [ 1114.064161] ? memfd_fcntl+0x1a50/0x1a50 [ 1114.068256] ? do_syscall_64+0x26/0x620 [ 1114.072261] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1114.076905] ? trace_hardirqs_on+0x67/0x220 [ 1114.081263] do_syscall_64+0xfd/0x620 [ 1114.085100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.090312] RIP: 0033:0x459829 [ 1114.093548] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1114.112482] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:08:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000231, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1114.120249] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1114.127541] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1114.134838] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1114.142128] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a1c6426d4 [ 1114.149428] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:20 executing program 2 (fault-call:2 fault-nth:5): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:20 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reis,rfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:20 executing program 3: socket(0x200000000010, 0x3, 0x0) 22:08:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1114.325539] FAULT_INJECTION: forcing a failure. [ 1114.325539] name failslab, interval 1, probability 0, space 0, times 0 22:08:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1114.391753] CPU: 0 PID: 3734 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1114.398753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.408745] Call Trace: [ 1114.411360] dump_stack+0x172/0x1f0 [ 1114.415016] should_fail.cold+0xa/0x1b [ 1114.418931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.424070] ? lock_downgrade+0x810/0x810 [ 1114.428263] __should_failslab+0x121/0x190 [ 1114.432545] should_failslab+0x9/0x14 [ 1114.436371] kmem_cache_alloc+0x2ae/0x700 [ 1114.440549] __alloc_file+0x27/0x330 [ 1114.440573] alloc_empty_file+0x72/0x170 [ 1114.448374] alloc_file+0x5e/0x4d0 [ 1114.448393] alloc_file_pseudo+0x189/0x280 [ 1114.448410] ? alloc_file+0x4d0/0x4d0 [ 1114.448429] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1114.448446] ? kasan_check_write+0x14/0x20 [ 1114.448465] __shmem_file_setup.part.0+0x108/0x2b0 [ 1114.448487] shmem_file_setup+0x66/0x90 [ 1114.469891] __x64_sys_memfd_create+0x2a2/0x470 [ 1114.469911] ? memfd_fcntl+0x1a50/0x1a50 [ 1114.469925] ? do_syscall_64+0x26/0x620 [ 1114.469939] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1114.469963] ? trace_hardirqs_on+0x67/0x220 [ 1114.469981] do_syscall_64+0xfd/0x620 [ 1114.470001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.470020] RIP: 0033:0x459829 [ 1114.478963] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1114.478972] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:08:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000232, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:20 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:20 executing program 2 (fault-call:2 fault-nth:6): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1114.478986] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 1114.478994] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 1114.479003] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1114.479010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a1c6426d4 [ 1114.479032] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x52000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:20 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4a0001, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000080)) write$P9_RRENAMEAT(r0, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) [ 1114.630312] FAULT_INJECTION: forcing a failure. [ 1114.630312] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.659428] CPU: 0 PID: 3753 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1114.666453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.675836] Call Trace: [ 1114.678471] dump_stack+0x172/0x1f0 [ 1114.682148] should_fail.cold+0xa/0x1b [ 1114.686087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.691255] ? lock_downgrade+0x810/0x810 [ 1114.695475] __should_failslab+0x121/0x190 [ 1114.699756] should_failslab+0x9/0x14 [ 1114.703607] kmem_cache_alloc+0x2ae/0x700 [ 1114.707816] ? notify_change+0x6d5/0xfb0 [ 1114.711908] ? do_sys_ftruncate+0x41e/0x550 [ 1114.716267] getname_flags+0xd6/0x5b0 [ 1114.720106] getname+0x1a/0x20 [ 1114.723325] do_sys_open+0x2c9/0x550 [ 1114.727071] ? filp_open+0x80/0x80 [ 1114.730645] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1114.735439] ? do_syscall_64+0x26/0x620 [ 1114.739461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.744860] ? do_syscall_64+0x26/0x620 [ 1114.748887] __x64_sys_open+0x7e/0xc0 [ 1114.752745] do_syscall_64+0xfd/0x620 [ 1114.756681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1114.761903] RIP: 0033:0x413711 [ 1114.765122] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1114.784064] RSP: 002b:00007f1a1c641a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1114.791809] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1114.799197] RDX: 00007f1a1c641b0a RSI: 0000000000000002 RDI: 00007f1a1c641b00 [ 1114.806684] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1114.815889] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1114.823221] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000233, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:20 executing program 2 (fault-call:2 fault-nth:7): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:20 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reisdrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1115.000974] FAULT_INJECTION: forcing a failure. [ 1115.000974] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1115.012933] CPU: 0 PID: 3769 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1115.012944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.012970] Call Trace: [ 1115.032003] dump_stack+0x172/0x1f0 [ 1115.035656] should_fail.cold+0xa/0x1b [ 1115.039571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1115.044704] ? mark_held_locks+0x100/0x100 [ 1115.048989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1115.053785] __alloc_pages_nodemask+0x1ee/0x750 [ 1115.058500] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1115.063536] ? find_held_lock+0x35/0x130 [ 1115.063572] cache_grow_begin+0x91/0x8c0 [ 1115.063593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1115.077287] ? check_preemption_disabled+0x48/0x290 [ 1115.082338] kmem_cache_alloc+0x63b/0x700 [ 1115.086532] ? notify_change+0x6d5/0xfb0 [ 1115.090647] ? do_sys_ftruncate+0x41e/0x550 [ 1115.095008] getname_flags+0xd6/0x5b0 [ 1115.098837] getname+0x1a/0x20 [ 1115.102044] do_sys_open+0x2c9/0x550 [ 1115.105783] ? filp_open+0x80/0x80 [ 1115.109344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1115.114119] ? do_syscall_64+0x26/0x620 [ 1115.118118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.123513] ? do_syscall_64+0x26/0x620 [ 1115.127525] __x64_sys_open+0x7e/0xc0 [ 1115.131378] do_syscall_64+0xfd/0x620 [ 1115.135216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.140428] RIP: 0033:0x413711 [ 1115.143644] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1115.162575] RSP: 002b:00007f1a1c641a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1115.170318] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1115.177610] RDX: 00007f1a1c641b0a RSI: 0000000000000002 RDI: 00007f1a1c641b00 [ 1115.184904] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1115.192197] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 22:08:21 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x3) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xc) 22:08:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1115.199482] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:21 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000234, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:21 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1115.346744] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:21 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reisfrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000235, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:21 executing program 2 (fault-call:2 fault-nth:8): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:21 executing program 3: r0 = socket(0x200000000010, 0x1, 0xfffffffffffffffd) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x62) 22:08:21 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa0010000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1115.617765] FAULT_INJECTION: forcing a failure. [ 1115.617765] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.648346] CPU: 0 PID: 3808 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1115.655336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.664727] Call Trace: [ 1115.667348] dump_stack+0x172/0x1f0 [ 1115.671014] should_fail.cold+0xa/0x1b [ 1115.674946] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1115.680093] ? lock_downgrade+0x810/0x810 [ 1115.684277] __should_failslab+0x121/0x190 [ 1115.684298] should_failslab+0x9/0x14 [ 1115.684312] kmem_cache_alloc+0x2ae/0x700 [ 1115.684327] ? notify_change+0x6d5/0xfb0 [ 1115.684345] ? do_sys_ftruncate+0x41e/0x550 [ 1115.684366] getname_flags+0xd6/0x5b0 [ 1115.700645] getname+0x1a/0x20 [ 1115.700663] do_sys_open+0x2c9/0x550 [ 1115.700680] ? filp_open+0x80/0x80 [ 1115.700702] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1115.724126] ? do_syscall_64+0x26/0x620 [ 1115.728131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.733526] ? do_syscall_64+0x26/0x620 [ 1115.737558] __x64_sys_open+0x7e/0xc0 [ 1115.741424] do_syscall_64+0xfd/0x620 [ 1115.745270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1115.750491] RIP: 0033:0x413711 22:08:21 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80000, 0x0) 22:08:21 executing program 3: r0 = socket(0x200000000010, 0x3, 0xfffffffffffffffd) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x3ff, 0x0, 0x8, 0x400, 0x4, 0x3ff, 0x7fff}, 0x1c) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000540)={&(0x7f0000001c00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000080)=""/214, 0xd6}, {&(0x7f0000001c80)=""/250, 0xfa}, {&(0x7f0000000280)=""/75, 0x41}, {&(0x7f0000001e00)=""/23, 0xfffffffffffffeb4}, {&(0x7f0000000380)=""/14, 0xe}], 0x5, &(0x7f0000001e40)=""/195, 0xc3}, 0x10000) getsockname$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0}, &(0x7f00000006c0)=0x14) sendmsg$kcm(r1, &(0x7f0000001bc0)={&(0x7f0000000700)=@ll={0x11, 0xf7, r2, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000780)="ff78de6c5b82831109a2f7868f2de61a428d1fb9a4078f239dc78a14cc08643716068066fab0954471e560f6043211f4d456ff28b736b9326b0fdffeb958c89c54c0d9307f5d77af35a4a41a18abe5c5194b152b69ced7a6ebcf2d0ab0aeb0e2a4337835599dc3a9e26902c9bcbe7109c4623b6cc9e5c053576f5ab5e5b91194a9a5d69526f2e7734cb9c655a13caa0c1719b1d6f21c4d86f3fd69a7d748e288cf728bc3a57902284478e6dee1309ccc08c0557400ad21dd375b1e28c50875a5f59b", 0xc2}, {&(0x7f0000000880)="5c22e366c03f7fa97ece4aeadfb4d14e63dcdf709dc8ebd6208aae64da4bc23a7c55e60149a44d44e2b611c769d276df29b7a7a373796e2f1cc49b44e3509673be5f9a", 0x43}], 0x2, &(0x7f0000000940)=[{0x48, 0x10a, 0x9, "fc046b47595cdf1097dc325cb1954d0fed168f8b11d9c06b35f7165c105a4f9db5f06f93b577c1e3ce1e836f77f38879c3"}, {0x1010, 0x1ff, 0x9, "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"}, {0x88, 0x0, 0x0, "096de65d3c3b431c71557b0de621299c2c435af3c1d2da1b9af90ad9a9997cfecfa89dc0a8691517992f54aaf8f5e9e4fd03a130fbf2202114388fe646c986517245fb9c3fe8efe2589c4983ca9d9a575c3bc62d048b2931000490fdb9ba191786ad5da9f3083679c38bc5cc7837f848cd"}, {0xf8, 0x113, 0x9, "192195e4dd3f8e638bf01f79119e926e92d3d7753dfeea96646d15e7a5ae5520b48b688ad1ed2c0b4f88b0ff55776f9385b4a70392b5047eae168c51c4d7a8be2eb192bb10e7c051dbcb0ec69eec673ab680e8014e8cf3c9be25ceb6db0fea7e1c64a300c6f58fdb87ca8f88b17b4d79bb54a4a35f7bd007d24faf135c79dbc7d6b48c4b571dc1a6f19a7e03b40e3f841234d883470cc37c1587ff4419123a90485e8576ab0d8d49119afadecb6b9764cd99584576b4e486cc215815fe32450f19e988d93323f0e996bdb6b65bb68322fea865f4e037302f0fb090f732ab952515099c01c9"}, {0x48, 0x105, 0x2, "5ffc4ca9f4a637772896defa8f1cc3d25d0b1f12dc9179e015daad222ebf5a3034baed49810afade3962e54efb0da073bfde76c0ae"}, {0x60, 0x119, 0x8, "e712f193d99f3d312a364fa7a034cca89332fbf0da78f81d6cf0ac6819cdfcb0ad7abe72c3d7f7f6f97ee8e73b5eed233448b9ac32747a586c24d405ed57e46d53ed89622c1903260dfc301210"}], 0x1280}, 0x4080) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x73, 0x1000, 0x7}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000580)={0x0, 0xffff, 0x80, 0x7, 0x1, 0x4}, &(0x7f00000005c0)=0x14) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={r4, 0x5}, &(0x7f0000000640)=0x8) [ 1115.753703] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1115.772820] RSP: 002b:00007f1a1c641a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1115.780644] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1115.788042] RDX: 00007f1a1c641b0a RSI: 0000000000000002 RDI: 00007f1a1c641b00 [ 1115.795348] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1115.802647] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1115.802657] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000236, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:21 executing program 3: r0 = socket(0x200000000019, 0x2, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:21 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reislrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:22 executing program 2 (fault-call:2 fault-nth:9): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:22 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd8010000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1116.075565] FAULT_INJECTION: forcing a failure. [ 1116.075565] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.133097] CPU: 1 PID: 3841 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1116.140096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.149483] Call Trace: [ 1116.152113] dump_stack+0x172/0x1f0 [ 1116.155789] should_fail.cold+0xa/0x1b [ 1116.159718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1116.164861] ? lock_downgrade+0x810/0x810 [ 1116.169059] __should_failslab+0x121/0x190 [ 1116.173326] should_failslab+0x9/0x14 [ 1116.177160] kmem_cache_alloc+0x2ae/0x700 [ 1116.186305] ? __save_stack_trace+0x99/0x100 [ 1116.190756] __alloc_file+0x27/0x330 [ 1116.194502] alloc_empty_file+0x72/0x170 [ 1116.198594] path_openat+0xef/0x45e0 [ 1116.202328] ? __lock_acquire+0x6ee/0x49c0 [ 1116.206588] ? getname+0x1a/0x20 [ 1116.209972] ? do_sys_open+0x2c9/0x550 [ 1116.213882] ? __x64_sys_open+0x7e/0xc0 [ 1116.217885] ? do_syscall_64+0xfd/0x620 [ 1116.221893] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.227313] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1116.232029] ? __lock_is_held+0xb6/0x140 [ 1116.236134] ? __alloc_fd+0x44d/0x560 [ 1116.239977] do_filp_open+0x1a1/0x280 [ 1116.243843] ? may_open_dev+0x100/0x100 [ 1116.247856] ? lock_downgrade+0x810/0x810 [ 1116.252051] ? kasan_check_read+0x11/0x20 [ 1116.256230] ? do_raw_spin_unlock+0x57/0x270 [ 1116.260675] ? _raw_spin_unlock+0x2d/0x50 [ 1116.264949] ? __alloc_fd+0x44d/0x560 [ 1116.268812] do_sys_open+0x3fe/0x550 [ 1116.272566] ? filp_open+0x80/0x80 [ 1116.276143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1116.280943] ? do_syscall_64+0x26/0x620 [ 1116.284982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.290383] ? do_syscall_64+0x26/0x620 [ 1116.294404] __x64_sys_open+0x7e/0xc0 [ 1116.298258] do_syscall_64+0xfd/0x620 [ 1116.302100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.307318] RIP: 0033:0x413711 [ 1116.310535] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 22:08:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000237, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:22 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x16a95484) [ 1116.329498] RSP: 002b:00007f1a1c641a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1116.337247] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 1116.344545] RDX: 00007f1a1c641b0a RSI: 0000000000000002 RDI: 00007f1a1c641b00 [ 1116.351846] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1116.359147] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 1116.366451] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:22 executing program 2 (fault-call:2 fault-nth:10): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f00, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:22 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf,\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:22 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) socket$kcm(0x29, 0x7, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) quotactl(0x7ff, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000340)="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") 22:08:22 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reise\nfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000238, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1116.636350] FAULT_INJECTION: forcing a failure. [ 1116.636350] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.683244] CPU: 1 PID: 3872 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1116.690240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.699625] Call Trace: [ 1116.702258] dump_stack+0x172/0x1f0 [ 1116.705961] should_fail.cold+0xa/0x1b [ 1116.709904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1116.715051] ? lock_downgrade+0x810/0x810 [ 1116.719250] __should_failslab+0x121/0x190 [ 1116.723523] should_failslab+0x9/0x14 [ 1116.727364] kmem_cache_alloc_trace+0x2cc/0x760 [ 1116.732074] ? __lockdep_init_map+0x10c/0x5b0 [ 1116.736607] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1116.741400] __kthread_create_on_node+0xf2/0x460 [ 1116.746189] ? lock_acquire+0x16f/0x3f0 [ 1116.750203] ? __kthread_parkme+0x1b0/0x1b0 [ 1116.754570] ? lo_ioctl+0x1c4/0x20e0 [ 1116.758313] ? lock_downgrade+0x810/0x810 [ 1116.762503] ? mutex_trylock+0x1e0/0x1e0 [ 1116.766595] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1116.771383] kthread_create_on_node+0xbb/0xf0 [ 1116.775915] ? __kthread_create_on_node+0x460/0x460 [ 1116.780977] ? __lockdep_init_map+0x10c/0x5b0 [ 1116.785517] ? __lockdep_init_map+0x10c/0x5b0 [ 1116.790061] lo_ioctl+0xaf2/0x20e0 [ 1116.793640] ? lo_rw_aio_complete+0x350/0x350 [ 1116.798163] blkdev_ioctl+0xc38/0x1ab6 [ 1116.802082] ? blkpg_ioctl+0xa90/0xa90 [ 1116.805992] ? find_held_lock+0x35/0x130 [ 1116.811050] ? debug_check_no_obj_freed+0x200/0x464 [ 1116.816095] ? __fget+0x340/0x540 [ 1116.819588] block_ioctl+0xee/0x130 [ 1116.823236] ? blkdev_fallocate+0x410/0x410 [ 1116.827595] do_vfs_ioctl+0xd5f/0x1380 [ 1116.831516] ? selinux_file_ioctl+0x46f/0x5e0 [ 1116.836049] ? selinux_file_ioctl+0x125/0x5e0 [ 1116.840584] ? ioctl_preallocate+0x210/0x210 [ 1116.845030] ? selinux_file_mprotect+0x620/0x620 [ 1116.849827] ? iterate_fd+0x360/0x360 [ 1116.853657] ? do_sys_open+0x31d/0x550 [ 1116.857588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.863159] ? security_file_ioctl+0x8d/0xc0 [ 1116.867603] ksys_ioctl+0xab/0xd0 [ 1116.871091] __x64_sys_ioctl+0x73/0xb0 [ 1116.875011] do_syscall_64+0xfd/0x620 [ 1116.878846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.884063] RIP: 0033:0x459697 [ 1116.887283] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.906213] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1116.913958] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1116.921257] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 22:08:22 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4008, 0x101901) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x100000000, 0x401}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x1, 0xe90, 0x1}, &(0x7f0000000100)=0x14) r2 = socket(0x200000000010, 0x3, 0x0) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1116.928558] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1116.935876] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1116.943175] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:23 executing program 2 (fault-call:2 fault-nth:11): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:23 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xffffffffffffffd9) r1 = request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\xba:*\x00', 0xfffffffffffffffb) keyctl$update(0x2, r1, &(0x7f00000001c0)="c082f2b51fc6887b9114499d5e177f0109b9f92834c4ffb18b8c31326308740cfbbee16b2107e998cd8acd1d79d57dc4721e72ac5d9e79b66b9e4e343f602aba6ea290c0942295ea6509df52c4e941b7369b4999bc2e520099b86f80c7e8afd0c0a5a0875d9ec8746b0a0136abd0a88319637d99cc88fc2ece0e8d7a70e99bcdc6b987fd86b78785ba511c6fd1dd4f320ab59fe195567ef9b78ef73c4d30", 0x9e) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 22:08:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:23 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000239, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1a0ffffffff, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1117.252081] FAULT_INJECTION: forcing a failure. [ 1117.252081] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.282316] CPU: 1 PID: 3898 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1117.289329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.298704] Call Trace: [ 1117.301325] dump_stack+0x172/0x1f0 [ 1117.304997] should_fail.cold+0xa/0x1b [ 1117.309046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1117.314174] ? lock_downgrade+0x810/0x810 [ 1117.318359] __should_failslab+0x121/0x190 [ 1117.322612] should_failslab+0x9/0x14 [ 1117.326458] kmem_cache_alloc_trace+0x2cc/0x760 [ 1117.331155] ? __lockdep_init_map+0x10c/0x5b0 [ 1117.335681] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1117.340471] __kthread_create_on_node+0xf2/0x460 [ 1117.345252] ? lock_acquire+0x16f/0x3f0 [ 1117.349256] ? __kthread_parkme+0x1b0/0x1b0 [ 1117.353615] ? lo_ioctl+0x1c4/0x20e0 [ 1117.357358] ? lock_downgrade+0x810/0x810 [ 1117.361539] ? mutex_trylock+0x1e0/0x1e0 [ 1117.365635] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1117.370420] kthread_create_on_node+0xbb/0xf0 [ 1117.374959] ? __kthread_create_on_node+0x460/0x460 [ 1117.380020] ? __lockdep_init_map+0x10c/0x5b0 [ 1117.384550] ? __lockdep_init_map+0x10c/0x5b0 [ 1117.389082] lo_ioctl+0xaf2/0x20e0 [ 1117.392664] ? lo_rw_aio_complete+0x350/0x350 [ 1117.397194] blkdev_ioctl+0xc38/0x1ab6 [ 1117.401110] ? blkpg_ioctl+0xa90/0xa90 [ 1117.405034] ? find_held_lock+0x35/0x130 [ 1117.409128] ? debug_check_no_obj_freed+0x200/0x464 [ 1117.414178] ? __fget+0x340/0x540 [ 1117.417673] block_ioctl+0xee/0x130 [ 1117.421326] ? blkdev_fallocate+0x410/0x410 [ 1117.425678] do_vfs_ioctl+0xd5f/0x1380 [ 1117.429596] ? selinux_file_ioctl+0x46f/0x5e0 [ 1117.434120] ? selinux_file_ioctl+0x125/0x5e0 [ 1117.438650] ? ioctl_preallocate+0x210/0x210 [ 1117.443109] ? selinux_file_mprotect+0x620/0x620 [ 1117.447911] ? iterate_fd+0x360/0x360 [ 1117.451750] ? do_sys_open+0x31d/0x550 [ 1117.455676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.461232] ? security_file_ioctl+0x8d/0xc0 [ 1117.465666] ksys_ioctl+0xab/0xd0 [ 1117.469149] __x64_sys_ioctl+0x73/0xb0 [ 1117.473075] do_syscall_64+0xfd/0x620 [ 1117.476938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1117.482159] RIP: 0033:0x459697 22:08:23 executing program 3: r0 = socket(0x2, 0x80000, 0x20000000000000) r1 = msgget$private(0x0, 0x40) msgrcv(r1, &(0x7f0000000000)={0x0, ""/68}, 0x4c, 0x0, 0x2000) write(r0, &(0x7f0000000300)="2400000052001f0014f9f400112c04091c0007ed10000100350000000900000000000000", 0xfffffffffffffebc) 22:08:23 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reise%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1117.485374] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1117.504480] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1117.512217] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1117.519512] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1117.526808] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1117.534107] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1117.541411] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000023a, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:23 executing program 2 (fault-call:2 fault-nth:12): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1117.773276] FAULT_INJECTION: forcing a failure. [ 1117.773276] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.796281] CPU: 0 PID: 3929 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1117.803288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.812665] Call Trace: [ 1117.815291] dump_stack+0x172/0x1f0 [ 1117.818945] should_fail.cold+0xa/0x1b [ 1117.822869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1117.828006] ? lock_downgrade+0x810/0x810 [ 1117.832191] __should_failslab+0x121/0x190 [ 1117.836443] should_failslab+0x9/0x14 [ 1117.836458] kmem_cache_alloc+0x2ae/0x700 [ 1117.836475] ? find_held_lock+0x35/0x130 [ 1117.836494] ? kernfs_activate+0x192/0x1f0 [ 1117.836514] __kernfs_new_node+0xef/0x680 [ 1117.836533] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1117.844577] ? lock_downgrade+0x810/0x810 [ 1117.865924] ? kasan_check_write+0x14/0x20 [ 1117.870204] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1117.875098] ? wait_for_completion+0x440/0x440 [ 1117.879822] kernfs_new_node+0x99/0x130 [ 1117.883928] __kernfs_create_file+0x51/0x33b [ 1117.888397] sysfs_add_file_mode_ns+0x222/0x560 [ 1117.893115] internal_create_group+0x383/0xc30 [ 1117.897734] ? bd_set_size+0x89/0xb0 [ 1117.901599] ? remove_files.isra.0+0x190/0x190 [ 1117.906232] sysfs_create_group+0x20/0x30 [ 1117.910410] lo_ioctl+0xf8f/0x20e0 [ 1117.914010] ? lo_rw_aio_complete+0x350/0x350 [ 1117.919448] blkdev_ioctl+0xc38/0x1ab6 [ 1117.923369] ? blkpg_ioctl+0xa90/0xa90 [ 1117.927297] ? find_held_lock+0x35/0x130 [ 1117.931660] ? debug_check_no_obj_freed+0x200/0x464 [ 1117.936732] ? __fget+0x340/0x540 [ 1117.940235] block_ioctl+0xee/0x130 [ 1117.943905] ? blkdev_fallocate+0x410/0x410 [ 1117.948439] do_vfs_ioctl+0xd5f/0x1380 [ 1117.952364] ? selinux_file_ioctl+0x46f/0x5e0 [ 1117.956890] ? selinux_file_ioctl+0x125/0x5e0 [ 1117.961456] ? ioctl_preallocate+0x210/0x210 [ 1117.965898] ? selinux_file_mprotect+0x620/0x620 [ 1117.970694] ? iterate_fd+0x360/0x360 [ 1117.974531] ? do_sys_open+0x31d/0x550 [ 1117.978461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.984030] ? security_file_ioctl+0x8d/0xc0 [ 1117.988489] ksys_ioctl+0xab/0xd0 [ 1117.991999] __x64_sys_ioctl+0x73/0xb0 [ 1117.995939] do_syscall_64+0xfd/0x620 [ 1117.999774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1118.004999] RIP: 0033:0x459697 22:08:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000023b, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1118.008219] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1118.027145] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1118.034925] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1118.042232] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1118.049527] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1118.056823] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1118.064124] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:24 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1118.245458] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:24 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser\ns\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000023c, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:24 executing program 2 (fault-call:2 fault-nth:13): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:24 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x2) 22:08:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:24 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1118.582367] FAULT_INJECTION: forcing a failure. [ 1118.582367] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.632252] CPU: 1 PID: 3960 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1118.639248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.648632] Call Trace: [ 1118.651261] dump_stack+0x172/0x1f0 [ 1118.654936] should_fail.cold+0xa/0x1b [ 1118.658867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1118.664007] ? lock_downgrade+0x810/0x810 [ 1118.668202] __should_failslab+0x121/0x190 [ 1118.672512] should_failslab+0x9/0x14 [ 1118.676342] kmem_cache_alloc+0x2ae/0x700 [ 1118.680546] ? __schedule+0x1495/0x1dc0 [ 1118.684573] __kernfs_new_node+0xef/0x680 [ 1118.688751] ? _raw_spin_unlock_irq+0x28/0x90 [ 1118.693293] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1118.698093] ? __lock_acquire+0x6ee/0x49c0 [ 1118.702366] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1118.706902] ? __schedule+0x1495/0x1dc0 [ 1118.710926] ? __lock_is_held+0xb6/0x140 [ 1118.715038] kernfs_new_node+0x99/0x130 [ 1118.719053] kernfs_create_dir_ns+0x52/0x160 [ 1118.723504] internal_create_group+0x1cb/0xc30 [ 1118.728109] ? bd_set_size+0x89/0xb0 [ 1118.731854] ? remove_files.isra.0+0x190/0x190 [ 1118.736483] sysfs_create_group+0x20/0x30 [ 1118.740672] lo_ioctl+0xf8f/0x20e0 [ 1118.744242] ? lo_rw_aio_complete+0x350/0x350 [ 1118.748766] blkdev_ioctl+0xc38/0x1ab6 [ 1118.752680] ? blkpg_ioctl+0xa90/0xa90 [ 1118.756589] ? find_held_lock+0x35/0x130 [ 1118.760762] ? debug_check_no_obj_freed+0x200/0x464 [ 1118.765811] ? __fget+0x340/0x540 [ 1118.769330] block_ioctl+0xee/0x130 [ 1118.772976] ? blkdev_fallocate+0x410/0x410 [ 1118.777440] do_vfs_ioctl+0xd5f/0x1380 [ 1118.781360] ? selinux_file_ioctl+0x46f/0x5e0 [ 1118.785885] ? selinux_file_ioctl+0x125/0x5e0 [ 1118.790413] ? ioctl_preallocate+0x210/0x210 [ 1118.794855] ? selinux_file_mprotect+0x620/0x620 [ 1118.799653] ? iterate_fd+0x360/0x360 [ 1118.803509] ? do_sys_open+0x31d/0x550 [ 1118.807430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.814127] ? security_file_ioctl+0x8d/0xc0 [ 1118.818568] ksys_ioctl+0xab/0xd0 [ 1118.822573] __x64_sys_ioctl+0x73/0xb0 [ 1118.826581] do_syscall_64+0xfd/0x620 [ 1118.830415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1118.835642] RIP: 0033:0x459697 [ 1118.838863] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1118.857793] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1118.865555] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1118.872847] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 22:08:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000023d, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1118.880148] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1118.887438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1118.894741] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:25 executing program 3: r0 = socket(0x2, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000040)={0xa, 0x0, 0x3c1, 0x4, 'syz0\x00', 0xc920}) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1118.975788] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:25 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser%s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:25 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4080, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x19b840) fchmod(r2, 0x2) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x3) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000080)) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xfffffffffffffee0) 22:08:25 executing program 2 (fault-call:2 fault-nth:14): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000023e, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:25 executing program 3: r0 = socket(0x8, 0x80006, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000000, 0x4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200400, 0x0) socket$inet6(0xa, 0x4, 0x1a8a) 22:08:25 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfK\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1119.364355] FAULT_INJECTION: forcing a failure. [ 1119.364355] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.388488] CPU: 1 PID: 4001 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1119.395491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.404878] Call Trace: [ 1119.407524] dump_stack+0x172/0x1f0 [ 1119.411236] should_fail.cold+0xa/0x1b [ 1119.415166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1119.420395] ? lock_downgrade+0x810/0x810 [ 1119.424597] __should_failslab+0x121/0x190 [ 1119.428868] should_failslab+0x9/0x14 [ 1119.432835] kmem_cache_alloc+0x2ae/0x700 [ 1119.437408] ? lock_downgrade+0x810/0x810 [ 1119.441608] __kernfs_new_node+0xef/0x680 [ 1119.445814] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1119.450609] ? wait_for_completion+0x440/0x440 [ 1119.455239] ? mutex_unlock+0xd/0x10 [ 1119.458983] ? kernfs_activate+0x192/0x1f0 [ 1119.463288] kernfs_new_node+0x99/0x130 [ 1119.467661] __kernfs_create_file+0x51/0x33b [ 1119.472111] sysfs_add_file_mode_ns+0x222/0x560 [ 1119.476827] internal_create_group+0x383/0xc30 [ 1119.481446] ? bd_set_size+0x89/0xb0 [ 1119.485216] ? remove_files.isra.0+0x190/0x190 [ 1119.489841] sysfs_create_group+0x20/0x30 [ 1119.494042] lo_ioctl+0xf8f/0x20e0 [ 1119.497712] ? lo_rw_aio_complete+0x350/0x350 [ 1119.502233] blkdev_ioctl+0xc38/0x1ab6 [ 1119.506150] ? blkpg_ioctl+0xa90/0xa90 [ 1119.510061] ? find_held_lock+0x35/0x130 [ 1119.514156] ? debug_check_no_obj_freed+0x200/0x464 [ 1119.519219] ? __fget+0x340/0x540 [ 1119.522715] block_ioctl+0xee/0x130 [ 1119.526397] ? blkdev_fallocate+0x410/0x410 [ 1119.530748] do_vfs_ioctl+0xd5f/0x1380 [ 1119.534688] ? selinux_file_ioctl+0x46f/0x5e0 [ 1119.539221] ? selinux_file_ioctl+0x125/0x5e0 [ 1119.543748] ? ioctl_preallocate+0x210/0x210 [ 1119.548187] ? selinux_file_mprotect+0x620/0x620 [ 1119.553011] ? iterate_fd+0x360/0x360 [ 1119.556839] ? do_sys_open+0x31d/0x550 [ 1119.560780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.566341] ? security_file_ioctl+0x8d/0xc0 [ 1119.570781] ksys_ioctl+0xab/0xd0 [ 1119.574264] __x64_sys_ioctl+0x73/0xb0 [ 1119.578197] do_syscall_64+0xfd/0x620 [ 1119.582027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1119.587248] RIP: 0033:0x459697 [ 1119.590475] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:08:25 executing program 3: r0 = socket(0x4, 0x1, 0x3) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000040)={0x12, 0xf9, 0x8, 0x1, 0x4, 0x4}) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) socket$tipc(0x1e, 0x2, 0x0) [ 1119.609749] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1119.617499] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1119.624885] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1119.632193] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1119.639497] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1119.646803] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1119.703264] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x40000000000023f, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:25 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:25 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000000)=0x400) 22:08:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:25 executing program 2 (fault-call:2 fault-nth:15): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:25 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:26 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x102000000000000, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1c00000000000000, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) 22:08:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000240, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:26 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiser/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1120.122320] FAULT_INJECTION: forcing a failure. [ 1120.122320] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.164409] CPU: 0 PID: 4047 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1120.171416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.180801] Call Trace: [ 1120.183441] dump_stack+0x172/0x1f0 [ 1120.187107] should_fail.cold+0xa/0x1b [ 1120.191034] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1120.196165] ? lock_downgrade+0x810/0x810 [ 1120.200373] __should_failslab+0x121/0x190 [ 1120.204660] should_failslab+0x9/0x14 [ 1120.208492] kmem_cache_alloc+0x2ae/0x700 [ 1120.212669] ? lock_downgrade+0x810/0x810 [ 1120.216849] __kernfs_new_node+0xef/0x680 [ 1120.221036] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1120.225834] ? wait_for_completion+0x440/0x440 [ 1120.230472] ? mutex_unlock+0xd/0x10 [ 1120.234209] ? kernfs_activate+0x192/0x1f0 [ 1120.238478] kernfs_new_node+0x99/0x130 [ 1120.242500] __kernfs_create_file+0x51/0x33b [ 1120.246950] sysfs_add_file_mode_ns+0x222/0x560 [ 1120.251858] internal_create_group+0x383/0xc30 [ 1120.257516] ? bd_set_size+0x89/0xb0 [ 1120.261280] ? remove_files.isra.0+0x190/0x190 [ 1120.265923] sysfs_create_group+0x20/0x30 [ 1120.270110] lo_ioctl+0xf8f/0x20e0 [ 1120.273685] ? lo_rw_aio_complete+0x350/0x350 [ 1120.278216] blkdev_ioctl+0xc38/0x1ab6 [ 1120.282134] ? blkpg_ioctl+0xa90/0xa90 [ 1120.286067] ? find_held_lock+0x35/0x130 [ 1120.290159] ? debug_check_no_obj_freed+0x200/0x464 [ 1120.295213] ? __fget+0x340/0x540 [ 1120.298704] block_ioctl+0xee/0x130 [ 1120.302369] ? blkdev_fallocate+0x410/0x410 [ 1120.306739] do_vfs_ioctl+0xd5f/0x1380 [ 1120.310752] ? selinux_file_ioctl+0x46f/0x5e0 [ 1120.315372] ? selinux_file_ioctl+0x125/0x5e0 [ 1120.319898] ? ioctl_preallocate+0x210/0x210 [ 1120.324336] ? selinux_file_mprotect+0x620/0x620 [ 1120.329171] ? iterate_fd+0x360/0x360 [ 1120.332995] ? do_sys_open+0x31d/0x550 [ 1120.336924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.342490] ? security_file_ioctl+0x8d/0xc0 [ 1120.346925] ksys_ioctl+0xab/0xd0 [ 1120.350411] __x64_sys_ioctl+0x73/0xb0 [ 1120.354320] do_syscall_64+0xfd/0x620 [ 1120.358161] entry_SYSCALL_64_after_hwframe+0x49/0xbe 22:08:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000241, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1120.363373] RIP: 0033:0x459697 [ 1120.366587] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1120.385521] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1120.393270] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1120.400739] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1120.408047] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:08:26 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20400, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000080)={0x0, 0x0, [0x2, 0x40, 0x10001, 0xffffffffffffffff, 0x636], 0xfd7}) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) 22:08:26 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfa\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1120.415340] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1120.422644] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1120.506832] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:26 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x287f71e6, 0x100) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r2) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) 22:08:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:26 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfb\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:26 executing program 2 (fault-call:2 fault-nth:16): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000242, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:26 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) socket(0x0, 0x1, 0x148) 22:08:26 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiseres\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1120.864302] FAULT_INJECTION: forcing a failure. [ 1120.864302] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.887637] CPU: 1 PID: 4089 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1120.894620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.904007] Call Trace: [ 1120.906638] dump_stack+0x172/0x1f0 [ 1120.910308] should_fail.cold+0xa/0x1b [ 1120.914341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1120.919514] ? lock_downgrade+0x810/0x810 [ 1120.923710] __should_failslab+0x121/0x190 [ 1120.927978] should_failslab+0x9/0x14 [ 1120.931814] kmem_cache_alloc+0x2ae/0x700 [ 1120.935994] ? lock_downgrade+0x810/0x810 [ 1120.940176] __kernfs_new_node+0xef/0x680 [ 1120.944363] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1120.949159] ? wait_for_completion+0x440/0x440 [ 1120.953792] ? mutex_unlock+0xd/0x10 [ 1120.957542] ? kernfs_activate+0x192/0x1f0 [ 1120.961811] kernfs_new_node+0x99/0x130 [ 1120.965840] __kernfs_create_file+0x51/0x33b [ 1120.970299] sysfs_add_file_mode_ns+0x222/0x560 [ 1120.975016] internal_create_group+0x383/0xc30 [ 1120.979633] ? bd_set_size+0x89/0xb0 [ 1120.983388] ? remove_files.isra.0+0x190/0x190 [ 1120.988015] sysfs_create_group+0x20/0x30 [ 1120.992197] lo_ioctl+0xf8f/0x20e0 [ 1120.995773] ? lo_rw_aio_complete+0x350/0x350 [ 1121.000303] blkdev_ioctl+0xc38/0x1ab6 [ 1121.004225] ? blkpg_ioctl+0xa90/0xa90 [ 1121.008168] ? find_held_lock+0x35/0x130 [ 1121.012255] ? debug_check_no_obj_freed+0x200/0x464 [ 1121.017309] ? __fget+0x340/0x540 [ 1121.020797] block_ioctl+0xee/0x130 [ 1121.024440] ? blkdev_fallocate+0x410/0x410 [ 1121.028813] do_vfs_ioctl+0xd5f/0x1380 [ 1121.032719] ? selinux_file_ioctl+0x46f/0x5e0 [ 1121.037235] ? selinux_file_ioctl+0x125/0x5e0 [ 1121.041757] ? ioctl_preallocate+0x210/0x210 [ 1121.046207] ? selinux_file_mprotect+0x620/0x620 [ 1121.050991] ? iterate_fd+0x360/0x360 [ 1121.054834] ? do_sys_open+0x31d/0x550 [ 1121.058749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1121.064298] ? security_file_ioctl+0x8d/0xc0 [ 1121.068728] ksys_ioctl+0xab/0xd0 [ 1121.072206] __x64_sys_ioctl+0x73/0xb0 [ 1121.076116] do_syscall_64+0xfd/0x620 [ 1121.079936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.085146] RIP: 0033:0x459697 [ 1121.088349] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1121.107265] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:08:27 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1121.115027] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1121.122322] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1121.129613] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1121.136907] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1121.144300] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000243, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1121.233887] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:27 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000006c0), 0x4) r1 = socket(0x200000000010, 0x89975fb99f24636, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x1000, &(0x7f0000000040)=0x2) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, [], [{0x8001, 0x42de, 0xffff, 0x299, 0x1, 0x3}, {0x7, 0x6, 0xfffffffffffffff9, 0x3, 0x0, 0x2}], [[]]}) 22:08:27 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:27 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserls\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2901000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:27 executing program 2 (fault-call:2 fault-nth:17): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:27 executing program 3: r0 = socket(0x5, 0x3, 0x100000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x800, 0x0) write(r1, &(0x7f0000000340)="07112c04091c0007ed100001003500000092344bb700000000366cf9ba4e6990def71626cb06000075ebba3359e8debd60a002aa3962c97179ad6d4f8799af44e96ee1a5777e8a6545e9ec7572437818eec123e88a03380500cbcc9ef7786bf017cfd935e68c1a414e9cd20804ef27edcf3bec9cb24a3962a474b5128c13471f001ef6e7703c4f9f7df77c634fbc2c7f684e158761b8a1df96874ff3e4a3f8e49afff0bbfdc72df56c2c0400000000000000a346e74be71b0cef726170489740c01c48101d4af5c3ef7af0162600"/216, 0xd8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0], 0x1}) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x1cc, r2, 0x400, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x54, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x65}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5656}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x402d}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3a4ab9ab}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa06}]}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40}, 0x398e8a280f9e6d25) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x120c2, 0x0) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000080)={0x0, 0x10000, 0x8, [], &(0x7f0000000040)=0x7}) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x84, r2, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4041}, 0x40) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 22:08:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000244, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:27 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfd\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1121.652713] FAULT_INJECTION: forcing a failure. [ 1121.652713] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.708674] CPU: 1 PID: 4134 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1121.715658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.725034] Call Trace: [ 1121.727650] dump_stack+0x172/0x1f0 [ 1121.731305] should_fail.cold+0xa/0x1b [ 1121.735231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1121.740359] ? lock_downgrade+0x810/0x810 [ 1121.744532] __should_failslab+0x121/0x190 [ 1121.748792] should_failslab+0x9/0x14 [ 1121.752614] kmem_cache_alloc+0x2ae/0x700 [ 1121.756784] ? lock_downgrade+0x810/0x810 [ 1121.761055] __kernfs_new_node+0xef/0x680 [ 1121.765234] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1121.770024] ? wait_for_completion+0x440/0x440 [ 1121.774647] ? mutex_unlock+0xd/0x10 [ 1121.778385] ? kernfs_activate+0x192/0x1f0 [ 1121.782648] kernfs_new_node+0x99/0x130 [ 1121.786659] __kernfs_create_file+0x51/0x33b [ 1121.791116] sysfs_add_file_mode_ns+0x222/0x560 [ 1121.795827] internal_create_group+0x383/0xc30 [ 1121.800447] ? bd_set_size+0x89/0xb0 [ 1121.804221] ? remove_files.isra.0+0x190/0x190 [ 1121.808846] sysfs_create_group+0x20/0x30 [ 1121.813032] lo_ioctl+0xf8f/0x20e0 [ 1121.816607] ? lo_rw_aio_complete+0x350/0x350 [ 1121.821132] blkdev_ioctl+0xc38/0x1ab6 [ 1121.825039] ? blkpg_ioctl+0xa90/0xa90 [ 1121.828948] ? find_held_lock+0x35/0x130 [ 1121.833038] ? debug_check_no_obj_freed+0x200/0x464 [ 1121.838082] ? __fget+0x340/0x540 [ 1121.841556] block_ioctl+0xee/0x130 [ 1121.845189] ? blkdev_fallocate+0x410/0x410 [ 1121.849532] do_vfs_ioctl+0xd5f/0x1380 [ 1121.853432] ? selinux_file_ioctl+0x46f/0x5e0 [ 1121.857946] ? selinux_file_ioctl+0x125/0x5e0 [ 1121.862467] ? ioctl_preallocate+0x210/0x210 [ 1121.866892] ? selinux_file_mprotect+0x620/0x620 [ 1121.871670] ? iterate_fd+0x360/0x360 [ 1121.875491] ? do_sys_open+0x31d/0x550 [ 1121.879409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1121.884976] ? security_file_ioctl+0x8d/0xc0 [ 1121.889418] ksys_ioctl+0xab/0xd0 [ 1121.892897] __x64_sys_ioctl+0x73/0xb0 [ 1121.896805] do_syscall_64+0xfd/0x620 [ 1121.900630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1121.905849] RIP: 0033:0x459697 [ 1121.909063] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1121.929514] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1121.937257] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1121.944558] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1121.951854] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:08:27 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) write(r0, &(0x7f0000000200)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x8f1c25d1a77ffdbb) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0xdff0, 0x84600) [ 1121.959151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1121.966446] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1121.995974] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:28 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf\n\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0xffffff56) write(0xffffffffffffffff, &(0x7f0000000140)="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", 0x119) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @host}, 0x10) 22:08:28 executing program 2 (fault-call:2 fault-nth:18): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000245, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:28 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfh\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:28 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="6368616e676568617420242984693078303030303030303030303030303030325e65746831006b657972696e67a700636772"], 0x32) r1 = socket(0x5, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) sched_getattr(r2, &(0x7f0000000100)={0x30}, 0x30, 0x55274dbece5d6794) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5200000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:28 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf\"\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1122.419067] FAULT_INJECTION: forcing a failure. [ 1122.419067] name failslab, interval 1, probability 0, space 0, times 0 22:08:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000246, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:28 executing program 3: r0 = socket(0xa, 0x3, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0xc) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0xffffffffffffff68}, 0x8) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000340)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3}}, 0x18) [ 1122.581265] CPU: 0 PID: 4171 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1122.588255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.597634] Call Trace: [ 1122.600260] dump_stack+0x172/0x1f0 [ 1122.603921] should_fail.cold+0xa/0x1b [ 1122.607840] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1122.612966] ? lock_downgrade+0x810/0x810 [ 1122.617161] __should_failslab+0x121/0x190 [ 1122.621430] should_failslab+0x9/0x14 [ 1122.625253] kmem_cache_alloc_trace+0x2cc/0x760 [ 1122.629982] kobject_uevent_env+0x387/0x101d [ 1122.634438] kobject_uevent+0x20/0x26 [ 1122.638264] lo_ioctl+0x100b/0x20e0 [ 1122.641917] ? lo_rw_aio_complete+0x350/0x350 [ 1122.646445] blkdev_ioctl+0xc38/0x1ab6 [ 1122.650447] ? blkpg_ioctl+0xa90/0xa90 [ 1122.654360] ? find_held_lock+0x35/0x130 [ 1122.658456] ? debug_check_no_obj_freed+0x200/0x464 [ 1122.663512] ? __fget+0x340/0x540 [ 1122.667002] block_ioctl+0xee/0x130 [ 1122.670648] ? blkdev_fallocate+0x410/0x410 [ 1122.674995] do_vfs_ioctl+0xd5f/0x1380 [ 1122.678902] ? selinux_file_ioctl+0x46f/0x5e0 [ 1122.683426] ? selinux_file_ioctl+0x125/0x5e0 [ 1122.687943] ? ioctl_preallocate+0x210/0x210 [ 1122.692376] ? selinux_file_mprotect+0x620/0x620 [ 1122.697160] ? iterate_fd+0x360/0x360 [ 1122.701010] ? do_sys_open+0x31d/0x550 [ 1122.704932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1122.710516] ? security_file_ioctl+0x8d/0xc0 [ 1122.714992] ksys_ioctl+0xab/0xd0 [ 1122.718473] __x64_sys_ioctl+0x73/0xb0 [ 1122.722390] do_syscall_64+0xfd/0x620 [ 1122.726213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.731420] RIP: 0033:0x459697 [ 1122.734634] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1122.753555] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1122.761306] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1122.768604] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1122.775998] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1122.783295] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1122.790684] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1122.974538] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:29 executing program 3: r0 = socket(0x4, 0x3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0x0, 0x2, 0x1, {0x0, 0x6, 0x5, 0x4}}) write(r0, &(0x7f0000000180)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000bee906e187c2d035973e13fbb0d2b62b7444292b70912a342515789e", 0x40) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@loopback, r2}, 0x9) 22:08:29 executing program 2 (fault-call:2 fault-nth:19): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd801000000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:29 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfi\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000247, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:29 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000000)=0x7) io_setup(0x9, &(0x7f0000000200)=0x0) io_submit(r2, 0x3, &(0x7f0000000500)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x1, r1, &(0x7f0000000240)="5087bca05b8d87e5b164c23bc9bce8d466be823de353f585e7adbfaea99c335e826316c19d5c49e9222421fe62c2d0d0af0427974665d1536a390a900022", 0x3e, 0x4000000000000, 0x0, 0x2, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f0000000340)="6b4bbe203b5285eb36a47e35d41f227799404ec439e91149835105069699b72b579a41bedd33c4ee75684cdcb280dfb74e51246a1256dfe473896124f70a690b025ab5716d21b5e32071f055629e06a232b2ec78d030c8f882cdb7367a05b5c3dae5c0774631b87372a3d77b2ff9b94ae2c5b3b30a9147121c982cf920f60a9b807b73f61c00466859311b703a4de4d4d326298472387ff1e2", 0x99, 0x10000, 0x0, 0x2, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x1, r1, &(0x7f0000000400)="6fc12ccc3a7e268ba8468b38b12ba8c43bd99574f39581afd6ccc55ead7666a731778fb6e5ea1250d0950a4d0cf284c391c6e31b7975577ced8e6deba5ffb24c01220ca09c0816adda1d5a3ec7c4f7367e9e891b8eacc8b7537bf30e8f55d39099e6e676346048644ca20ad278f95eff89e72ca54eb21165b3e7306cf66e39bf8dfda6724013deec90dc19c97078208d6ceee2b6cc61454a494dbe9b336275bddd4c72c6b8f6b49b0e7a99c4de14d630d3f46e19b4d94d9e0a8cb12373", 0xbd, 0x7, 0x0, 0x1}]) r3 = getuid() fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000140)='./file0\x00', r3, r4, 0x100) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'ppp0&'}, {}], 0xa, "c8d63db26b0e7724329c4f2d943dbbcb85a1656d2595e8defc6d3aec9508ac7a9ce26331389d14ab95331eea68193f8cc823d2237d3ecf4eaeb0d0c9460cf1c6d302bf278f63d8e36d018bceeb76717037980fc3"}, 0x66) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:29 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1123.264823] FAULT_INJECTION: forcing a failure. [ 1123.264823] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.280890] CPU: 0 PID: 4216 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1123.287884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.297268] Call Trace: [ 1123.299890] dump_stack+0x172/0x1f0 [ 1123.303550] should_fail.cold+0xa/0x1b [ 1123.307473] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1123.312608] ? lock_downgrade+0x810/0x810 [ 1123.316792] __should_failslab+0x121/0x190 [ 1123.321054] should_failslab+0x9/0x14 [ 1123.324883] kmem_cache_alloc+0x2ae/0x700 [ 1123.329050] ? lock_downgrade+0x810/0x810 [ 1123.333238] __kernfs_new_node+0xef/0x680 [ 1123.337410] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1123.342191] ? wait_for_completion+0x440/0x440 [ 1123.346824] ? mutex_unlock+0xd/0x10 [ 1123.350565] ? kernfs_activate+0x192/0x1f0 [ 1123.354831] kernfs_new_node+0x99/0x130 [ 1123.358840] __kernfs_create_file+0x51/0x33b [ 1123.363280] sysfs_add_file_mode_ns+0x222/0x560 [ 1123.367985] internal_create_group+0x383/0xc30 [ 1123.372584] ? bd_set_size+0x89/0xb0 [ 1123.376327] ? remove_files.isra.0+0x190/0x190 [ 1123.380962] sysfs_create_group+0x20/0x30 [ 1123.385134] lo_ioctl+0xf8f/0x20e0 [ 1123.388699] ? lo_rw_aio_complete+0x350/0x350 [ 1123.393224] blkdev_ioctl+0xc38/0x1ab6 [ 1123.397133] ? blkpg_ioctl+0xa90/0xa90 [ 1123.401144] ? find_held_lock+0x35/0x130 [ 1123.405235] ? debug_check_no_obj_freed+0x200/0x464 [ 1123.410286] ? __fget+0x340/0x540 [ 1123.413772] block_ioctl+0xee/0x130 [ 1123.417418] ? blkdev_fallocate+0x410/0x410 [ 1123.421773] do_vfs_ioctl+0xd5f/0x1380 [ 1123.425718] ? selinux_file_ioctl+0x46f/0x5e0 [ 1123.430232] ? selinux_file_ioctl+0x125/0x5e0 [ 1123.434758] ? ioctl_preallocate+0x210/0x210 [ 1123.439183] ? selinux_file_mprotect+0x620/0x620 [ 1123.443971] ? iterate_fd+0x360/0x360 [ 1123.447788] ? do_sys_open+0x31d/0x550 [ 1123.451708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1123.457268] ? security_file_ioctl+0x8d/0xc0 [ 1123.461708] ksys_ioctl+0xab/0xd0 [ 1123.465183] __x64_sys_ioctl+0x73/0xb0 [ 1123.469091] do_syscall_64+0xfd/0x620 [ 1123.472910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.478118] RIP: 0033:0x459697 [ 1123.481329] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1123.500251] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1123.507992] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 22:08:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000248, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffff1f0000000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1123.515293] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1123.522591] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1123.529880] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1123.537175] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1123.598439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=4228 comm=syz-executor.3 22:08:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1123.640140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=4228 comm=syz-executor.3 [ 1123.658820] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:29 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/211, &(0x7f0000000100)=0xd3) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:29 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfk\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:29 executing program 2 (fault-call:2 fault-nth:20): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000104, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:29 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffa0010000, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1124.016462] FAULT_INJECTION: forcing a failure. [ 1124.016462] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.036728] CPU: 0 PID: 4261 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1124.043706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.053082] Call Trace: [ 1124.055704] dump_stack+0x172/0x1f0 [ 1124.059366] should_fail.cold+0xa/0x1b [ 1124.063275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1124.068397] ? lock_downgrade+0x810/0x810 [ 1124.072589] __should_failslab+0x121/0x190 [ 1124.076847] should_failslab+0x9/0x14 [ 1124.080666] kmem_cache_alloc+0x2ae/0x700 [ 1124.084836] ? lock_downgrade+0x810/0x810 [ 1124.089008] __kernfs_new_node+0xef/0x680 [ 1124.093178] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1124.097968] ? wait_for_completion+0x440/0x440 [ 1124.102586] ? mutex_unlock+0xd/0x10 [ 1124.106318] ? kernfs_activate+0x192/0x1f0 [ 1124.110575] kernfs_new_node+0x99/0x130 [ 1124.114577] __kernfs_create_file+0x51/0x33b [ 1124.119015] sysfs_add_file_mode_ns+0x222/0x560 [ 1124.123721] internal_create_group+0x383/0xc30 [ 1124.128415] ? bd_set_size+0x89/0xb0 [ 1124.132156] ? remove_files.isra.0+0x190/0x190 [ 1124.136766] sysfs_create_group+0x20/0x30 [ 1124.140928] lo_ioctl+0xf8f/0x20e0 [ 1124.144504] ? lo_rw_aio_complete+0x350/0x350 [ 1124.149017] blkdev_ioctl+0xc38/0x1ab6 [ 1124.152938] ? blkpg_ioctl+0xa90/0xa90 [ 1124.156938] ? find_held_lock+0x35/0x130 [ 1124.161030] ? debug_check_no_obj_freed+0x200/0x464 [ 1124.166072] ? __fget+0x340/0x540 [ 1124.169551] block_ioctl+0xee/0x130 [ 1124.173191] ? blkdev_fallocate+0x410/0x410 [ 1124.177538] do_vfs_ioctl+0xd5f/0x1380 [ 1124.182232] ? selinux_file_ioctl+0x46f/0x5e0 [ 1124.186763] ? selinux_file_ioctl+0x125/0x5e0 [ 1124.191275] ? ioctl_preallocate+0x210/0x210 [ 1124.195695] ? selinux_file_mprotect+0x620/0x620 [ 1124.200484] ? iterate_fd+0x360/0x360 [ 1124.204307] ? do_sys_open+0x31d/0x550 [ 1124.208214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.213781] ? security_file_ioctl+0x8d/0xc0 [ 1124.218208] ksys_ioctl+0xab/0xd0 [ 1124.221679] __x64_sys_ioctl+0x73/0xb0 [ 1124.225622] do_syscall_64+0xfd/0x620 [ 1124.229453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.234752] RIP: 0033:0x459697 [ 1124.237982] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1124.256910] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:08:30 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfl\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:30 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x6, {0xffffffff, 0x0, 0x8, 0x6}}, 0x20) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1124.264659] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1124.271956] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1124.279244] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1124.286540] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1124.294013] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1124.364880] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:30 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) connect$netrom(r1, &(0x7f0000000100)={{0x3, @null, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000040)={0xf4, 0x80000000, 0x8, 'queue1\x00', 0x105bbcc6}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x134, r2, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xeb3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xceca}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9059}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @empty, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xc4, @empty, 0x3f}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x62}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ae}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf5}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000180)={0x1, 0xffffffff}, 0x2) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:30 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:30 executing program 2 (fault-call:2 fault-nth:21): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:30 executing program 3: r0 = socket(0x200000000010, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, &(0x7f00000000c0)=0x4) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1124.643315] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1124.681290] ntfs: (device loop4): parse_options(): NLS character set [ 1124.681290] p852 not found. Using previous one utf8. [ 1124.695509] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1124.711600] FAULT_INJECTION: forcing a failure. [ 1124.711600] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.733560] CPU: 1 PID: 4294 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1124.740542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.749947] Call Trace: [ 1124.752575] dump_stack+0x172/0x1f0 [ 1124.756248] should_fail.cold+0xa/0x1b [ 1124.760186] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1124.765322] ? lock_downgrade+0x810/0x810 [ 1124.769517] __should_failslab+0x121/0x190 [ 1124.773786] should_failslab+0x9/0x14 [ 1124.777612] kmem_cache_alloc_node+0x26c/0x710 [ 1124.782237] ? find_held_lock+0x35/0x130 [ 1124.786336] __alloc_skb+0xd5/0x5f0 [ 1124.790017] ? skb_scrub_packet+0x490/0x490 [ 1124.794379] ? kasan_check_read+0x11/0x20 [ 1124.798565] alloc_uevent_skb+0x83/0x1e2 [ 1124.802669] kobject_uevent_env+0xaa3/0x101d [ 1124.807124] kobject_uevent+0x20/0x26 [ 1124.812111] lo_ioctl+0x100b/0x20e0 [ 1124.815779] ? lo_rw_aio_complete+0x350/0x350 [ 1124.820316] blkdev_ioctl+0xc38/0x1ab6 [ 1124.824236] ? blkpg_ioctl+0xa90/0xa90 [ 1124.828243] ? find_held_lock+0x35/0x130 [ 1124.832331] ? debug_check_no_obj_freed+0x200/0x464 [ 1124.837388] ? __fget+0x340/0x540 [ 1124.840886] block_ioctl+0xee/0x130 [ 1124.844547] ? blkdev_fallocate+0x410/0x410 [ 1124.849267] do_vfs_ioctl+0xd5f/0x1380 [ 1124.853192] ? selinux_file_ioctl+0x46f/0x5e0 [ 1124.857831] ? selinux_file_ioctl+0x125/0x5e0 [ 1124.862366] ? ioctl_preallocate+0x210/0x210 [ 1124.866810] ? selinux_file_mprotect+0x620/0x620 [ 1124.871610] ? iterate_fd+0x360/0x360 [ 1124.875446] ? do_sys_open+0x31d/0x550 [ 1124.879390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.884963] ? security_file_ioctl+0x8d/0xc0 [ 1124.889416] ksys_ioctl+0xab/0xd0 [ 1124.893001] __x64_sys_ioctl+0x73/0xb0 [ 1124.896933] do_syscall_64+0xfd/0x620 [ 1124.900779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1124.905998] RIP: 0033:0x459697 [ 1124.909483] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1124.928445] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1124.936200] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1124.943501] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1124.950978] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1124.958273] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1124.965577] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000249, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:31 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:31 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:31 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000380)={0x4000000000000000, 0x5000, 0x8, 0x9, 0xf}) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x10000) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getegid() r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000008c0)={&(0x7f00000004c0)={0x3e0, r3, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc7}]}]}, @TIPC_NLA_LINK={0xf0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x906}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2643}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8ca5}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'vlan0\x00'}}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x8}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffe01}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf2ec}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff8657}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9099}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0}]}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9474}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfef}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x3e0}, 0x1, 0x0, 0x0, 0x4040850}, 0x4000) connect$l2tp(r1, &(0x7f0000000ac0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @empty}, 0x1, 0x1, 0x3, 0x2}}, 0x2e) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800040}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x160, r4, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6740}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcce0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xaf2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xec1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r5 = socket(0x200000000010, 0x3, 0x0) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r6) r7 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x400) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0xc) ioctl$LOOP_CHANGE_FD(r7, 0x4c06, r5) write(r5, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1125.027573] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 1125.050574] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:31 executing program 2 (fault-call:2 fault-nth:22): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1125.128892] ntfs: (device loop4): parse_options(): NLS character set [ 1125.128892] p852 not found. Using previous one utf8. [ 1125.166138] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:31 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x10000000}) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getsa={0x30, 0x12, 0x4, 0x70bd29, 0x25dfdbfb, {@in6=@dev={0xfe, 0x80, [], 0x16}, 0x4d3, 0x2, 0x32}, [@output_mark={0x8, 0x1d, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44004902, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:31 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfp\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1125.318784] FAULT_INJECTION: forcing a failure. [ 1125.318784] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.337814] CPU: 1 PID: 4322 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1125.344886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.354269] Call Trace: [ 1125.356902] dump_stack+0x172/0x1f0 [ 1125.360569] should_fail.cold+0xa/0x1b [ 1125.364496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1125.369622] ? lock_downgrade+0x810/0x810 [ 1125.373809] __should_failslab+0x121/0x190 [ 1125.378071] should_failslab+0x9/0x14 [ 1125.381895] kmem_cache_alloc+0x2ae/0x700 [ 1125.386069] ? refcount_add_not_zero_checked+0x240/0x240 [ 1125.391533] ? lock_downgrade+0x810/0x810 [ 1125.395705] skb_clone+0x156/0x3e0 [ 1125.399268] netlink_broadcast_filtered+0x86e/0xb20 [ 1125.404407] netlink_broadcast+0x3a/0x50 [ 1125.408507] kobject_uevent_env+0xad4/0x101d [ 1125.412950] kobject_uevent+0x20/0x26 [ 1125.416765] lo_ioctl+0x100b/0x20e0 [ 1125.420431] ? lo_rw_aio_complete+0x350/0x350 [ 1125.424955] blkdev_ioctl+0xc38/0x1ab6 [ 1125.428864] ? blkpg_ioctl+0xa90/0xa90 [ 1125.432800] ? find_held_lock+0x35/0x130 [ 1125.436884] ? debug_check_no_obj_freed+0x200/0x464 [ 1125.441927] ? __fget+0x340/0x540 [ 1125.445407] block_ioctl+0xee/0x130 [ 1125.449059] ? blkdev_fallocate+0x410/0x410 [ 1125.453401] do_vfs_ioctl+0xd5f/0x1380 [ 1125.457307] ? selinux_file_ioctl+0x46f/0x5e0 [ 1125.461814] ? selinux_file_ioctl+0x125/0x5e0 [ 1125.466330] ? ioctl_preallocate+0x210/0x210 [ 1125.470761] ? selinux_file_mprotect+0x620/0x620 [ 1125.475633] ? iterate_fd+0x360/0x360 [ 1125.479461] ? do_sys_open+0x31d/0x550 [ 1125.483376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1125.488949] ? security_file_ioctl+0x8d/0xc0 [ 1125.493394] ksys_ioctl+0xab/0xd0 [ 1125.496880] __x64_sys_ioctl+0x73/0xb0 [ 1125.500906] do_syscall_64+0xfd/0x620 [ 1125.504749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1125.509966] RIP: 0033:0x459697 [ 1125.513182] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1125.532112] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1125.539854] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1125.547153] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1125.554458] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1125.561759] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1125.569058] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x2000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r2 = socket(0x200000000010, 0x3, 0x0) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0)=0x1, 0x4) 22:08:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1125.643243] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:31 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf,\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1125.749558] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1125.834937] ntfs: (device loop4): parse_options(): NLS character set [ 1125.834937] p852 not found. Using previous one utf8. [ 1125.864471] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:31 executing program 3: r0 = socket(0xa, 0x6, 0xffff) write(r0, &(0x7f0000000040)="2400000052001f00a401f407112c398b72525eb56c61008b04091c0007ed100001003500000008e7000000000000", 0x9) fchmod(r0, 0x10010) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x3000000000000000, 0x4, 0x1000, 0x1, 0x7, 0x3, 0x3, 0x100000000, 0x108, 0x38, 0xc, 0x1, 0x7, 0x20, 0x1, 0xaf, 0x8, 0x5}, [{0x7, 0x3, 0x58e, 0xffffffff, 0x7, 0x9, 0x6, 0x2}], "34aeb986907bb805ec059483d71e13f285d1c704a6244f5f01e1d199653323cf969979bc669649589e2833d25aab30b9f797d89f940470a81c71e5ab6544f6e8a60918b2df217a8970f3167d6b060dec3f0477851061c4eee5c013b0a514"}, 0xb6) 22:08:32 executing program 2 (fault-call:2 fault-nth:23): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1126.005955] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000000c0)=0x1009004, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) recvfrom$inet6(r2, &(0x7f0000000480)=""/4096, 0x1000, 0x10001, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @local, 0x7}, 0x1c) 22:08:32 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, r1, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @multicast2}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8817}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 22:08:32 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserft\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1126.133024] FAULT_INJECTION: forcing a failure. [ 1126.133024] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.161205] CPU: 0 PID: 4360 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1126.168190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.177560] Call Trace: [ 1126.180198] dump_stack+0x172/0x1f0 [ 1126.183858] should_fail.cold+0xa/0x1b [ 1126.187797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1126.192931] ? lock_downgrade+0x810/0x810 [ 1126.197133] __should_failslab+0x121/0x190 [ 1126.201395] should_failslab+0x9/0x14 [ 1126.205234] kmem_cache_alloc+0x2ae/0x700 [ 1126.209418] getname_flags+0xd6/0x5b0 [ 1126.213253] do_mkdirat+0xa0/0x2a0 [ 1126.216825] ? __ia32_sys_mknod+0xb0/0xb0 [ 1126.221006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1126.225782] ? do_syscall_64+0x26/0x620 [ 1126.229773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.235153] ? do_syscall_64+0x26/0x620 [ 1126.239148] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1126.243759] __x64_sys_mkdir+0x5c/0x80 [ 1126.247678] do_syscall_64+0xfd/0x620 [ 1126.251502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.256725] RIP: 0033:0x458c47 [ 1126.259936] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1126.278873] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1126.286645] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1126.293977] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1126.301317] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1126.308615] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1126.315921] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:32 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) getpeername$inet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000140)={0x1, 0x0, 0x102, 0x2, {0x7fff, 0x84, 0x1, 0xc33}}) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5ba, 0x40000) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x480101, 0x0) ioctl$KDDISABIO(r4, 0x4b37) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f00000000c0)) 22:08:32 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:32 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xfffffffffffffdca) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000000)={0x4, 0xd548}) 22:08:32 executing program 2 (fault-call:2 fault-nth:24): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:32 executing program 3: r0 = socket(0x200000000010, 0x3, 0x5) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0x7, 0x5736, 0x7fff}, 0x10) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:32 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f00000000c0)=0x10) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0c0002000000000000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x5, 0x20000) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:32 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1126.784035] FAULT_INJECTION: forcing a failure. [ 1126.784035] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.797004] CPU: 0 PID: 4399 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1126.803975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.814897] Call Trace: [ 1126.817537] dump_stack+0x172/0x1f0 [ 1126.821193] should_fail.cold+0xa/0x1b [ 1126.825192] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1126.830313] ? lock_downgrade+0x810/0x810 [ 1126.834493] __should_failslab+0x121/0x190 [ 1126.838752] should_failslab+0x9/0x14 [ 1126.842574] kmem_cache_alloc+0x2ae/0x700 [ 1126.846749] ? refcount_add_not_zero_checked+0x240/0x240 [ 1126.852243] ? lock_downgrade+0x810/0x810 [ 1126.856428] skb_clone+0x156/0x3e0 [ 1126.860004] netlink_broadcast_filtered+0x86e/0xb20 [ 1126.865059] netlink_broadcast+0x3a/0x50 [ 1126.869232] kobject_uevent_env+0xad4/0x101d [ 1126.873700] kobject_uevent+0x20/0x26 [ 1126.877519] lo_ioctl+0x100b/0x20e0 [ 1126.881181] ? lo_rw_aio_complete+0x350/0x350 [ 1126.885698] blkdev_ioctl+0xc38/0x1ab6 [ 1126.889603] ? blkpg_ioctl+0xa90/0xa90 [ 1126.893517] ? find_held_lock+0x35/0x130 [ 1126.897601] ? debug_check_no_obj_freed+0x200/0x464 [ 1126.902642] ? __fget+0x340/0x540 [ 1126.906136] block_ioctl+0xee/0x130 [ 1126.909870] ? blkdev_fallocate+0x410/0x410 [ 1126.914236] do_vfs_ioctl+0xd5f/0x1380 [ 1126.918148] ? selinux_file_ioctl+0x46f/0x5e0 [ 1126.922676] ? selinux_file_ioctl+0x125/0x5e0 [ 1126.927201] ? ioctl_preallocate+0x210/0x210 [ 1126.931654] ? selinux_file_mprotect+0x620/0x620 [ 1126.936452] ? iterate_fd+0x360/0x360 [ 1126.940295] ? do_sys_open+0x31d/0x550 [ 1126.944227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1126.949797] ? security_file_ioctl+0x8d/0xc0 [ 1126.954237] ksys_ioctl+0xab/0xd0 [ 1126.957726] __x64_sys_ioctl+0x73/0xb0 [ 1126.961650] do_syscall_64+0xfd/0x620 [ 1126.965489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1126.970703] RIP: 0033:0x459697 [ 1126.973928] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1126.992868] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.000612] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 1127.007913] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 1127.015354] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1127.022650] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1127.029957] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="487f0e581b112bc3"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:33 executing program 3: r0 = socket(0x5, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1127.211127] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:33 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:33 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18000200}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x2b4, r1, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7, @local, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3f, @ipv4={[], [], @loopback}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc8c}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x19}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x27fda8d1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x117ba150}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xac29}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffe0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) 22:08:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = dup(r0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0xcc7, 0x400, 0x1ff, 0x0, 0x11, 0x2, 0x100, 0x6, 0x100000001, 0x0, 0x427, 0x8}) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='^\x00', &(0x7f0000000140)='\'\x00', &(0x7f0000000180)='\'+\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='%posix_acl_accessGPL%-\x00'], &(0x7f00000003c0)=[&(0x7f0000000280)='[\x00', &(0x7f00000002c0)=']\\-:\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='-em1\'\x00']) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:33 executing program 2 (fault-call:2 fault-nth:25): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1127.394778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=4432 comm=syz-executor.3 22:08:33 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb267eec96c0b7b7e}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x2d8, r1, 0xc0305a3d5553e5, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff9}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x38de, @local, 0x1faf}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @mcast2, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xc54, @loopback, 0x80000000}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @mcast2, 0x20}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @mcast1, 0x3}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1487}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}]}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x400c081}, 0x90) socket(0x3, 0x3, 0x7) 22:08:33 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1127.542237] FAULT_INJECTION: forcing a failure. [ 1127.542237] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1127.554105] CPU: 0 PID: 4445 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1127.561110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.570489] Call Trace: [ 1127.573123] dump_stack+0x172/0x1f0 [ 1127.576791] should_fail.cold+0xa/0x1b [ 1127.580712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1127.585851] ? mark_held_locks+0x100/0x100 [ 1127.590119] ? blkdev_ioctl+0x12e/0x1ab6 [ 1127.594209] __alloc_pages_nodemask+0x1ee/0x750 [ 1127.599005] ? debug_check_no_obj_freed+0x200/0x464 [ 1127.604051] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1127.609087] ? find_held_lock+0x35/0x130 [ 1127.613182] cache_grow_begin+0x91/0x8c0 [ 1127.617266] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1127.622830] ? check_preemption_disabled+0x48/0x290 [ 1127.627880] kmem_cache_alloc+0x63b/0x700 [ 1127.632069] getname_flags+0xd6/0x5b0 [ 1127.635912] do_mkdirat+0xa0/0x2a0 [ 1127.639490] ? __ia32_sys_mknod+0xb0/0xb0 [ 1127.643663] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1127.648445] ? do_syscall_64+0x26/0x620 [ 1127.652439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.657824] ? do_syscall_64+0x26/0x620 [ 1127.661836] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1127.666451] __x64_sys_mkdir+0x5c/0x80 [ 1127.670364] do_syscall_64+0xfd/0x620 [ 1127.674227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.679424] RIP: 0033:0x458c47 [ 1127.682721] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1127.702167] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1127.709898] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1127.717174] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1127.724454] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1127.731745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1127.739029] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xd4, 0x20, 0xc5, 0x1, 0x6}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r2, 0xfffffffffffffff8}, &(0x7f0000000140)=0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='maps\x00') ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000001c0)={0x0, 0x2b, 0xd, 0x5, 0x5, 0x7, 0x0, 0x72, 0x1}) [ 1127.792129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=4451 comm=syz-executor.3 [ 1127.820348] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 1127.833009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=4451 comm=syz-executor.3 22:08:33 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) 22:08:33 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserf0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:34 executing program 2 (fault-call:2 fault-nth:26): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:34 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1ef) 22:08:34 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0c0000e2ff2f0000f8138ea768851b453ea0ff81980b1af130b77f91f4d2709611107735ce705b13bb518be38cde7e634b3931ac6aed762c526e56047879df8e23b28a26fb676cbeb42dfac8342a9c095b503798e16cf1558153d7eac7bf717cc0080e7ea69f79be5b20817c58336a3e26108e7c3927405578b573db7b5a82d44737529f9fe60f5f4ac494fda92705d5e927c98368cd23379560771a13c601b2bae6469c3ba023daca43bc1a636c5006224286a4bff9caaf22d3b441e5d2378d7cdc41015f50c5e267f9f70edf64ab172641ca1868d8e29dedaab1"], 0x8) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000400)=[@sack_perm, @sack_perm, @mss, @sack_perm, @mss={0x2, 0xfffffffffffffff8}, @mss={0x2, 0x400}, @timestamp, @window={0x3, 0x1000, 0x4}], 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000440)={{0x4, 0x4, 0x8, 0x1, 'syz0\x00', 0x8}, 0x1, 0x2, 0x7, r2, 0x6, 0x0, 'syz0\x00', &(0x7f00000000c0)=['/selinux/policy\x00', 'A\'\x00', ']&-\x00', '\x00', '/selinux/policy\x00', '/selinux/policy\x00'], 0x38, [], [0x7a8, 0xe11, 0x80000001, 0xec5f]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000100)=0x40000000000212a, 0xfffffffffffffecb) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:34 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfy\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1128.109226] FAULT_INJECTION: forcing a failure. [ 1128.109226] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.178636] CPU: 0 PID: 4473 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1128.185622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.194987] Call Trace: [ 1128.197608] dump_stack+0x172/0x1f0 [ 1128.201262] should_fail.cold+0xa/0x1b [ 1128.205180] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1128.210305] ? lock_downgrade+0x810/0x810 [ 1128.214489] __should_failslab+0x121/0x190 [ 1128.218841] should_failslab+0x9/0x14 [ 1128.222656] kmem_cache_alloc+0x2ae/0x700 [ 1128.226830] getname_flags+0xd6/0x5b0 [ 1128.230677] do_mkdirat+0xa0/0x2a0 [ 1128.234254] ? __ia32_sys_mknod+0xb0/0xb0 [ 1128.238446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1128.243595] ? do_syscall_64+0x26/0x620 [ 1128.247608] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.253002] ? do_syscall_64+0x26/0x620 [ 1128.257003] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1128.261622] __x64_sys_mkdir+0x5c/0x80 [ 1128.265536] do_syscall_64+0xfd/0x620 [ 1128.269361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.274570] RIP: 0033:0x458c47 [ 1128.277787] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.296717] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1128.304460] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1128.311750] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1128.319073] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:08:34 executing program 3: r0 = socket(0x1, 0x0, 0x3) write(r0, &(0x7f0000000000)="2400003f917d27292bf84683560052001f0014f9f407112c04091c0007ed10", 0xc) [ 1128.326849] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1128.334145] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:34 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfK\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:34 executing program 2 (fault-call:2 fault-nth:27): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:34 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f00000000c0)="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", 0x67) [ 1128.614412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1106 sclass=netlink_route_socket pig=4505 comm=syz-executor.3 22:08:34 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfz\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1128.675749] FAULT_INJECTION: forcing a failure. [ 1128.675749] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.692887] CPU: 0 PID: 4503 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1128.700132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.709545] Call Trace: [ 1128.712166] dump_stack+0x172/0x1f0 [ 1128.715821] should_fail.cold+0xa/0x1b [ 1128.719729] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1128.724875] __should_failslab+0x121/0x190 [ 1128.729145] should_failslab+0x9/0x14 [ 1128.732994] kmem_cache_alloc+0x2ae/0x700 [ 1128.737174] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 1128.742586] ? rcu_read_lock_sched_held+0x110/0x130 [ 1128.747707] ? ratelimit_state_init+0xb0/0xb0 [ 1128.752234] ext4_alloc_inode+0x1f/0x630 [ 1128.756319] ? ratelimit_state_init+0xb0/0xb0 [ 1128.760843] alloc_inode+0x64/0x190 [ 1128.764665] new_inode_pseudo+0x19/0xf0 [ 1128.768667] new_inode+0x1f/0x40 [ 1128.772252] __ext4_new_inode+0x3cb/0x52c0 [ 1128.776525] ? kasan_check_read+0x11/0x20 [ 1128.780708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1128.786363] ? ext4_free_inode+0x1470/0x1470 [ 1128.790887] ? dquot_get_next_dqblk+0x180/0x180 [ 1128.795591] ? selinux_determine_inode_label+0x1b1/0x360 [ 1128.801144] ext4_mkdir+0x3d5/0xdf0 [ 1128.804808] ? ext4_init_dot_dotdot+0x520/0x520 [ 1128.810693] ? selinux_inode_mkdir+0x23/0x30 [ 1128.815133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1128.820699] ? security_inode_mkdir+0xe4/0x120 [ 1128.825409] vfs_mkdir+0x42e/0x690 [ 1128.830305] do_mkdirat+0x234/0x2a0 [ 1128.833970] ? __ia32_sys_mknod+0xb0/0xb0 [ 1128.838139] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1128.842933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.848324] ? do_syscall_64+0x26/0x620 [ 1128.852319] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1128.856929] __x64_sys_mkdir+0x5c/0x80 [ 1128.860844] do_syscall_64+0xfd/0x620 [ 1128.864662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.869866] RIP: 0033:0x458c47 [ 1128.873070] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.892094] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1128.899837] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1128.907306] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1128.914602] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:08:34 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) [ 1128.921902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1128.929208] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:35 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:35 executing program 3: r0 = socket(0x3, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}]}, 0x68}, 0x1, 0x0, 0x0, 0xee07a885e7a67cd7}, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:35 executing program 2 (fault-call:2 fault-nth:28): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:35 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="8d1f30f8e13663179e0d7f807e555c371672517b50ad86d146113d8042d9206dccb84ae2b1609bbb7eada511bc05361b7ac62de812167f3bd2fdce92d824c0a6b447a71bf549b8aea72a25abe30c5c8ed0256464496ffafc81d0f8213a2b30a86eb5444df02f43742ba41cbc77c4ed4a07f6ca038955d70d4064cf10a931741fcaa5d99b3df20db15c4e4fa5ccb00c448062ee817c96a55036b1d0548d3b4be35c0a2036b129eefa65763567a88de1d55d9d87145e515430d3d4945ea548864bd9d001099f95558d354834d3141117ce195c0d7f4a"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) prlimit64(r2, 0x3, &(0x7f00000002c0)={0x3, 0x2}, &(0x7f0000000280)) getresuid(&(0x7f0000000b00)=0x0, &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000cc0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000440)='./file0\x00', 0x1, 0x9, &(0x7f0000000a00)=[{&(0x7f0000000480)="765a564271edf36f55efd7bc3c2b781a13aaf3433337b7c8f2f9bfdc13f8b09a3b26b0933b6bb43a4acd569f9466596d2d2648569a16c1a5c36ad46238bfb16a88cebc86a344ca807a5c12ce7201893213efcdd815afcb04c227b427ae6c1df476415c1506d8a10e496f7417861836ba7eb12d7ccb845cdfcf0375a5040843ce04cde2179eebe42951dd0e1af91f541b1944547ed4d20f89bbb5d8d10d137053b57ad67b7f4b4de6003f89521dd3522820b40a8bc970e8c18cfe880fb7e9829e5b7e56eb3efe96bb97a86f48f3cda8c5c22212b049d60d20d8edd9a8a7ca81f9411161652698bb1f0a41bd5d0e", 0xed, 0x3}, {&(0x7f0000000580)="829e65c5bfb51eed3ade640d0daf9bcf2a70a342e47834f798fd4c5d501cd4dfa171aecb88a735a140c4e95a524fb76dab56c88189b1bf218c038ea4e9ab53227d41f9d46afcf4d970182fa0e3ae5d5fc9eb9112534a3c1b747540f343a93c893fed267ce0158afae18980c40410bd5fb1397071b90acecf1cf725cc9ba16707f9123530df6ed3f6a33822b410da5f56d7e593185d7da987610a3f5e49ca3bd3d8264f2e994cd98feaf1418f4649edc234181fffb8fe2a03752ad0", 0xbb, 0x1}, {&(0x7f0000000640)="4fd73bd84dc9b7ede3cd5a95d4d531a30b25b399b0e45d068f4e4f67c3d64e2c7f13523df9a5f9c42235000d066fba6a0dbe49c6e73e1edd322a8622e62ba60ff558a71e9f0fb13ebb", 0x49, 0x800}, {&(0x7f00000006c0)="c7c854b442c714ad42e0c3ace7f88a005064c376958a40af4b8ba5ec54ab22a3f07400df15e7c449cc41d1aea5a6b8fdf4b4d15abc", 0x35, 0x1}, {&(0x7f0000000700)="f926ca46eb7f85def6a7a2900e0303abb5deb56a1bd331c01b4d62b74d9aebae77325d7c6bb7d2c62559a3946ef854f0976801626b78e6e2c8cc9261f24b34a373ae4c7ffd360e685cfca64fda5931f96c988b578331e0e1471374c82d0650df18a3a6ca8aab1a4c907423547e13220271ff1ce2276d26d870921e472874b9cbb713589847afefd3e2eea8627f88129f598e82db29293fb4eda1d5931c317f62c23256d0f06057f2c54edf3b79548cda41caf3c8742297f5528f31e8a45d9d6577f4f5f6973171bde20467dc", 0xcc, 0x100000001}, {&(0x7f0000000800)="50d80b9dc5666f2b98cc01ab7eb422a8bfacb7433d4f02d25e3cefc261ccfb91c91ca8aa96e1055b2da7f74760c6c33eb211df42", 0x34, 0xffffffffffffff80}, {&(0x7f0000000840)="89fb096dbfbc5bb5af3faad22d1c592099e34fcbc9bd67abb3d322798d2025fde524a059128a0eb4f5e32565ff4760ea8a132b9a73e556717b0c456eb1e46c82b77cf10f7e808c9d89fe38b8fae5fdaadfa2bf4d54578806b8716a908fcd3e1f87df15a5fbd6113828653b73d33be171d6ecf53c42d0965ebae8907cb2ddec4338071ba6930c04a2b93ddfdee985eda7df58d2b0a1be2d001e5d570558881161f01dcaf042e406dd26856617c0f261caacc79e250d1f2376498b693b0fafc6cc31cee5fb29aac6d2c2722787ca23f54f439ee43536122c13b5d7ee6f1a2d2a91075fa165a67b65725010d8cd", 0xec, 0x40}, {&(0x7f0000000940)="85dcc0682842594e073cb86ee2ddc1c31efe2788098ae53d04e394b4524fbeaf87d008f7900357ba26a65971fea6c66054fe17f63e790fce3842c9", 0x3b, 0x6}, {&(0x7f0000000980)="588037b4d40ba6005ddf3fe585573f3319acbbc21168d8afb26d3601cf0626231dac8d01e36dd89a68c6b3d47f68a2ba3f54525d1807c22abb8a3fb2dccb5579a5a721b92c0b3c3d44dc4fd3d7040f", 0x4f, 0x1}], 0x1000, &(0x7f0000000d00)={[{@nobarrier='nobarrier'}, {@umask={'umask', 0x3d, 0x6}}, {@nodecompose='nodecompose'}, {@part={'part'}}, {@barrier='barrier'}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@euid_lt={'euid<', r4}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r5, 0x2}, &(0x7f0000000140)=0x8) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) ioctl$GIO_FONT(r6, 0x4b60, &(0x7f00000001c0)=""/77) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x2, 0x3ff}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x2, r2}) mq_open(&(0x7f00000000c0)='net/anycast6\x00', 0x802, 0x150, &(0x7f0000000100)={0x8, 0x3, 0xa2, 0x10003, 0x100, 0x2, 0x3, 0xffffffffffffff74}) [ 1129.196032] FAULT_INJECTION: forcing a failure. [ 1129.196032] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.228842] CPU: 0 PID: 4526 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1129.235960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.245337] Call Trace: [ 1129.247947] dump_stack+0x172/0x1f0 [ 1129.251604] should_fail.cold+0xa/0x1b [ 1129.251716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1129.251754] __should_failslab+0x121/0x190 [ 1129.265022] should_failslab+0x9/0x14 [ 1129.268847] kmem_cache_alloc+0x2ae/0x700 [ 1129.273021] ? security_compute_sid.part.0+0xbb0/0x15c0 [ 1129.278417] ? rcu_read_lock_sched_held+0x110/0x130 [ 1129.283472] ? ratelimit_state_init+0xb0/0xb0 [ 1129.288004] ext4_alloc_inode+0x1f/0x630 [ 1129.292087] ? ratelimit_state_init+0xb0/0xb0 [ 1129.296608] alloc_inode+0x64/0x190 [ 1129.300258] new_inode_pseudo+0x19/0xf0 [ 1129.304254] new_inode+0x1f/0x40 [ 1129.307656] __ext4_new_inode+0x3cb/0x52c0 [ 1129.312014] ? kasan_check_read+0x11/0x20 [ 1129.316227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.321790] ? ext4_free_inode+0x1470/0x1470 [ 1129.326232] ? dquot_get_next_dqblk+0x180/0x180 [ 1129.330937] ? selinux_determine_inode_label+0x1b1/0x360 [ 1129.336427] ext4_mkdir+0x3d5/0xdf0 [ 1129.340273] ? ext4_init_dot_dotdot+0x520/0x520 [ 1129.345013] ? selinux_inode_mkdir+0x23/0x30 [ 1129.349448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.355011] ? security_inode_mkdir+0xe4/0x120 [ 1129.359622] vfs_mkdir+0x42e/0x690 [ 1129.363196] do_mkdirat+0x234/0x2a0 [ 1129.366864] ? __ia32_sys_mknod+0xb0/0xb0 [ 1129.371036] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1129.372226] Unknown ioctl 19296 [ 1129.375821] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.375839] ? do_syscall_64+0x26/0x620 [ 1129.375854] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1129.375876] __x64_sys_mkdir+0x5c/0x80 [ 1129.397004] do_syscall_64+0xfd/0x620 [ 1129.400851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.406152] RIP: 0033:0x458c47 [ 1129.409364] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1129.428309] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1129.436052] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 22:08:35 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1129.443346] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1129.450652] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1129.457958] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1129.465259] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:35 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfa\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:35 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000005b80)=[{&(0x7f0000000000)={0x27, 0x1, 0x1, 0x2, 0x3, 0x100, "35f7c20464e6d078f787a2ed83cf798dc1a492395ad562a9f76a4ef3f2e2b090a23d754db2f2e7bd1127445bf9e000ef4fc16cf614eea6ec4c71ba817075ef", 0x36}, 0x60, &(0x7f0000000200)=[{&(0x7f0000000080)="30bc491f9d9e78971f1303eb135366e9dbdf65256de8b06493540405af9f", 0x1e}, {&(0x7f00000000c0)="ba1c533da0ff136655795343afd878ed603d8b0ccbb803a1e93385cc162f9618dfa0a7a7c4b70e1c325e8c755b0f4e6d6d0fdac0095d16aab57d065eec9cf0332bea127a1a0dc1936ba9c966f4ca162e9452a3b3ed220c", 0x57}, {&(0x7f0000000140)="f6e6d57651949bfd84f38b57b8b6f8326e25613fa9563f55d9cd02c3437df83ef4f77e8e5ec30e20ad29f7248797d17c122fc7b9ed2c882e0cb61ae21bc9b9", 0x3f}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000180)="577c4fece567557d4b4ccd0bff568bed1a94c44dc263283bfa046437922bae4b9715f60ff5819c59c2530f098b31277ceae59678cedb6e1a1173e20ae2b3bb49e8504523c284b07c", 0x48}], 0x5, &(0x7f0000001340)={0x1010, 0x102, 0x3ff, "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"}, 0x1010, 0x4}, {&(0x7f0000000280)={0x27, 0x1, 0x2, 0x5, 0x21, 0x9, "80178a3ee875758eb0024c02534937e1a2124ecd41d3ad8bd80f2e5b8e403c2745fca8454e9c2e4309b2b034f8ed80f47fbda330670ca1c0ad48785eb00bcb", 0xf}, 0x60, &(0x7f00000023c0)=[{&(0x7f0000002380)="ce8ac0ec3c53b84f0284e2304399e52d3b224878529d22bc447617af3e5b4bf803f1ace2a4283e2a02e2f597415a41f714cc358300", 0x35}], 0x1, &(0x7f0000002400)={0x68, 0x105, 0xe, "f35dcdff164d8145e5001f77794938e3c14842f0803340fb4457fab2ee35e74085a1fe90124c1b90321cbb3c35fbae6fd5cb4e5fbdfa544c0b12107cf22677e2d3eda7b1b790e4ada437c831582978fcd768dbd6f6beb9e2"}, 0x68, 0x1}, {&(0x7f0000002480)={0x27, 0x0, 0x0, 0xaa9e88640863e91e, 0x4379, 0x9, "182e0a401b14a4c233e674fd45a717f5052276a1467e0dd02e7aaa76b565bc13305f6d2fcdab77372622e3379e487b05b9fa35e4d8a2937ac1fe2feea7b86b", 0x13}, 0x60, &(0x7f0000002a40)=[{&(0x7f0000002500)="37831561652ca56fa9cc092b3019c56d2e4a1916d4365d245984a2a89d2e6c9521669a24fcc60ece237ba97464d3268fb78591d577eb1d6d5cac6942551f9209b86e642e79d691d0d443f7e9d29b5b1c28ccf7cf83f4d0edc8f26f23912b3a940c679ef4ae2d485a30b11a97326c2534c0d9482ac353999e31fb7d2b956e43ff899b422f2f50c093b86e403ca319da8bc374f2f260222a76d001403c9030ac6582", 0xa1}, {&(0x7f00000025c0)="ae00dc241574a09caaec6e4982deb7ccc30215ca0f1256c377f263119b190b8f07e85977c7ef94e0d47cdf2fd1f11d45bc92814db4736c3eee987c168a905ff329b4d5752de242f26a445419572c11c76372193d", 0x54}, {&(0x7f0000002640)="c15e08dcd75f41a0eee19a1eba99e6d7b61e1820b7df1ff88aef152ff171fd15400dd32b133a701ec7a1ad468c80e8c4decfe22b15db7002c8670578bf021c692969e391c9c01e913295243396cb0cb834462ece539678f30f26d50c605b9530343c8bea5ea00afd3a6869220b10106ac2c1b3e87f0a2416dc4ffa264b4bdc94bec070972816b5718984044aae6b677f7eab61003e9e7c62024d40dad9ebabcc0d3cba665bd1a9741269da6b6259914a822d1063ec60c7e875069d35c4659b159e2cbc398ad9b5", 0xc7}, {&(0x7f0000002740)="f8fdc43ae4dea422", 0x8}, {&(0x7f0000002780)="5da72b1b0bf90fd15a9add3b928b0dc4dc7528e57615bcf9498cdc4714e55736f9460889a5579244941f36e024db300b6dd0ec252b53abfe9a02886689b37a26531db2cd19f9c928fbb4fa7b7852fe95b425c60f80f438a693b87c22113c4dd68aefd5dadad20cb3bb4d943c16f6040e4c7ab87ece21ffaea3dbbffca42ae1c1b867d6fca6d9c2d3db54c24f3d73cf06d6abd9583ccb44b62c64c1614d02f819a8ba21d171c68d7b90b2b808f02d4909e5a54812a35ec8", 0xb7}, {&(0x7f0000002840)="50f892e6004eada88be975a272a75bd4aad49e3e6ab8ac03abdbd8df11ae1ce3959fa897d78e27c879f80639c83455c8b5dbae67a57053ffbc96a24ff765767f32480b52f1f96421dfbec5a2962fbfb7107313653376539fd65b6ccc8cc83f9ad781556c17d138cf678908a08b8dfb8ac86c78c04adac7739ab68a827ba8b834bbe1cd9324b3e9249daf27401dba10f1c60058ecc5163f5fadb9b5727090189095cff85881cf87d16a83a20142ec19fff66bbb8d53d866eae2fe8eaf483a95fe40fe806b105c3b5e421bf0e75f65376b9d1d05800241025956b797c4945bbab20ae0675e2aaf26ce35c86e6cbdb6b441a4ce347816", 0xf5}, {&(0x7f0000002940)="82c27eb7520e63559188ea1b432579e86eb0181c1dcb66311eb9dc23b0c06c3edb210ea8383db31309f0036c910130a013d2b0e53f6c434d17d12b93f578982403e1612845d844c08a768f96e6b0946adb0c91c99a43420b3df3b8a27a08afd6ab64c2105001973e36bbd413a3d2f3b5a1249c46a578740ca8133bbbc7e87bade1d1637303e51f450df67ddcacaba1afe9a153bf46e143ced3e89d061dfe69e497a6a72504579fee96e83445a422bd6b7bb9b3c543cb2bf6cb275a061c5e45afb7e1985efb8c", 0xc6}], 0x7, &(0x7f0000002ac0)={0x88, 0x84, 0x8, "875621f4dc59ccdf64d9b1767d2d27836d6f9be5fa68c0d126d180a7565fb5266fb160ed8f10b42e833365f4ded4edddb5bda712506e3064b50b824ea0225fa05d958a6b0e5bf791a77fef298fa031663dd218cac1a7252dc3e4bee46828433b81fad07c139275624763d37367ac0af94f9df59b"}, 0x88, 0x80}, {&(0x7f0000002b80)={0x27, 0x0, 0x1, 0x7, 0x5, 0x3, "d9b9f028b13abf200635b7abd64113d4f93fcc50d59f907a03adf5c25b09ab50aa1249efb0f4a5e80b2ca858add421bb5d224cffaa5e468cf04b25bd607616", 0x37}, 0x60, &(0x7f0000003f00)=[{&(0x7f0000002c00)="0faf61a94e68bbf8c294c7e785408d83650277209472d7542dad39bf8224ecf7164162bfcb9bec8bc0b925fe09d1c9ad1015aeadf8fe655fa2cad6abae8d55f5eb2ec029139696e7b60c6fdce222f1061fa68427dbb4357bb03f707fb7ff942c50649c20435e5ab58b055e2e0dddc5010d9cf612138f4c65eee24d5624317e022c44423344e7ffe7c17ffbd3468e2c36c69c56caa68e829935e1d268bc5bab50ad75d3e2dde9573664b57c752cfafc072a1c85b396e7fe1ab4c48e959c88257993574de0", 0xc4}, {&(0x7f0000002d00)="5d678c5bcdc93f736bbfe03116418a40fdf1e8714160421a380f72dad6e4a08be214b3d606105004ec19384bb15244d3e16a866ad7558b8f68c89e6acf80b597af58cbac656d9940ec03466a36bdf23aaeae63b8632e2bb801900d16b3dc5c5a52020f7f9d3385090b3d2437e09b78468e3aa95b79be50b20d7b", 0x7a}, {&(0x7f0000002d80)="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", 0x1000}, {&(0x7f0000003d80)="6d15764dfc3453b5437dc13580b705097cb036e4ca51ae9fbc17d559e21b3601a4e7ed6dfe734824c4fdf179df01b0d339d7", 0x32}, {&(0x7f0000003dc0)="8112b8dafefe2f8074ecf132561c2a07f0db0b7d45d50b8c9afb41e53227714312e24755a6bef8c465d2abbeb7ca12d5df0b81d071f2fb302b5940dd81b7b49d220d1619bd2c3cca04fa467cfc8b30bd689d251f24b870b0d9b6c1ad17da50509b6fd491cfffda21020e4367c58976f14a54f23b38d38657a573fb2ac5ab846f3aa997afb1e35366affa8739c2c6c8a2b84bd9b34bd57dcc2c7180bee814896143114dee45b1d5", 0xa7}, {&(0x7f0000003e80)="68ed140f68d0cd9742b1885faec3dec151f5fc19e9543a496583bc8110faf17ed59fb37e25a7df0e773a212f6928addd32efd18bb79306e6b3803beef9e6a74065e20f", 0x43}], 0x6, 0x0, 0x0, 0x4004801}, {&(0x7f0000003f80)={0x27, 0x1, 0x1, 0x5, 0x1, 0x5c269494, "4b5e4c5f0f30bddaf75b1fa3b129258385b441b7a2fbf49b19c824e768a3a8fa6b07d459d8cf95e71cf261532cb18acf41dd58b60b15f7884ccbe97d9dbe47", 0x2}, 0x60, &(0x7f0000004440)=[{&(0x7f0000004000)="3e69403bdc7ffc8114a3eea701827197ff863cb6a3c89bdd65fd045f5f0df9100db6ed0caf4b56ccc74071c049128e34954c7bd877e5935878f83f8770f9743e4028925a8ee2b610e9d72fba8afaa514ef3ab3e3645bb754cf43981437c8e4672cf7bad839c4d0a08ffc8de4d509fb1838dea15c47f94e3be983dcdd79c7fbb13374f82b3cbc1b273082a949a266700c81bdbdf2d41036d61f2eb3b87399bfd14713428f625163d705db2eb42c19fa928e096c150f9e4de236b1d25a632d31b6a6db65a7f5650a995a80b3c4733b9c2ddcd6a8", 0xd3}, {&(0x7f0000004100)="ba697f936541b80c7073aa3f1d694790e7d80547a1fc9492d995d26303ffea62b0e485d9c9c4eff5877b4c5d698ff09e430169cdcdecdae070e260d96482200fa66ec4268536fda7406a5c6458e7745a92adb24508862fd100f440380f2dea30020b69ea4d87da073fcaff9a46c1557370c416e19564a795b1e5ef19df5308a6bc07618447044c59fa8035f249f64b29e52e451a978b50709c6bbfd16bb502ff6f5510c9a5259386ed4e7ee7d829960ac017dea1ceb690c59d787d60e678e925d1a4897493f738e81745509b0025e0e81f9ea6ecc6", 0xd5}, {&(0x7f0000004200)="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", 0xfc}, {&(0x7f0000004300)="defc0780037f6481983deee23f01fdbe4e6425654ffe0e5755fffa48b924fb9d3301d3e92ddcd03b03fe05f666f239118f359110d77ef654b2ee2245d5ab08ccb4bbab52d176eb1ed58c7070b13be728c82c663e384c4ffde667cccecc0b2b4903f1b4dc14c22d2dba47b8e8e6363961c7e34ef1d767db1f2ed5570f143d71c763ff17662ecda960c010437b8ba9da85438a1ba46e2e4f91cab867aea787a93047e095c44b6cd4fcac1094348b39ef3a97a21e86b22c492c2b2d3f1c84e318106f5fc9c9b3b275cb7a73ebf72f8629f0c7284e5e60591d475293ba8f33d0a8c8993dc1e231dac94c03653522e30964f676", 0xf1}, {&(0x7f0000004400)="e1bc15c37eee7919a581d1d461ebf3f68064c31b18a7973fc3bd7b77ec5f", 0x1e}], 0x5}, {&(0x7f00000044c0)={0x27, 0x0, 0x2, 0x5, 0x12f, 0x1000, "fb1adca7c51c83feae08b3f2f650671b26577796d8cde3f0e4fa0c4653f757d43d74335d36a7a5e32136c18c13cbd1ae6832930cf4604314e30e7d34655676", 0x17}, 0x60, &(0x7f0000005880)=[{&(0x7f0000004540)="c2a1ab6ffea210f102b9757a8120f1f9139a7e3c6b5fb1020ec5ef1ab235a36e80d8911ab1df58bd56beadd79008561a8843e3dad9397ee324700abfcf1ce3ad14df6c6b4f8628ba8eb81a10aaeb4b00e5dbcc3db91c8f62995319a95840612c791367", 0x63}, {&(0x7f00000045c0)="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", 0xfc}, {&(0x7f00000046c0)="792cd2de24fcf42e9bca7cd0e742b6f306b5116741cc4d0185d522bfd19ba1c88406ef92b2e41263b22ee826e784c19bd06fd9e9295471e5f0ae071cecd6c108b23b2ee0816d95fe0a61b845c7febffd0c455040269d2a3afcd7b0e60daa9e3908c00f21249bb3d48cc6f92cfe3690d4e48ab84ecf7aa2d92d73f5822a287187c4afe81f97ed406eab2120e5440a9146deb69435d13db0a2c0ad6a3d6d", 0x9d}, {&(0x7f0000004780)="ebd2bd27692ae87188f89572b90283108d95cbf6ea5343e0ef63a7436aeb88bcea0708c80ea5476f2b2fe8e39fdc683d", 0x30}, {&(0x7f00000047c0)="80a967a6b964b12496c083f78e81c9db3080830ced04a3773f5cf37c0152c252", 0x20}, {&(0x7f0000004800)="7301e1f9c2d34a5c44ea9b6f5e393f1d77acc907fefde55015d64f7c3b98ce3eaf2ad2094b556101f3964bc30bcf15195d5558a05d65a2ac75da", 0x3a}, {&(0x7f0000004840)="609d71b42e465f43c79253d347c48bfe92043aff5c31f094e3e92a8fdd9714d481fa2ac5d55f37dbccac", 0x2a}, {&(0x7f0000004880)="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", 0x1000}], 0x8, &(0x7f0000005900)={0xd8, 0x10b, 0x80000000, "70dfff2c01ce326cfa47151a22c656cc877fe7d3206aad111b4d40e2e9b85f362b0c21add32b6f5040d4579cf41803ff70e09120fb94b6a4c656f546c38b7d571115b0c7f5a03381597808b841846217b80956220daaf2d2ae488eccd090514c2882e78d1ee995e5d459a5bb1bd4fd896a1b65206e5360fc8c68d05a68fd2d73601f51e3357a87bde5282149004a5ca169b0cc3222737ca54bee1007944ce5659e5812c701ac894ecefc39333330145b536369e9c6634b46404715cc434d02e8f4a8b1f19c"}, 0xd8, 0x4000010}, {&(0x7f0000005a00)={0x27, 0x1, 0x2, 0x7, 0x2, 0x8001, "92d9fc2c12d73971ca909e5c3d3742d514e8d7f02d59a085eb72a79991d84aeb6e9a59e87507e17d990483ac1fbda6bf54ee8b73a6a372e2df550864c69bb1", 0x1}, 0x60, &(0x7f0000005b40)=[{&(0x7f0000005a80)="7317b6445dc8400081eef3487534983d27d5ba86171915c5b3fc2999f9fa5f210c1ef784a1bb81116bad7fdd668f16961054", 0x32}, {&(0x7f0000005ac0)="b06aeb1f41675e17fbabb30f20b80b9d378bfa9f6385d0d87ef86471b8f66ea3d6fa070f1cdb9927c7c3f91a4386d8ce8ecc324f26889dcd9c81cc4c9c1988a294a3eb6666c6300ce5f730e3652db60b76beb91472315f065096ef356120a4c8f3da14ad0d3cbd5f8ef34359d4e51f437e40880ee409739506810e37a41038", 0x7f}], 0x2, 0x0, 0x0, 0x40000}], 0x7, 0x40) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:35 executing program 2 (fault-call:2 fault-nth:29): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1129.660017] __ntfs_warning: 23 callbacks suppressed [ 1129.660033] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1129.697809] Unknown ioctl 19296 22:08:35 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) r1 = syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x3, 0x80000) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000440)={0x6, 0x77d8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/200}) sendto$inet6(r0, 0x0, 0xfffffffffffffd40, 0x44004, &(0x7f0000000300)={0xa, 0x40000004e20, 0x0, @mcast1, 0x20000000}, 0x1c) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00') ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f00000000c0)=""/197) [ 1129.753040] ntfs: (device loop4): parse_options(): NLS character set [ 1129.753040] p852 not found. Using previous one utf8. 22:08:35 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x8000) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0xb97, 0x4) r1 = socket(0x200000000010, 0x3, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) accept$alg(r1, 0x0, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1129.793897] FAULT_INJECTION: forcing a failure. [ 1129.793897] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.797250] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1129.842640] CPU: 1 PID: 4558 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1129.849715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.859085] Call Trace: [ 1129.861707] dump_stack+0x172/0x1f0 [ 1129.865389] should_fail.cold+0xa/0x1b [ 1129.869305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1129.874428] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1129.879058] __should_failslab+0x121/0x190 [ 1129.883346] should_failslab+0x9/0x14 [ 1129.887172] kmem_cache_alloc+0x2ae/0x700 [ 1129.891345] ? map_id_range_down+0x1ee/0x370 [ 1129.895784] ? __put_user_ns+0x70/0x70 [ 1129.899708] selinux_inode_alloc_security+0xb6/0x2a0 [ 1129.904848] security_inode_alloc+0x8a/0xd0 [ 1129.909212] inode_init_always+0x56e/0xb40 [ 1129.913489] alloc_inode+0x81/0x190 [ 1129.918291] new_inode_pseudo+0x19/0xf0 [ 1129.922306] new_inode+0x1f/0x40 [ 1129.925713] __ext4_new_inode+0x3cb/0x52c0 [ 1129.929984] ? kasan_check_read+0x11/0x20 [ 1129.934208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.939792] ? ext4_free_inode+0x1470/0x1470 [ 1129.944252] ? dquot_get_next_dqblk+0x180/0x180 [ 1129.948965] ? selinux_determine_inode_label+0x1b1/0x360 [ 1129.954475] ext4_mkdir+0x3d5/0xdf0 [ 1129.958156] ? ext4_init_dot_dotdot+0x520/0x520 [ 1129.962863] ? selinux_inode_mkdir+0x23/0x30 [ 1129.967313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.972890] ? security_inode_mkdir+0xe4/0x120 [ 1129.977519] vfs_mkdir+0x42e/0x690 [ 1129.981099] do_mkdirat+0x234/0x2a0 [ 1129.984766] ? __ia32_sys_mknod+0xb0/0xb0 [ 1129.988939] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1129.993722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.999281] ? do_syscall_64+0x26/0x620 [ 1130.003275] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1130.007909] __x64_sys_mkdir+0x5c/0x80 [ 1130.011832] do_syscall_64+0xfd/0x620 [ 1130.015668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.020884] RIP: 0033:0x458c47 [ 1130.024101] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1130.043207] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1130.050952] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1130.058332] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1130.065622] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1130.072910] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1130.080204] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:36 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfb\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:36 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:36 executing program 3: r0 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x402, &(0x7f0000000180)=""/133) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000440)={&(0x7f0000ff9000/0x4000)=nil, 0x3, 0x0, 0x8, &(0x7f0000ffc000/0x2000)=nil, 0x8}) r2 = socket(0x200000000010, 0x3, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x680202, 0x0) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f00000002c0)={0x9, 0xe9a, 0xffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x5, @empty, 0x3}}, 0x1, 0x1000, 0x6, 0x7, 0x40}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={r4, 0x38e6, 0x3, 0xffffffff, 0x100000001, 0x1}, &(0x7f0000000140)=0x14) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000240)={'gre0\x00', 0x7ff}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f0000000340)=""/136) 22:08:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x22, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:36 executing program 2 (fault-call:2 fault-nth:30): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:36 executing program 3: r0 = socket(0x200000000010, 0x80000, 0x2) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x100000001, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r3 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0x408c5333, &(0x7f0000000380)={0x0, 0x0, 'client0\x00', 0x0, "7ae1a546bba538be", "8dcf7735bdd48b4cd5823162d8dae0256801d6103bb2c44d559c910002df429d"}) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)=0x81) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) [ 1130.619303] FAULT_INJECTION: forcing a failure. [ 1130.619303] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.631434] CPU: 1 PID: 4584 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1130.638410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.647800] Call Trace: [ 1130.650422] dump_stack+0x172/0x1f0 [ 1130.654097] should_fail.cold+0xa/0x1b [ 1130.658063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1130.663208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1130.668776] __should_failslab+0x121/0x190 [ 1130.673127] should_failslab+0x9/0x14 [ 1130.676952] __kmalloc+0x71/0x750 [ 1130.676978] ? context_struct_to_string+0x428/0x880 [ 1130.676999] context_struct_to_string+0x428/0x880 [ 1130.677021] ? dump_masked_av_helper+0xa0/0xa0 [ 1130.677045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1130.700524] ? sidtab_search_core+0x1d0/0x320 [ 1130.705059] security_sid_to_context_core.isra.0+0x226/0x2f0 [ 1130.710969] security_sid_to_context_force+0x38/0x50 [ 1130.716127] selinux_inode_init_security+0x3b6/0x7a0 [ 1130.721256] ? selinux_inode_create+0x30/0x30 [ 1130.721342] ? ext4_get_acl+0x107/0x5a0 [ 1130.721364] ? rcu_read_lock_sched_held+0x110/0x130 [ 1130.734974] security_inode_init_security+0x1ad/0x3b0 [ 1130.740205] ? ext4_init_acl+0x220/0x220 [ 1130.744326] ? security_kernel_load_data+0xb0/0xb0 [ 1130.749285] ? posix_acl_create+0x11a/0x430 [ 1130.753671] ? lock_downgrade+0x810/0x810 [ 1130.757884] ? ext4_set_acl+0x490/0x490 [ 1130.761889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1130.767465] ? check_preemption_disabled+0x48/0x290 [ 1130.767491] ext4_init_security+0x34/0x40 [ 1130.767512] __ext4_new_inode+0x3b2a/0x52c0 [ 1130.781074] ? ext4_free_inode+0x1470/0x1470 [ 1130.785523] ? dquot_get_next_dqblk+0x180/0x180 [ 1130.790231] ? selinux_determine_inode_label+0x1b1/0x360 [ 1130.795720] ext4_mkdir+0x3d5/0xdf0 [ 1130.799402] ? ext4_init_dot_dotdot+0x520/0x520 [ 1130.804111] ? selinux_inode_mkdir+0x23/0x30 [ 1130.809690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1130.815252] ? security_inode_mkdir+0xe4/0x120 [ 1130.819865] vfs_mkdir+0x42e/0x690 [ 1130.823439] do_mkdirat+0x234/0x2a0 [ 1130.823468] ? __ia32_sys_mknod+0xb0/0xb0 [ 1130.823489] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1130.836049] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.836067] ? do_syscall_64+0x26/0x620 [ 1130.836084] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1130.836105] __x64_sys_mkdir+0x5c/0x80 [ 1130.854008] do_syscall_64+0xfd/0x620 [ 1130.857841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1130.863056] RIP: 0033:0x458c47 22:08:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:36 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write(r0, &(0x7f0000000000)="2400000052001fbb7613ee2d9c0014f9f407112c04091c0007ed1b000100350000000900000000000000", 0x9) 22:08:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f00000000c0)=0x5, 0x4) 22:08:36 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:36 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:36 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x2a528777, &(0x7f0000000040)=0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x18e, 0x10804) ioctl$RTC_PIE_ON(r1, 0x7005) [ 1130.866264] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1130.866273] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1130.866291] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1130.866300] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1130.866310] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1130.866319] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1130.866328] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:37 executing program 2 (fault-call:2 fault-nth:31): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='coredump_filter\x00') fchmodat(r1, &(0x7f00000000c0)='./file0\x00', 0xd2) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x4e20, @local}}) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000100)={0x1, 0x6}, 0x2) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000140)=""/53, &(0x7f0000000180)=0x35) 22:08:37 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfff, 0x204200) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xcb4d}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x9486}, 0x8) sendmsg(r0, &(0x7f0000002d80)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000000980)=[{&(0x7f00000003c0)="e5e13950d434094adc5f4d02a7deb7c5fd100d0a96022e011e3e2ea81b41e5da08e6181988cff5e6197b3b319de1bf330aa651829f7a59c274e62fe524d4aceabbc53c425f19c73f5989391d870274956972563949baa385f1347573d29fed92c6459ef761205e52bf2501600b2530db5a5099fdd6c371eaceb20e6cc4e403d3ad8fdde2eae08d7dd20f95b3ac60e159ffc1468a00881075b9f89923c760fb31cb9afab4a7", 0xa5}, {&(0x7f0000000480)="f2cf3de2d6a977e42b24530963f62098f1e49f3bb5743e6c5ce4909cd0d601f4622b0506b909b5234580f5f9a6ef0a6cecb0d110edb28cb9346dcfd67583e88d064be1e2d5cf3498f12e5bfdcfae069490e4ed04680df8755b42488e6708bb1d98cf643970e81aae5b9950e1be8db559bb585b1952ce39a5ca0c64969e9ee2162cec31", 0x83}, {&(0x7f0000000540)="ae17a09d0ea95370927cd256191accd1bcdb77c22ae21a116d3fe96b45aab66d47ca5ae3b4a32ee39be1447631838654ce7b8e833649c5fed059d9e5797fac3d194262b53f78e92b319e", 0x4a}, {&(0x7f00000005c0)="9285d3b0965187ce0cf8da05706905dbfeb6950ab8f714f82cc533855b40c902024486533fc20b6eb5e511aeb5154ea75c11ddb7e30717e32bf2f26cc8898bf420925392ce15a044eddb5c79ed97a94943b3d3b2ea66ff634895cd4a164057d5d09884d34029b8abd6b2f72b0780fa9da41d7263d5f00b225770305d80b9c417b11a6b86150b0090074182720c449f3ba2d5d0fbf17a09742f24f5b5561bc016", 0xa0}, {&(0x7f0000000680)="6b5ff2085a06e83f6487f36097a00ef880c2fb0b07ea8c07befb71ee8b040565e5c4001c3f1f198be885a831900c6a95c32db55213801e392c20939669982f32132dac933489d7382d77419278d8623d19cb8b9b8ecd4bf300ef98088d95c1911821287acfc848df114a1a84a33e744407bb3da2096d87519d7a5798eb00d26380", 0x81}, {&(0x7f0000000040)="5758468d72dfe57ae68904b81bbdb21844b76f8997a0e98bc179fbff707e28a50e454c50452bed8becff46c32eed1fae9e1ab04c", 0x34}, {&(0x7f0000000740)="a6160e28b6a75f7a44e24e29234a1d26d60a823179ded2027043ab5ec26de500191d650518a42e6feac0c90969b4504ff7a7ed5b9150b23a5f0af3fe621a63f0e3daf117143d57d50aa6440625e9178220c7d0af4da4b0e0e80101f5f2ab5038c57085539ab1b530cae27c6e7495c44652d061d33afdd7f25c190ecd1f1f786a9536f91a630b1e6ffee17a88da56c4f0f7d0d98149e06fc6fc75f3168c91e8", 0x9f}, {&(0x7f0000000800)="cba69be2e4d8f0312c6b2e0a2cdbc9dd72df70a9b8bf37242238db5ce3a0339e6f0f30207e7d6785237ff49086e69c42a26d192edaa931d7853ce16fb65616fd6cddd334aa41e9620ab640e37185630a6db71542d333681ef8707def8d9d8e1d71d3f75a8074edbb96f4b6bdb04d7ba4cda3326f9e747371a881ae7e8be628d84e0885b9a0dd702529bd0d788233a8752f43bcfcab465316b2bc75313edb43173a41ee5f65537e4ce55078", 0xab}, {&(0x7f00000008c0)="3a278ec4c9ffa45738533b1150", 0xd}, {&(0x7f0000000900)="57f16054828ece698bbeb3f921fa2b4ad6698df8b76fa2c1522153adccf54f885d04eacd594f08d782645a913f2c6317a5380cc915548628e42e05703d307185079d675aeca9d37721035d327a148548673dbac3275eddf0dfdbbe3329297b1a67cde3d8c434aad5fe573ead216004", 0x6f}], 0xa, &(0x7f0000000a40)=[{0x1010, 0x84, 0x5, "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"}, {0x40, 0x103, 0x4, "6793a49e2504ad808fca701c22c845ba8b3b128183694e453bec0903955f1cde26bfb904bd60c85deeefc8ec5bdd2a"}, {0x1010, 0x113, 0x4e, "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"}, {0x98, 0x116, 0xffffffffffffffff, "e078fe835f13b32d83aaf14a8eb200c552b6955e0ffe963771af90c8f714147dc4ee4f760a04a6b9b8015d9b2c1c830723795c2c04720ea8520a81620f1b8071aa7d9e366c4fdb54c4f73d22124331c263f04e416acd8d322e5239b9546b914591c52e972c8b926c17e635e7b3c237e2834092d1a04024a37ac52ab6283483a783da6f93"}, {0x38, 0x10d, 0xff, "013d6dc117c14c4c6a5193f845a0a17f6d8ca85c9e29c3dbdd5eb14e68e96bbf15d30f894783fe"}, {0xf8, 0x11f, 0x3, "cca31d4fdad6aea4d3a680ab52b58c16e2dae189805a2c27044dac8929a2ed8455181a1e9aa5f9c367cae54d6a828268badc860fc8a32adda77c78d95473d9b3d6fa05e941b9c277e77ae0fa523beac935fd6559f617a7046e0a21011834d4075588fef63746879a37bc277d2721fa10ce47e8c9c264c4157111af33a22caabc7cbb2785ededaada43336673cd3348e33b3b3a17313274ffb2d48c0f8ece6587a5b2bc214dcfbb5f9a75ab362b5333e03c9edf9c423c27008199306065e9ae0e63315c64964b4a89e2d50ca85ffd1f4f11e2d18b200d47f7af7ce8ce73cb57fef1"}, {0xe8, 0x113, 0x1, "d25d284037a5cdd3cfdfb4149eb81e8cd65a28ff3a2e582a7aa954c92596f72dd92766ee493b07ccf8911410fb2874acfa2fda26ee959e97cfc6a81e377cb605b2c4b5c472f7415ee6e96f20279ca666a100c8966ad5fe9ef59b70fad989a7177125f1ffb8db1b487693e165ba384d16fc24eb7333894b8214ba2f34866f4174ce16eff7f300cb5c3267afcfd100605afd998ec9b0f2c5857c7f998f0245f2b977493e9aacd21d642cf27ffcecc714df7150925c9669bfe5087cc02600782743a4eddd631ddd246bb116c7d07418399986"}], 0x2310}, 0x40) r2 = socket(0x200000000010, 0x3, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xb3ff09f236defbe3, 0x0) write$vhci(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="03fc0318561872812d9d965b18f1c1a52e1aa7ac69d06eb416b280fe7c1c108c72949433b5b30900000000000000fbcc50265bee040f54396b7954cfeffadaf2c91040f6b27b9024c78b66762c7d73fb0342ff7e3729ef4ad125b52367694fe348a5cdc3f6f26c91daf25e680bac6e5b1026a5a094afc2ed1656e8d54b49313d4abacf059824e3b07de95630741f99d2f882ccffb865a4771d3dacfaa37eb8f8fc74154cf5aacb91cbca"], 0x37) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e20, 0x3f, @empty, 0x80000001}, {0xa, 0x4e24, 0x7, @mcast1, 0x9}, 0x80000000, [0x6f, 0x4, 0xe667, 0x5, 0x80000000, 0x2, 0x2, 0x6]}, 0x5c) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000180)) write(r2, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1131.191730] FAULT_INJECTION: forcing a failure. [ 1131.191730] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.204094] CPU: 1 PID: 4617 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1131.211054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.220430] Call Trace: [ 1131.223059] dump_stack+0x172/0x1f0 [ 1131.226715] should_fail.cold+0xa/0x1b [ 1131.230625] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1131.235753] ? save_stack+0xa9/0xd0 [ 1131.239399] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1131.244437] ? save_stack+0x45/0xd0 [ 1131.248104] __should_failslab+0x121/0x190 [ 1131.252370] should_failslab+0x9/0x14 [ 1131.256284] kmem_cache_alloc+0x47/0x700 [ 1131.260382] ? ext4_es_scan+0x730/0x730 [ 1131.264395] __es_insert_extent+0x2cc/0xf20 [ 1131.268750] ? do_raw_write_lock+0xbd/0x1e0 [ 1131.273108] ext4_es_insert_extent+0x27e/0x640 [ 1131.277728] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 1131.283577] ? rcu_read_lock_sched_held+0x110/0x130 [ 1131.288628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1131.294208] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 1131.300061] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 1131.304966] ? ext4_zeroout_es+0x180/0x180 [ 1131.309232] ? ext4_find_extent+0x76e/0x9d0 [ 1131.313583] ? ext4_find_extent+0x6a6/0x9d0 [ 1131.317934] ext4_ext_map_blocks+0x204c/0x55c0 [ 1131.322555] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1131.327617] ? __lock_is_held+0xb6/0x140 [ 1131.331726] ? lock_acquire+0x16f/0x3f0 [ 1131.335733] ? ext4_map_blocks+0x4cf/0x1b20 [ 1131.340102] ext4_map_blocks+0xf83/0x1b20 [ 1131.344296] ? ext4_issue_zeroout+0x170/0x170 [ 1131.348829] ? kasan_check_write+0x14/0x20 [ 1131.353103] ? __brelse+0x95/0xb0 [ 1131.356589] ext4_getblk+0xc4/0x510 [ 1131.360258] ? ext4_iomap_begin+0xfd0/0xfd0 [ 1131.364644] ? ext4_free_inode+0x1470/0x1470 [ 1131.369085] ext4_bread+0x8f/0x230 [ 1131.372648] ? ext4_getblk+0x510/0x510 [ 1131.376578] ext4_append+0x155/0x370 [ 1131.380322] ext4_mkdir+0x61b/0xdf0 [ 1131.383978] ? ext4_init_dot_dotdot+0x520/0x520 [ 1131.388677] ? selinux_inode_mkdir+0x23/0x30 [ 1131.393111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1131.398699] ? security_inode_mkdir+0xe4/0x120 [ 1131.403321] vfs_mkdir+0x42e/0x690 [ 1131.406895] do_mkdirat+0x234/0x2a0 [ 1131.410549] ? __ia32_sys_mknod+0xb0/0xb0 [ 1131.414718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1131.419513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1131.424911] ? do_syscall_64+0x26/0x620 [ 1131.428914] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1131.433620] __x64_sys_mkdir+0x5c/0x80 [ 1131.437541] do_syscall_64+0xfd/0x620 [ 1131.441372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1131.446585] RIP: 0033:0x458c47 [ 1131.449804] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1131.468734] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1131.476651] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1131.483959] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 22:08:37 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x210000) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000040)=""/9) getpeername$tipc(r0, &(0x7f0000000100)=@name, &(0x7f0000000140)=0x10) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 22:08:37 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfd\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1131.491256] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1131.498550] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1131.505856] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x52, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:37 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1131.587439] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r2 = getgid() fchown(r0, r1, r2) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1131.710962] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:37 executing program 2 (fault-call:2 fault-nth:32): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xdf}, &(0x7f0000000040)=0x8) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x80000000, 0x200000) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000100)) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x8, 0xfffffffffffff607, 0x208, 0x3, 0x48d, 0x200, 0x9, 0xff, r1}, 0x20) 22:08:37 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfh\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1131.813026] ntfs: (device loop4): parse_options(): NLS character set [ 1131.813026] p852 not found. Using previous one utf8. [ 1131.833982] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:37 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x30000) [ 1131.909533] FAULT_INJECTION: forcing a failure. [ 1131.909533] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.923518] CPU: 0 PID: 4654 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1131.930489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.939867] Call Trace: [ 1131.942554] dump_stack+0x172/0x1f0 [ 1131.946226] should_fail.cold+0xa/0x1b [ 1131.946246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1131.946275] __should_failslab+0x121/0x190 22:08:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1131.946293] should_failslab+0x9/0x14 [ 1131.946307] kmem_cache_alloc+0x2ae/0x700 [ 1131.946330] ? rcu_read_lock_sched_held+0x110/0x130 [ 1131.972516] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1131.978089] ? __mark_inode_dirty+0x241/0x1280 [ 1131.982729] ext4_mb_new_blocks+0x5a0/0x3c10 [ 1131.987173] ? ext4_find_extent+0x76e/0x9d0 [ 1131.991553] ext4_ext_map_blocks+0x2b26/0x55c0 [ 1131.996176] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1132.001231] ? __lock_is_held+0xb6/0x140 [ 1132.005352] ext4_map_blocks+0x990/0x1b20 [ 1132.009725] ? ext4_issue_zeroout+0x170/0x170 [ 1132.014262] ? kasan_check_write+0x14/0x20 [ 1132.018532] ? __brelse+0x95/0xb0 [ 1132.022021] ext4_getblk+0xc4/0x510 [ 1132.025683] ? ext4_iomap_begin+0xfd0/0xfd0 [ 1132.030040] ? ext4_free_inode+0x1470/0x1470 [ 1132.034490] ext4_bread+0x8f/0x230 [ 1132.038152] ? ext4_getblk+0x510/0x510 [ 1132.042090] ext4_append+0x155/0x370 [ 1132.045845] ext4_mkdir+0x61b/0xdf0 [ 1132.049524] ? ext4_init_dot_dotdot+0x520/0x520 [ 1132.054224] ? selinux_inode_mkdir+0x23/0x30 [ 1132.058664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1132.064231] ? security_inode_mkdir+0xe4/0x120 [ 1132.068869] vfs_mkdir+0x42e/0x690 [ 1132.072441] do_mkdirat+0x234/0x2a0 [ 1132.076107] ? __ia32_sys_mknod+0xb0/0xb0 [ 1132.080308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1132.085094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.090483] ? do_syscall_64+0x26/0x620 [ 1132.094485] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1132.099112] __x64_sys_mkdir+0x5c/0x80 [ 1132.103048] do_syscall_64+0xfd/0x620 [ 1132.106883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.112184] RIP: 0033:0x458c47 [ 1132.115395] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1132.134340] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1132.142075] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1132.149364] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1132.156658] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1132.163958] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1132.171246] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000)=0x400000000002127, 0xfffffffffffffe6a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:38 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:38 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0xc1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:38 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfi\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:38 executing program 3: r0 = socket(0xa, 0x3, 0x2) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x6840c0, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f00000000c0)={0x7, 0x227}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x208440, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000140)=0x4, &(0x7f0000000180)=0x4) 22:08:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x129, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:38 executing program 2 (fault-call:2 fault-nth:33): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:38 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000900000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:38 executing program 3: r0 = socket(0x200000000011, 0x3, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x400000, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:38 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1132.631893] FAULT_INJECTION: forcing a failure. [ 1132.631893] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.663252] CPU: 1 PID: 4690 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1132.670243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.670252] Call Trace: [ 1132.670284] dump_stack+0x172/0x1f0 [ 1132.670309] should_fail.cold+0xa/0x1b [ 1132.670330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1132.670365] __should_failslab+0x121/0x190 [ 1132.670386] should_failslab+0x9/0x14 [ 1132.670402] __kmalloc+0x2e2/0x750 [ 1132.670425] ? ext4_find_extent+0x76e/0x9d0 [ 1132.670446] ext4_find_extent+0x76e/0x9d0 [ 1132.670484] ext4_ext_map_blocks+0x1c3/0x55c0 [ 1132.670515] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 1132.670534] ? __lock_is_held+0xb6/0x140 [ 1132.670561] ? lock_acquire+0x16f/0x3f0 [ 1132.670585] ? ext4_map_blocks+0x4cf/0x1b20 [ 1132.686214] ext4_map_blocks+0xf83/0x1b20 [ 1132.686242] ? ext4_issue_zeroout+0x170/0x170 [ 1132.686264] ? kasan_check_write+0x14/0x20 [ 1132.686284] ? __brelse+0x95/0xb0 [ 1132.695320] ext4_getblk+0xc4/0x510 [ 1132.695339] ? ext4_iomap_begin+0xfd0/0xfd0 [ 1132.695364] ? ext4_free_inode+0x1470/0x1470 [ 1132.695382] ext4_bread+0x8f/0x230 [ 1132.695397] ? ext4_getblk+0x510/0x510 [ 1132.695428] ext4_append+0x155/0x370 [ 1132.703504] ext4_mkdir+0x61b/0xdf0 [ 1132.703533] ? ext4_init_dot_dotdot+0x520/0x520 [ 1132.703553] ? selinux_inode_mkdir+0x23/0x30 [ 1132.703570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1132.703585] ? security_inode_mkdir+0xe4/0x120 [ 1132.703606] vfs_mkdir+0x42e/0x690 [ 1132.711497] do_mkdirat+0x234/0x2a0 [ 1132.711516] ? __ia32_sys_mknod+0xb0/0xb0 [ 1132.711531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1132.711548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.711562] ? do_syscall_64+0x26/0x620 [ 1132.711577] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1132.711598] __x64_sys_mkdir+0x5c/0x80 [ 1132.711614] do_syscall_64+0xfd/0x620 [ 1132.711636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1132.720299] RIP: 0033:0x458c47 [ 1132.720314] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1132.720321] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1132.720337] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 [ 1132.720345] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1132.720354] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1132.720363] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1132.720371] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:38 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000040)={0xadad, 0xfffffffffffff800, 0xffff, 0x80}) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x15c, r2, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x229}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x4044841}, 0x40) 22:08:39 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfk\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1132.972105] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1133.086902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=4709 comm=syz-executor.3 22:08:39 executing program 3: r0 = dup(0xffffffffffffffff) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) dup(r0) 22:08:39 executing program 2 (fault-call:2 fault-nth:34): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:39 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\t', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:39 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) getpeername$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) r1 = socket(0x200000000010, 0x3, 0x0) write(r1, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000100)=""/173) 22:08:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1d8, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1133.359799] FAULT_INJECTION: forcing a failure. [ 1133.359799] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.396993] CPU: 0 PID: 4725 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1133.403997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.413386] Call Trace: [ 1133.413418] dump_stack+0x172/0x1f0 [ 1133.413441] should_fail.cold+0xa/0x1b [ 1133.413464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1133.413484] ? lock_downgrade+0x810/0x810 [ 1133.413512] __should_failslab+0x121/0x190 [ 1133.413528] should_failslab+0x9/0x14 [ 1133.413546] __kmalloc_track_caller+0x2de/0x750 [ 1133.413566] ? __schedule+0x86e/0x1dc0 [ 1133.413584] ? mntput+0x74/0xa0 [ 1133.413602] ? strndup_user+0x77/0xd0 22:08:39 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfl\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1133.413625] memdup_user+0x26/0xb0 [ 1133.419878] strndup_user+0x77/0xd0 [ 1133.419899] ksys_mount+0x3c/0x150 [ 1133.419919] __x64_sys_mount+0xbe/0x150 [ 1133.419941] do_syscall_64+0xfd/0x620 [ 1133.419990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.420002] RIP: 0033:0x45c27a [ 1133.420017] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 22:08:39 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) socket(0x5, 0x6, 0x6ead) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@ipv4={[], [], @dev}, 0x0}, &(0x7f00000000c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x2, 0x4e23, 0x0, 0x2, 0x80, 0xa0, 0x30d7229f29dbc3b2, r1, r2}, {0x5, 0x1, 0x7, 0x6, 0x7f, 0x10000, 0x2, 0x5}, {0x8, 0x3, 0x1, 0x50}, 0x4, 0x6e6bb4, 0x0, 0x1, 0x2, 0x2}, {{@in6=@remote, 0x4d5, 0x3c}, 0xa, @in6=@remote, 0x3502, 0x1, 0x1, 0x58ea, 0x626, 0x6a, 0x5}}, 0xe8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0080000000000000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1133.420024] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1133.420037] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1133.420044] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1133.420052] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1133.420060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1133.420068] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:39 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff, 0x0) [ 1133.814286] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:39 executing program 2 (fault-call:2 fault-nth:35): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:39 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:39 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x8) [ 1133.927093] ntfs: (device loop4): parse_options(): NLS character set [ 1133.927093] p852 not found. Using previous one utf8. [ 1133.958539] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1134.046976] FAULT_INJECTION: forcing a failure. [ 1134.046976] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.058529] CPU: 0 PID: 4757 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1134.065599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.074994] Call Trace: [ 1134.075026] dump_stack+0x172/0x1f0 [ 1134.075045] should_fail.cold+0xa/0x1b [ 1134.075062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1134.075073] ? mark_held_locks+0xb1/0x100 [ 1134.075087] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1134.075102] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1134.075124] __should_failslab+0x121/0x190 [ 1134.075145] should_failslab+0x9/0x14 [ 1134.112669] kmem_cache_alloc+0x47/0x700 [ 1134.116754] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1134.121808] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1134.126595] ? ext4_es_scan+0x730/0x730 [ 1134.130599] __es_insert_extent+0x2cc/0xf20 [ 1134.134960] ? do_raw_write_lock+0xbd/0x1e0 [ 1134.139314] ext4_es_insert_extent+0x27e/0x640 [ 1134.143937] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 1134.149792] ext4_map_blocks+0xc3f/0x1b20 [ 1134.153995] ? ext4_issue_zeroout+0x170/0x170 [ 1134.158535] ? kasan_check_write+0x14/0x20 [ 1134.162900] ? __brelse+0x95/0xb0 [ 1134.166416] ext4_getblk+0xc4/0x510 [ 1134.170078] ? ext4_iomap_begin+0xfd0/0xfd0 [ 1134.174437] ? ext4_free_inode+0x1470/0x1470 [ 1134.178887] ext4_bread+0x8f/0x230 [ 1134.182537] ? ext4_getblk+0x510/0x510 [ 1134.186455] ext4_append+0x155/0x370 [ 1134.186480] ext4_mkdir+0x61b/0xdf0 [ 1134.186509] ? ext4_init_dot_dotdot+0x520/0x520 [ 1134.186534] ? selinux_inode_mkdir+0x23/0x30 [ 1134.198573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1134.198593] ? security_inode_mkdir+0xe4/0x120 [ 1134.198615] vfs_mkdir+0x42e/0x690 [ 1134.198637] do_mkdirat+0x234/0x2a0 [ 1134.198655] ? __ia32_sys_mknod+0xb0/0xb0 [ 1134.198670] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1134.198686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.198699] ? do_syscall_64+0x26/0x620 [ 1134.198713] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1134.198733] __x64_sys_mkdir+0x5c/0x80 22:08:40 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000440)={0x1f, {0x7, 0x40, 0x3, 0x8, 0x101, 0x8}}, 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000480)={0x73, @loopback, 0x4e24, 0x3, 'fo\x00', 0x11, 0x2, 0x42}, 0x2c) recvmmsg(r1, &(0x7f0000000400), 0x0, 0x44000102, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000340)=ANY=[@ANYBLOB="040000000000000006d00100000000005100000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/81], @ANYBLOB="000000000000000000600000000000009000000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/144], @ANYBLOB="0000d57d949a365d8aaa59000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/29], @ANYBLOB="000000000000000001000000000000004100000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/65], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) signalfd(r2, &(0x7f00000002c0)={0x400}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1134.198748] do_syscall_64+0xfd/0x620 [ 1134.198772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.234724] RIP: 0033:0x458c47 [ 1134.234741] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1134.234750] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1134.234765] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458c47 22:08:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000857b4fe75a97f37e02fd2e766e94d995b745beceb2c35e76cb4cd742820b6f7847fefe53abe38c159fd77908248e8cced21846d639dbc83bc7fbf5e66d87a52f314a354c4b46bf07adc9d8790fa3b3bba0f31e5adaab2b033fb23553646fb41d470674cb64e40000000000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:40 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:40 executing program 3: r0 = socket(0x200000000010, 0x3, 0x2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40000, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0xfffffffffffffe6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x9, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) write$UHID_INPUT(r1, &(0x7f0000000340)={0x8, "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", 0x1000}, 0x1006) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000040)) [ 1134.234780] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000140 [ 1134.278329] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1134.278339] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 1134.278346] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1134.392847] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:40 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) pipe2(&(0x7f0000000000), 0x84000) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:40 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:40 executing program 2 (fault-call:2 fault-nth:36): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1134.575053] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:40 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xaaed2d93934a6b01, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x2c, &(0x7f0000000040)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x7fff}, 0x8) r2 = socket(0x200000000010, 0x3, 0x3) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x78) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f00000002c0)=@ipx={0x4, 0x101, 0x7, "ae130b3afd2f", 0x1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000340)="158d5cb09a3897f52ec97b63689cd46ad179a7988f95b759ed0d98c1a81f3b09a1cbcb840718211ffd1eabded54e61000424a57f206734fb84cf2ab8431a7adfe1d4567aa4633b418eb678704162ec2e2555c8ff099ccf569a1bfd2135ca825e8288eab9e4e3a09c82160965175f3a2ebaa8fcb6d33a5965a2ed0a2484913b00ca46b4cda09d900b804a16299c6ed9bba671e885b740119aef37b9acb80bb08a31b0bb66e6a77cb773e242387f1fb79ec41a02eb5faca2759f0edaee70a5a05b93ce03ef48", 0xc5}, {&(0x7f0000000440)="ea47c4b11d038979d773e54273ae6bf4093a2292ac1226379555bd1efd7ca61b8edd5c329bd2f1c28b55c9a6977ee9011d15cbb8bfa292871a7aaf15ac7eb7b2547b7a701f3a70e83a6f003e66502755275ae6c40ea59275e2174ef1a35dc31a1a51d00b037a99304c32c9fce58a5edf85de5ca8f0ae8c2ee1ab47b568e66ddeb2594ddad1330f8c413751e179e95aa696c64547013679372a3f54b4b2a37bb6269d7457e2cf6968c5dd56e8f5ff860dbca8ac5ee3908ad9d94ef60fdb39eb2a0b3fcd7e", 0xc4}, {&(0x7f0000000540)="d88b504827924a766b86cf96014905e7dc88ca92fa2c2b8a09a816e575c77aea0260febd2c8c45a2b626357be9cc5d1347bc4f5fbe51cc03a3edafb8f7eea6eab54cfe04752ce12d6602b681394563db8b3f5e3ed42d2f684cb949064da7603c0719da625da5255d930ade861fc89f534b86e3aeded654af2f072cedd0d407dfe5ea081d307b74e2c3077dea46a379207364b96b4ad2c4dbe614755386fa78bf65ee501c99ce3999267f2963e8", 0xad}], 0x3}, 0x8000) write(r2, &(0x7f0000000740)="2404000052001f0014f9f407132c04b5610007ed1000010075000000000000000000000049aa3cf5a07745d5490ace2d63c163c37241d279f44291fe31618246be65e03dfd1106aab6d57eaf18f0f41261567c8aff45f76a55378ecf01f5164afb19ffecb299de6c202596557d782a9fab944d139359b0d1a59ce074f4401c9c8b86027345aad9da7b4e4beb20687903cc232011a70000000000000000e4d6a14bb0d2d7e402000000c3bf5f1c761ed90a3390615d00161f832b678782ad44908efe7fce16760f346ffa35f7119994a48eade2caec8ace8c0521fe3fd76436340c3250c99c96fc822525a6371b4049d96c8b4bb8a2102de125cc309b9348068bceefb90532f9ab32a590f7d33d882aa6b4fb01cca412bdecadb118df1da71e1e82fd27e3f6143eca578472f6be5857ea6eb8d541490522dcd0764c16053f803e186588cf0d8a79c94e3ee11a5e75746373b4eef766f1c139cd0bcc2e07492df3f8e749fbdef83eb8e5213607ff9820b054bbac6f191574552803db5cffbb545a7f053c0000000000000000", 0x18b) [ 1134.770723] FAULT_INJECTION: forcing a failure. [ 1134.770723] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.785818] __ntfs_warning: 2 callbacks suppressed [ 1134.785833] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1134.809858] CPU: 0 PID: 4797 Comm: syz-executor.2 Not tainted 4.19.66 #40 22:08:40 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfp\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1134.818746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.828122] Call Trace: [ 1134.830742] dump_stack+0x172/0x1f0 [ 1134.834395] should_fail.cold+0xa/0x1b [ 1134.838291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1134.843421] ? lock_downgrade+0x810/0x810 [ 1134.847589] __should_failslab+0x121/0x190 [ 1134.851831] should_failslab+0x9/0x14 [ 1134.851848] __kmalloc_track_caller+0x2de/0x750 [ 1134.851871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1134.851887] ? strndup_user+0x77/0xd0 [ 1134.851905] memdup_user+0x26/0xb0 [ 1134.851923] strndup_user+0x77/0xd0 [ 1134.860405] ksys_mount+0x7b/0x150 [ 1134.860427] __x64_sys_mount+0xbe/0x150 [ 1134.860450] do_syscall_64+0xfd/0x620 [ 1134.860469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.860492] RIP: 0033:0x45c27a [ 1134.860507] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1134.860515] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1134.860530] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1134.860539] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1134.860547] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1134.860566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1134.860580] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x44000122, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x400000000002127, 0x4) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1134.982369] ntfs: (device loop4): parse_options(): NLS character set [ 1134.982369] p852 not found. Using previous one utf8. [ 1135.011241] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:41 executing program 2 (fault-call:2 fault-nth:37): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:41 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) socket(0x8, 0x3, 0x400) 22:08:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:41 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\"', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:41 executing program 3: r0 = socket(0x200000000010, 0x6, 0x6) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'veth0_to_team\x00', {0x2, 0x4e24, @broadcast}}) write(r0, &(0x7f00000001c0)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000057b3f12b3a8c299fd1aeba9b19e49e134ada2963a9dce798e7f24d3e0651de5c8e16be4d63de45e75ed023603320443285fef8928fefd471929228ffba64c8f2210219f47736e69e7bd39435a4b6c7601ce8ea7d80306f235e36252c7fb67c54621da8e1cb6fef6d809045f29af71b86424471f283b848c05746a25b83256251e280e618a712f2784af60d528c92f1d0a143f73085f068afa249e0ea0e162b31b16f399d438b26b6f20", 0xce) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)={0x0, @aes128, 0x1, "7d2dfb8bc0c2bf45"}) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x4, 0x68, [], 0x1, &(0x7f0000000080)=[{}], &(0x7f00000000c0)=""/104}, &(0x7f0000000340)=0x78) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000), &(0x7f0000000140)=0x4) 22:08:41 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserft\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1135.318652] FAULT_INJECTION: forcing a failure. [ 1135.318652] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.349201] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1135.373286] CPU: 0 PID: 4833 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1135.380157] ntfs: (device loop4): parse_options(): NLS character set [ 1135.380157] p852 not found. Using previous one utf8. [ 1135.380272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.392245] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1135.401208] Call Trace: [ 1135.401239] dump_stack+0x172/0x1f0 [ 1135.401259] should_fail.cold+0xa/0x1b 22:08:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x6000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000200)={0x9, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}]}) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000002c0)=r1) getsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0x4) 22:08:41 executing program 3: r0 = socket(0x20000000001e, 0x0, 0x8000) write(r0, &(0x7f0000000080)="2400000052001f0014f9f40709000000000000000555fb3cc4b561dfe4ebfc3ff0a054d073dc6f0e81a6c4b015e230b32d7c8e4971bc1f7e60569c2ef7162bb90d", 0x41) [ 1135.401275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1135.401288] ? lock_downgrade+0x810/0x810 [ 1135.401311] __should_failslab+0x121/0x190 [ 1135.401326] should_failslab+0x9/0x14 [ 1135.401340] kmem_cache_alloc+0x2ae/0x700 [ 1135.401361] ? find_held_lock+0x35/0x130 [ 1135.444402] ? fs_reclaim_acquire+0x20/0x20 [ 1135.448752] getname_flags+0xd6/0x5b0 [ 1135.452574] user_path_at_empty+0x2f/0x50 [ 1135.456736] do_mount+0x150/0x2bc0 [ 1135.460301] ? rcu_read_lock_sched_held+0x110/0x130 [ 1135.465355] ? copy_mount_string+0x40/0x40 [ 1135.469622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1135.475193] ? _copy_from_user+0xdd/0x150 [ 1135.479386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1135.484964] ? copy_mount_options+0x280/0x3a0 [ 1135.489502] ksys_mount+0xdb/0x150 [ 1135.493080] __x64_sys_mount+0xbe/0x150 [ 1135.497091] do_syscall_64+0xfd/0x620 [ 1135.500920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.506143] RIP: 0033:0x45c27a [ 1135.509365] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1135.528287] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1135.536236] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1135.543543] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1135.550839] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1135.558140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1135.565432] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0cf4e5c8eabddaeb00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1135.759952] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:41 executing program 3: r0 = socket(0x3, 0x2, 0x7fff) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x400, 0x280) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x2b, 0x2}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) 22:08:41 executing program 2 (fault-call:2 fault-nth:38): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:41 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs#', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1135.868752] ntfs: (device loop4): parse_options(): NLS character set [ 1135.868752] p852 not found. Using previous one utf8. [ 1135.891363] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:41 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112d04091c0007ed100001003500000009008487ebf0e200", 0xfffffffffffffdfb) [ 1136.000007] FAULT_INJECTION: forcing a failure. [ 1136.000007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1136.011910] CPU: 1 PID: 4869 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1136.018871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.028257] Call Trace: [ 1136.030887] dump_stack+0x172/0x1f0 [ 1136.034560] should_fail.cold+0xa/0x1b [ 1136.038490] ? kernel_text_address+0x73/0xf0 [ 1136.042936] ? fault_create_debugfs_attr+0x1e0/0x1e0 22:08:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:42 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:42 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) write$binfmt_elf32(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0xe2, 0xffffffffffff40a0, 0x6, 0x1000, 0xba, 0x2, 0x6, 0x1000000000, 0x30d, 0x38, 0x113, 0x8b, 0x54, 0x20, 0x2, 0x1, 0xfff, 0xe3ec}, [{0x7, 0xc469, 0x1ff, 0x0, 0x0, 0x2, 0x4}, {0x4, 0x1ff, 0x1000, 0x0, 0x9, 0x2, 0x1, 0x9d8}], "210e690ac2d9c1bb4722376c7a1a16d8edc2df88b1d8a6fc59a92dc51b9afb2aad7f6ca0656b2998438b9a5e62bb0f0d404936368816dbde7b7d9c090ab6865389916c925188607fd94549aa354c0369795b829f8f5aaa2e244b88908bee00f375e8e258ef81a1f6f284dd11389ab868bb0887d34fc6e314dd85ebe60c214c77a64637b4a9bd8bf936839ddfa40600957cc29d12f01affe55fb2a8372a99bc3f037873bdf57b3240dc5ce8f3e8988dcbc98e53180540eced23d8bd270a703658e1961b66ccfef2e931cf472ed570b23b6483b452ecf85fe9", [[], [], [], []]}, 0x550) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) [ 1136.048076] ? mark_held_locks+0x100/0x100 [ 1136.052343] __alloc_pages_nodemask+0x1ee/0x750 [ 1136.057047] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1136.062094] ? find_held_lock+0x35/0x130 [ 1136.066212] cache_grow_begin+0x91/0x8c0 [ 1136.070311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1136.075881] ? check_preemption_disabled+0x48/0x290 [ 1136.080933] kmem_cache_alloc+0x63b/0x700 [ 1136.085113] ? kmem_cache_alloc_trace+0x5a7/0x760 [ 1136.090000] ? find_held_lock+0x35/0x130 [ 1136.094109] getname_flags+0xd6/0x5b0 [ 1136.097960] user_path_at_empty+0x2f/0x50 [ 1136.102153] do_mount+0x150/0x2bc0 [ 1136.105735] ? rcu_read_lock_sched_held+0x110/0x130 [ 1136.110795] ? copy_mount_string+0x40/0x40 [ 1136.115092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1136.120680] ? copy_mount_options+0x280/0x3a0 [ 1136.125227] ksys_mount+0xdb/0x150 [ 1136.128807] __x64_sys_mount+0xbe/0x150 [ 1136.132820] do_syscall_64+0xfd/0x620 [ 1136.136651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.141860] RIP: 0033:0x45c27a [ 1136.145071] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1136.163997] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1136.171740] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1136.179039] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1136.186343] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1136.193653] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1136.200957] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1136.335059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41186 sclass=netlink_route_socket pig=4883 comm=syz-executor.3 [ 1136.350607] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 1136.351910] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:42 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1136.402848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41186 sclass=netlink_route_socket pig=4891 comm=syz-executor.3 22:08:42 executing program 2 (fault-call:2 fault-nth:39): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400801}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x2b0, r2, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xba3f}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4fc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x19c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x99}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6a054587}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x63d3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd66}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ec}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x300e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f8}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb4d0}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9393}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x800}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000100)={r3, 0x8, 0x58, "6252acdcd880222596224bc187d849f515c68c5bbf0b1aa21227e4ddeddfdba554078a88440c83a70692c0913e2223b7f0d7f1ceedba900d593d047bfec55b140c496aade64f8c44abfd14c879922fa5be0e81842b709cff"}, 0x60) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0xfffffcf4, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1, 0xfffffffffffffffd}, 0x1c) 22:08:42 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs,', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1136.593827] FAULT_INJECTION: forcing a failure. [ 1136.593827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1136.605890] CPU: 1 PID: 4899 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1136.612873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.622263] Call Trace: [ 1136.624893] dump_stack+0x172/0x1f0 [ 1136.628563] should_fail.cold+0xa/0x1b [ 1136.628585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1136.628605] ? mark_held_locks+0x100/0x100 22:08:42 executing program 3: r0 = socket(0x10, 0x1, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) [ 1136.628629] __alloc_pages_nodemask+0x1ee/0x750 [ 1136.628649] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1136.628663] ? find_held_lock+0x35/0x130 [ 1136.628695] cache_grow_begin+0x91/0x8c0 [ 1136.628715] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1136.628733] ? check_preemption_disabled+0x48/0x290 [ 1136.628762] kmem_cache_alloc+0x63b/0x700 [ 1136.637873] ? kmem_cache_alloc_trace+0x5a7/0x760 [ 1136.637903] getname_flags+0xd6/0x5b0 [ 1136.637925] user_path_at_empty+0x2f/0x50 [ 1136.637946] do_mount+0x150/0x2bc0 [ 1136.651977] ? retint_kernel+0x2d/0x2d [ 1136.652004] ? copy_mount_string+0x40/0x40 [ 1136.652020] ? copy_mount_options+0x208/0x3a0 [ 1136.652041] ? audit_add_tree_rule.cold+0x3d/0x3d [ 1136.652058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1136.652078] ? copy_mount_options+0x280/0x3a0 [ 1136.660251] ksys_mount+0xdb/0x150 [ 1136.660273] __x64_sys_mount+0xbe/0x150 [ 1136.660296] do_syscall_64+0xfd/0x620 [ 1136.660316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.660326] RIP: 0033:0x45c27a [ 1136.660342] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1136.660350] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1136.660365] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1136.660373] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1136.660381] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1136.660388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1136.660396] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:42 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1136.855251] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 22:08:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:42 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) dup2(r0, r0) r1 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_LOCK(r1, 0xb) 22:08:43 executing program 2 (fault-call:2 fault-nth:40): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:43 executing program 3: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000300)="2400000052001f0014f9f407112c04091c0007ed10000100350000000900000000000000", 0x24) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)='\\\x00'}, 0x30) sched_rr_get_interval(r1, &(0x7f0000000100)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000040)={0x6f, 0x4, 0x7}) 22:08:43 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/172, 0xac}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000180)=""/161, 0xa1}, {0x0}], 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r6, 0xffff, 0x1006, &(0x7f0000000100)={0x3}, 0x10) recvfrom$inet(r6, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r5, 0x0) shutdown(r2, 0x0) [ 1137.248071] FAULT_INJECTION: forcing a failure. [ 1137.248071] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.268559] CPU: 1 PID: 4932 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1137.275550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.284971] Call Trace: [ 1137.287604] dump_stack+0x172/0x1f0 [ 1137.291284] should_fail.cold+0xa/0x1b [ 1137.295212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1137.300348] ? lock_downgrade+0x810/0x810 [ 1137.304539] __should_failslab+0x121/0x190 [ 1137.308807] should_failslab+0x9/0x14 [ 1137.312634] kmem_cache_alloc+0x2ae/0x700 [ 1137.316807] ? cache_grow_end+0xa4/0x190 [ 1137.320944] getname_flags+0xd6/0x5b0 [ 1137.324778] user_path_at_empty+0x2f/0x50 [ 1137.328961] do_mount+0x150/0x2bc0 [ 1137.332532] ? rcu_read_lock_sched_held+0x110/0x130 [ 1137.337583] ? copy_mount_string+0x40/0x40 [ 1137.341864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:08:43 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfy\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1137.347445] ? copy_mount_options+0x280/0x3a0 [ 1137.351995] ksys_mount+0xdb/0x150 [ 1137.355574] __x64_sys_mount+0xbe/0x150 [ 1137.359584] do_syscall_64+0xfd/0x620 [ 1137.363411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.368645] RIP: 0033:0x45c27a [ 1137.371853] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1137.390779] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1137.398525] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1137.405824] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1137.413148] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1137.420450] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1137.427749] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400000, 0x0) r2 = getegid() ioctl$TUNSETGROUP(r1, 0x400454ce, r2) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) faccessat(r3, &(0x7f0000000100)='./file0\x00', 0xe5fc0fb54bfe2ac, 0x1100) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @rand_addr, 0x4000000000000}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000800e32a6284b0ccfd66d"], 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x347, 0xffffffffffff36c2, 0x200000000, 0xffff, 0x5}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x0, 0xb68, 0x1, 0x81}, {0x0, 0x4, 0x9, 0x2}, {0x200, 0x9, 0x0, 0x7}, {0x9, 0x800, 0x0, 0x3f}, {0x6ee, 0x10001, 0x666, 0x5}, {0x80, 0x800, 0x5, 0x81}, {0x80000001, 0x9, 0x7ff, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000000)=0x400000000002126, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:43 executing program 2 (fault-call:2 fault-nth:41): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = semget(0x2, 0x7, 0x8) semctl$SETVAL(r1, 0x1, 0x10, &(0x7f0000000000)=0x23) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c000000001000213899926dd9e754bb4a9d8e306ae38bde3f0b9c95cdfbdb52af9def73646c1b8ee6b2fac07d332147114d1fed81b1fc85b0f3fefa741b4fa45b99689a99cc558f29dd1ff3f529c584461bc4777af259d6610b"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1137.670479] FAULT_INJECTION: forcing a failure. [ 1137.670479] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.689044] CPU: 1 PID: 4957 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1137.696038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.705423] Call Trace: [ 1137.708065] dump_stack+0x172/0x1f0 [ 1137.712158] should_fail.cold+0xa/0x1b [ 1137.716116] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1137.721353] ? lock_downgrade+0x810/0x810 [ 1137.725555] __should_failslab+0x121/0x190 [ 1137.729863] should_failslab+0x9/0x14 [ 1137.733708] kmem_cache_alloc+0x2ae/0x700 [ 1137.737900] ? lock_downgrade+0x810/0x810 [ 1137.742108] alloc_vfsmnt+0x28/0x780 [ 1137.745864] vfs_kern_mount.part.0+0x2a/0x410 [ 1137.750416] do_mount+0x53e/0x2bc0 [ 1137.754015] ? copy_mount_string+0x40/0x40 [ 1137.758293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1137.764052] ? copy_mount_options+0x280/0x3a0 [ 1137.768597] ksys_mount+0xdb/0x150 [ 1137.772183] __x64_sys_mount+0xbe/0x150 [ 1137.776200] do_syscall_64+0xfd/0x620 [ 1137.780056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.785283] RIP: 0033:0x45c27a [ 1137.788509] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1137.807963] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1137.815801] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1137.823116] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1137.833796] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1137.841095] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1137.848574] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:43 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfz\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:43 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:44 executing program 2 (fault-call:2 fault-nth:42): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1138.126540] FAULT_INJECTION: forcing a failure. [ 1138.126540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1138.148618] CPU: 1 PID: 4975 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1138.155616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.165032] Call Trace: [ 1138.167692] dump_stack+0x172/0x1f0 [ 1138.171366] should_fail.cold+0xa/0x1b [ 1138.175291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1138.180435] ? __might_sleep+0x95/0x190 [ 1138.184465] __alloc_pages_nodemask+0x1ee/0x750 [ 1138.189167] ? rcu_read_lock_sched_held+0x110/0x130 [ 1138.194220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1138.199831] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1138.204898] ? pcpu_balance_workfn+0x1270/0x1270 [ 1138.209691] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1138.216667] alloc_pages_current+0x107/0x210 [ 1138.221130] get_zeroed_page+0x14/0x50 [ 1138.225063] mount_fs+0x20a/0x31f [ 1138.228646] vfs_kern_mount.part.0+0x6f/0x410 [ 1138.233197] do_mount+0x53e/0x2bc0 [ 1138.236799] ? copy_mount_string+0x40/0x40 [ 1138.241257] ? _copy_from_user+0xdd/0x150 [ 1138.245471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.251117] ? copy_mount_options+0x280/0x3a0 [ 1138.255657] ksys_mount+0xdb/0x150 [ 1138.259245] __x64_sys_mount+0xbe/0x150 [ 1138.263355] do_syscall_64+0xfd/0x620 [ 1138.267205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.272427] RIP: 0033:0x45c27a [ 1138.275661] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1138.294856] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1138.302775] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1138.310081] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1138.317901] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1138.325194] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1138.332495] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:44 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000380)=0xffffffff, 0x4) 22:08:44 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs`', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:44 executing program 2 (fault-call:2 fault-nth:43): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xfd30, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000600)=@filter={'filter\x00', 0xe, 0x4, 0x394, 0x0, 0x26c, 0x26c, 0x26c, 0x3a0, 0x490, 0x490, 0x490, 0x490, 0x490, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0xec}, @REJECT={0x24, 'REJECT\x00'}}, {{@ipv6={@mcast2, @mcast2, [], [], 'ip_vti0\x00', 'syzkaller1\x00'}, 0x0, 0xc8, 0xec}, @REJECT={0x24, 'REJECT\x00'}}, {{@ipv6={@dev, @remote, [], [], 'bridge_slave_1\x00', 'batadv0\x00'}, 0x0, 0xc8, 0xf0}, @common=@inet=@SET1={0x28, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x3f0) [ 1138.710571] FAULT_INJECTION: forcing a failure. [ 1138.710571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1138.737043] CPU: 0 PID: 4999 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1138.744473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.753853] Call Trace: [ 1138.756471] dump_stack+0x172/0x1f0 [ 1138.760130] should_fail.cold+0xa/0x1b [ 1138.764063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1138.769721] ? __might_sleep+0x95/0x190 [ 1138.773730] __alloc_pages_nodemask+0x1ee/0x750 [ 1138.778425] ? check_preemption_disabled+0x48/0x290 [ 1138.784728] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1138.789777] ? rcu_read_lock_sched_held+0x110/0x130 [ 1138.794843] ? __alloc_pages_nodemask+0x632/0x750 [ 1138.799875] ? rcu_read_lock_sched_held+0x110/0x130 [ 1138.804911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1138.811940] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1138.817518] alloc_pages_current+0x107/0x210 [ 1138.821978] get_zeroed_page+0x14/0x50 [ 1138.825910] selinux_sb_copy_data+0x2a/0x4a0 [ 1138.830355] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1138.835940] security_sb_copy_data+0x6b/0xb0 [ 1138.840649] mount_fs+0x230/0x31f [ 1138.844130] vfs_kern_mount.part.0+0x6f/0x410 [ 1138.848668] do_mount+0x53e/0x2bc0 [ 1138.852339] ? copy_mount_string+0x40/0x40 [ 1138.856598] ? copy_mount_options+0x198/0x3a0 [ 1138.861116] ? copy_mount_options+0x1b1/0x3a0 [ 1138.865675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1138.871252] ? copy_mount_options+0x280/0x3a0 [ 1138.876935] ksys_mount+0xdb/0x150 [ 1138.880519] __x64_sys_mount+0xbe/0x150 [ 1138.884790] do_syscall_64+0xfd/0x620 [ 1138.888623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.893841] RIP: 0033:0x45c27a 22:08:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000000180), 0x0, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x26) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f00000000c0)=0x19, 0x4) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000100)={0xffffffffffff413d, 0xf000}) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) [ 1138.897061] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1138.916075] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1138.923830] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1138.931125] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1138.938507] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1138.945799] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1138.953265] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:45 executing program 2 (fault-call:2 fault-nth:44): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:45 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) setpriority(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 22:08:45 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2901, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:45 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@rand_addr="135743d1f8f99e20153e8266b7cbc0a4"}, 0x14) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x8001, 0x28102) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f00000002c0)={0x8001, 0x800, 0xe73}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0xbb00, @mcast2, 0x8}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r3, 0xffffffffffffffc7}, &(0x7f0000000240)=0x8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000340)={'team0\x00'}) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x4000843, &(0x7f0000000380)={0xa, 0x4e20, 0x101, @ipv4={[], [], @multicast1}}, 0xfffffed4) 22:08:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x402080, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000000c0)={0x665, 0x3ff}) 22:08:45 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x38e, &(0x7f0000000040)=[{&(0x7f0000000100)="2f0000001c000367ffffff000d00000002000004010000003f0006c91300010023000000000000005867000000050b", 0xfda9}], 0x1}, 0x0) [ 1139.402908] FAULT_INJECTION: forcing a failure. [ 1139.402908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1139.442820] CPU: 1 PID: 5021 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1139.449828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.459210] Call Trace: [ 1139.461842] dump_stack+0x172/0x1f0 [ 1139.465524] should_fail.cold+0xa/0x1b [ 1139.469482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1139.474621] ? __might_sleep+0x95/0x190 [ 1139.478628] __alloc_pages_nodemask+0x1ee/0x750 [ 1139.483322] ? check_preemption_disabled+0x48/0x290 [ 1139.483346] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1139.483371] ? rcu_read_lock_sched_held+0x110/0x130 [ 1139.483390] ? __alloc_pages_nodemask+0x632/0x750 [ 1139.498464] ? rcu_read_lock_sched_held+0x110/0x130 [ 1139.498484] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1139.498501] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1139.498521] alloc_pages_current+0x107/0x210 [ 1139.498541] get_zeroed_page+0x14/0x50 [ 1139.498557] selinux_sb_copy_data+0x2a/0x4a0 [ 1139.498571] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1139.498595] security_sb_copy_data+0x6b/0xb0 [ 1139.498613] mount_fs+0x230/0x31f [ 1139.498636] vfs_kern_mount.part.0+0x6f/0x410 [ 1139.498657] do_mount+0x53e/0x2bc0 [ 1139.498680] ? copy_mount_string+0x40/0x40 [ 1139.498699] ? _copy_from_user+0xdd/0x150 [ 1139.498717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1139.498737] ? copy_mount_options+0x280/0x3a0 [ 1139.572298] ksys_mount+0xdb/0x150 [ 1139.575879] __x64_sys_mount+0xbe/0x150 [ 1139.579902] do_syscall_64+0xfd/0x620 [ 1139.583732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.589531] RIP: 0033:0x45c27a 22:08:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x2c0081) write$P9_RLOCK(r1, &(0x7f0000000240)={0x8, 0x35, 0x2, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0xfffffffffffff801, 0x7}, &(0x7f00000001c0)=0x1) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r2, 0xffffffffffffff7c}, 0x8) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0cf7000000100004"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) socket$bt_hidp(0x1f, 0x3, 0x6) epoll_pwait(r3, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x100000001, &(0x7f0000000000)={0x400}, 0x8) [ 1139.592749] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1139.611849] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1139.619584] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1139.627006] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1139.634649] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1139.641950] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1139.649243] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:08:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:45 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:45 executing program 2 (fault-call:2 fault-nth:45): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r2 = getpid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) kcmp(r2, r3, 0x6, r1, r1) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x800) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper={0x40106308}], 0x1, 0x0, &(0x7f0000000200)="86"}) 22:08:46 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1140.073728] binder: 5076:5077 ioctl c0306201 20000380 returned -11 22:08:46 executing program 3: r0 = gettid() capget(&(0x7f0000000040)={0x19980330, r0}, &(0x7f0000000080)) [ 1140.119164] FAULT_INJECTION: forcing a failure. [ 1140.119164] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.181667] CPU: 0 PID: 5072 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1140.188650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1140.198038] Call Trace: [ 1140.200665] dump_stack+0x172/0x1f0 [ 1140.204326] should_fail.cold+0xa/0x1b [ 1140.208240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1140.213364] ? lock_downgrade+0x810/0x810 [ 1140.217551] ? kill_litter_super+0x60/0x60 [ 1140.221820] __should_failslab+0x121/0x190 [ 1140.226073] should_failslab+0x9/0x14 [ 1140.229898] kmem_cache_alloc_trace+0x2cc/0x760 [ 1140.234591] ? kasan_check_read+0x11/0x20 [ 1140.238761] ? do_raw_spin_unlock+0x57/0x270 [ 1140.243193] ? kill_litter_super+0x60/0x60 [ 1140.243234] sget_userns+0x11b/0xd30 [ 1140.243250] ? kill_litter_super+0x60/0x60 [ 1140.243271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1140.255492] ? ns_test_super+0x50/0x50 [ 1140.255511] ? ns_test_super+0x50/0x50 [ 1140.255527] ? kill_litter_super+0x60/0x60 [ 1140.255542] sget+0x10c/0x150 [ 1140.255562] mount_bdev+0xff/0x3c0 [ 1140.279779] ? finish_unfinished+0x1120/0x1120 [ 1140.284408] get_super_block+0x35/0x40 [ 1140.288321] mount_fs+0xa8/0x31f [ 1140.291729] vfs_kern_mount.part.0+0x6f/0x410 [ 1140.296252] do_mount+0x53e/0x2bc0 [ 1140.299820] ? copy_mount_string+0x40/0x40 [ 1140.304108] ? _copy_from_user+0xdd/0x150 [ 1140.308558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1140.314150] ? copy_mount_options+0x280/0x3a0 [ 1140.318780] ksys_mount+0xdb/0x150 [ 1140.322349] __x64_sys_mount+0xbe/0x150 [ 1140.326352] do_syscall_64+0xfd/0x620 [ 1140.330178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1140.335478] RIP: 0033:0x45c27a [ 1140.338697] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1140.357793] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1140.365537] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1140.372838] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:08:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) keyctl$describe(0x6, r1, &(0x7f0000000100)=""/210, 0xd2) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000280)=ANY=[@ANYBLOB="0c00000000100000"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:46 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1140.380130] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1140.387592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1140.394877] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:46 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'ip6_vti0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x1, 'team_slave_0\x00'}, 0x18) 22:08:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:46 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:46 executing program 2 (fault-call:2 fault-nth:46): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:46 executing program 3: r0 = gettid() recvmsg(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) semget(0x2, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x439) timer_create(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x13) [ 1140.614310] __ntfs_warning: 17 callbacks suppressed [ 1140.614323] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1140.704797] ntfs: (device loop4): parse_options(): NLS character set [ 1140.704797] p852 not found. Using previous one utf8. 22:08:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0c2aa500000000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x420000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1140.747067] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x5) ppoll(&(0x7f0000000240)=[{r0}], 0x1, &(0x7f0000000280), 0x0, 0x0) [ 1140.843070] FAULT_INJECTION: forcing a failure. [ 1140.843070] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.877005] CPU: 0 PID: 5117 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1140.883990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1140.893365] Call Trace: [ 1140.896000] dump_stack+0x172/0x1f0 [ 1140.899653] should_fail.cold+0xa/0x1b [ 1140.903570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1140.908701] ? lock_downgrade+0x810/0x810 [ 1140.912888] ? kill_litter_super+0x60/0x60 [ 1140.917152] __should_failslab+0x121/0x190 [ 1140.921420] should_failslab+0x9/0x14 [ 1140.925259] kmem_cache_alloc_trace+0x2cc/0x760 [ 1140.930133] ? kasan_check_read+0x11/0x20 [ 1140.934306] ? do_raw_spin_unlock+0x57/0x270 [ 1140.938747] ? kill_litter_super+0x60/0x60 [ 1140.943117] sget_userns+0x11b/0xd30 [ 1140.946867] ? kill_litter_super+0x60/0x60 [ 1140.951130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1140.956691] ? ns_test_super+0x50/0x50 [ 1140.960603] ? ns_test_super+0x50/0x50 [ 1140.964530] ? kill_litter_super+0x60/0x60 [ 1140.968795] sget+0x10c/0x150 [ 1140.971942] mount_bdev+0xff/0x3c0 [ 1140.975525] ? finish_unfinished+0x1120/0x1120 [ 1140.980132] get_super_block+0x35/0x40 [ 1140.984044] mount_fs+0xa8/0x31f [ 1140.987523] vfs_kern_mount.part.0+0x6f/0x410 [ 1140.992045] do_mount+0x53e/0x2bc0 [ 1140.995651] ? copy_mount_string+0x40/0x40 [ 1140.999917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1141.005486] ? copy_mount_options+0x280/0x3a0 [ 1141.010105] ksys_mount+0xdb/0x150 [ 1141.013673] __x64_sys_mount+0xbe/0x150 [ 1141.017672] do_syscall_64+0xfd/0x620 [ 1141.021507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1141.026724] RIP: 0033:0x45c27a 22:08:47 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1141.029933] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1141.048870] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1141.056646] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1141.063945] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1141.071254] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1141.078544] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1141.085860] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:47 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0x4008af25, &(0x7f0000000000)) [ 1141.179521] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:47 executing program 2 (fault-call:2 fault-nth:47): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1141.220181] ntfs: (device loop4): parse_options(): NLS character set [ 1141.220181] p852 not found. Using previous one utf8. [ 1141.255224] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e22, 0x0, @loopback, 0x4000000000}, 0xfffffffffffffec6) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = geteuid() ioprio_set$uid(0xb0f54b4f3391fce5, r1, 0x2) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$LOOP_SET_FD(r4, 0x4c00, r2) 22:08:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5200, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:47 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:47 executing program 3: [ 1141.403291] FAULT_INJECTION: forcing a failure. [ 1141.403291] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.428466] CPU: 1 PID: 5143 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1141.435445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1141.435481] Call Trace: [ 1141.447490] dump_stack+0x172/0x1f0 [ 1141.451153] should_fail.cold+0xa/0x1b [ 1141.455079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1141.460216] ? lock_downgrade+0x810/0x810 [ 1141.464397] __should_failslab+0x121/0x190 [ 1141.464417] should_failslab+0x9/0x14 [ 1141.464431] __kmalloc+0x2e2/0x750 [ 1141.464462] ? __lockdep_init_map+0x10c/0x5b0 [ 1141.480535] ? prealloc_shrinker+0xdf/0x340 [ 1141.484903] prealloc_shrinker+0xdf/0x340 [ 1141.489080] sget_userns+0x7ec/0xd30 [ 1141.492813] ? kill_litter_super+0x60/0x60 [ 1141.497079] ? ns_test_super+0x50/0x50 22:08:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5f, &(0x7f0000000280)=0x8, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0c000000001000003cd6133bc09620a679cd3bc59b5c805653bae3c78984d5d28c9339f2b54cb9b9eb035291b681d47f2dfb90bc5d3d2a41b23864aae6df3d9f1cb7a4c0988d33bb2e5e9d2306139be6dd66b018ff7d8fe0e390a1a1a422291f8de4967faad365793476cf3bd84629c098456fe12e34af96445669c9c452ce21485f91529f90b794f3260a116c4e8b01060d694f6eed4a596f122fb86306110501d3e6a4781ea588a23d5b7fe981f114a78b3900000000d733158d764bd56cdba09dc3fa08d7248209c825f00487a13dfe09002304d7a0f039730f1168d3de8d82a02b168ac8d515e0658cabbba4bf25ae5f221852127a0e"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x80000001, 0x101000) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffffe) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x3ea7521d9d8f4de0, 0x1, 0x2}, 0x9}}, 0x18) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0xfffffffffffffc17) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1141.500998] ? ns_test_super+0x50/0x50 [ 1141.504917] ? kill_litter_super+0x60/0x60 [ 1141.509186] sget+0x10c/0x150 [ 1141.509207] mount_bdev+0xff/0x3c0 [ 1141.509222] ? finish_unfinished+0x1120/0x1120 [ 1141.509241] get_super_block+0x35/0x40 [ 1141.509258] mount_fs+0xa8/0x31f [ 1141.509279] vfs_kern_mount.part.0+0x6f/0x410 [ 1141.509299] do_mount+0x53e/0x2bc0 [ 1141.509320] ? copy_mount_string+0x40/0x40 [ 1141.509345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1141.509359] ? copy_mount_options+0x280/0x3a0 [ 1141.509378] ksys_mount+0xdb/0x150 [ 1141.509397] __x64_sys_mount+0xbe/0x150 [ 1141.509418] do_syscall_64+0xfd/0x620 [ 1141.550625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1141.550637] RIP: 0033:0x45c27a [ 1141.550653] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1141.550660] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1141.550677] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a 22:08:47 executing program 3: [ 1141.550686] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1141.550695] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1141.550703] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1141.550711] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:47 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x93', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_getattr(r1, &(0x7f00000000c0)={0x30}, 0x30, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0xfffffffffffffc85) 22:08:47 executing program 2 (fault-call:2 fault-nth:48): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9001) 22:08:47 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\b', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1141.855168] FAULT_INJECTION: forcing a failure. [ 1141.855168] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.908553] CPU: 1 PID: 5170 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1141.915663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1141.926684] Call Trace: [ 1141.929312] dump_stack+0x172/0x1f0 [ 1141.932982] should_fail.cold+0xa/0x1b [ 1141.936913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1141.942052] ? lock_downgrade+0x810/0x810 [ 1141.946241] ? kill_litter_super+0x60/0x60 [ 1141.950516] __should_failslab+0x121/0x190 [ 1141.954785] should_failslab+0x9/0x14 [ 1141.958628] kmem_cache_alloc_trace+0x2cc/0x760 [ 1141.963330] ? kasan_check_read+0x11/0x20 [ 1141.967509] ? do_raw_spin_unlock+0x57/0x270 [ 1141.971967] ? kill_litter_super+0x60/0x60 [ 1141.976243] sget_userns+0x11b/0xd30 [ 1141.980014] ? kill_litter_super+0x60/0x60 [ 1141.984284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1141.989863] ? ns_test_super+0x50/0x50 [ 1141.993790] ? ns_test_super+0x50/0x50 [ 1141.997715] ? kill_litter_super+0x60/0x60 [ 1142.001988] sget+0x10c/0x150 [ 1142.005141] mount_bdev+0xff/0x3c0 [ 1142.008708] ? finish_unfinished+0x1120/0x1120 [ 1142.013335] get_super_block+0x35/0x40 [ 1142.017261] mount_fs+0xa8/0x31f [ 1142.020668] vfs_kern_mount.part.0+0x6f/0x410 [ 1142.025208] do_mount+0x53e/0x2bc0 [ 1142.028790] ? copy_mount_string+0x40/0x40 [ 1142.033063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.038628] ? copy_mount_options+0x280/0x3a0 [ 1142.043162] ksys_mount+0xdb/0x150 [ 1142.046738] __x64_sys_mount+0xbe/0x150 [ 1142.050757] do_syscall_64+0xfd/0x620 [ 1142.054598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.059853] RIP: 0033:0x45c27a [ 1142.063072] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1142.082025] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1142.089771] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1142.097071] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:08:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:48 executing program 3: r0 = eventfd2(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0'}, 0xb) [ 1142.104367] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1142.111658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1142.119035] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/172, 0xac}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000180)=""/161, 0xa1}], 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r5, 0x0) shutdown(r2, 0x0) 22:08:48 executing program 2 (fault-call:2 fault-nth:49): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:48 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\t', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:48 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x0e', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1142.486083] FAULT_INJECTION: forcing a failure. [ 1142.486083] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.517495] CPU: 0 PID: 5199 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1142.524492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1142.533875] Call Trace: [ 1142.536519] dump_stack+0x172/0x1f0 [ 1142.540183] should_fail.cold+0xa/0x1b [ 1142.544106] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1142.549239] ? lock_downgrade+0x810/0x810 [ 1142.553430] ? kill_litter_super+0x60/0x60 [ 1142.557696] __should_failslab+0x121/0x190 [ 1142.561981] should_failslab+0x9/0x14 [ 1142.565815] kmem_cache_alloc_trace+0x2cc/0x760 [ 1142.570519] ? kasan_check_read+0x11/0x20 [ 1142.574706] ? do_raw_spin_unlock+0x57/0x270 [ 1142.579148] ? kill_litter_super+0x60/0x60 [ 1142.583416] sget_userns+0x11b/0xd30 [ 1142.587159] ? kill_litter_super+0x60/0x60 [ 1142.591456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.597136] ? ns_test_super+0x50/0x50 [ 1142.601067] ? ns_test_super+0x50/0x50 [ 1142.604992] ? kill_litter_super+0x60/0x60 [ 1142.609277] sget+0x10c/0x150 [ 1142.612412] mount_bdev+0xff/0x3c0 [ 1142.615980] ? finish_unfinished+0x1120/0x1120 [ 1142.620592] get_super_block+0x35/0x40 [ 1142.624511] mount_fs+0xa8/0x31f [ 1142.627907] vfs_kern_mount.part.0+0x6f/0x410 [ 1142.632434] do_mount+0x53e/0x2bc0 [ 1142.636004] ? copy_mount_string+0x40/0x40 [ 1142.640283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1142.645856] ? copy_mount_options+0x280/0x3a0 [ 1142.650393] ksys_mount+0xdb/0x150 [ 1142.653982] __x64_sys_mount+0xbe/0x150 [ 1142.657999] do_syscall_64+0xfd/0x620 [ 1142.661832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.667083] RIP: 0033:0x45c27a 22:08:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xd801, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1142.670293] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1142.689221] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1142.696973] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1142.704267] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1142.711563] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1142.718863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1142.726155] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:48 executing program 5: r0 = socket$inet6(0xa, 0x800, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000002100)=[{{&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000002200)=[{&(0x7f0000000480)=""/241, 0xf1}, {&(0x7f0000000240)=""/139, 0x44e}], 0x2, &(0x7f00000005c0)=""/127, 0x7f}, 0x34d87acc}, {{&(0x7f0000000640)=@xdp, 0x80, &(0x7f0000000700)=[{&(0x7f00000006c0)=""/55, 0x37}], 0x1, 0x0, 0xfffffffffffffc42}, 0x2}, {{&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x19a, &(0x7f0000001a00), 0x116, &(0x7f0000001a40)=""/140, 0x8c}, 0x25}, {{&(0x7f0000001b00)=@alg, 0x80, &(0x7f0000001f80)=[{&(0x7f0000002240)=""/221, 0xdd}, {&(0x7f0000001c80)=""/28, 0x1c}, {&(0x7f0000001cc0)=""/215, 0xd7}, {&(0x7f0000001dc0)=""/61, 0x3d}, {&(0x7f0000001e00)=""/115, 0x73}, {&(0x7f0000001e80)=""/253, 0xfd}], 0x6, &(0x7f0000002000)=""/250, 0xfa}, 0x9}], 0x4, 0x1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x84800) connect$rxrpc(r1, &(0x7f00000000c0)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @local}}, 0x24) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='veth1_to_bond\x00', 0x10) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) ioctl$TCGETA(r2, 0x5412, &(0x7f0000000080)) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1142.869910] sp0: Synchronizing with TNC 22:08:48 executing program 2 (fault-call:2 fault-nth:50): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:49 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1143.036630] sp0: Synchronizing with TNC 22:08:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x3, 0x2, 0x3, {0xa, 0x4e23, 0x8000, @local, 0xfffffffffffffff7}}}, 0x32) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:49 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs4', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1143.210016] FAULT_INJECTION: forcing a failure. [ 1143.210016] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.223809] CPU: 1 PID: 5226 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1143.230781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1143.230790] Call Trace: [ 1143.230823] dump_stack+0x172/0x1f0 [ 1143.230846] should_fail.cold+0xa/0x1b [ 1143.230867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1143.230885] ? lock_downgrade+0x810/0x810 [ 1143.230916] __should_failslab+0x121/0x190 [ 1143.230936] should_failslab+0x9/0x14 [ 1143.230952] __kmalloc+0x2e2/0x750 [ 1143.230972] ? __lockdep_init_map+0x10c/0x5b0 [ 1143.230995] ? prealloc_shrinker+0xdf/0x340 [ 1143.231017] prealloc_shrinker+0xdf/0x340 [ 1143.284472] sget_userns+0x7ec/0xd30 [ 1143.288208] ? kill_litter_super+0x60/0x60 [ 1143.292476] ? ns_test_super+0x50/0x50 [ 1143.296385] ? ns_test_super+0x50/0x50 [ 1143.300286] ? kill_litter_super+0x60/0x60 [ 1143.304546] sget+0x10c/0x150 [ 1143.307676] mount_bdev+0xff/0x3c0 [ 1143.311234] ? finish_unfinished+0x1120/0x1120 [ 1143.315839] get_super_block+0x35/0x40 [ 1143.319744] mount_fs+0xa8/0x31f [ 1143.319769] vfs_kern_mount.part.0+0x6f/0x410 [ 1143.319791] do_mount+0x53e/0x2bc0 [ 1143.327665] ? copy_mount_string+0x40/0x40 [ 1143.327686] ? _copy_from_user+0xdd/0x150 [ 1143.327707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1143.345162] ? copy_mount_options+0x280/0x3a0 [ 1143.349691] ksys_mount+0xdb/0x150 [ 1143.353266] __x64_sys_mount+0xbe/0x150 22:08:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/172, 0xac}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000180)=""/161, 0xa1}], 0x1) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r6, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/183, 0xb7}], 0x1) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r7, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r6, 0x0) recvfrom$inet(r7, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r5, 0x0) shutdown(r2, 0x0) 22:08:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x0, 0x44000122, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000000)=0x400000000002127, 0xfffffffffffffebe) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1143.357270] do_syscall_64+0xfd/0x620 [ 1143.357293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.357306] RIP: 0033:0x45c27a [ 1143.357321] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1143.357335] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 [ 1143.366330] ORIG_RAX: 00000000000000a5 [ 1143.366341] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1143.366351] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1143.366359] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1143.366367] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1143.366376] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x20000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f00000000c0)}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 22:08:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:49 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsi', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:49 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:49 executing program 2 (fault-call:2 fault-nth:51): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)=0x1) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, 0xffffffff, 0x100000000}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000001c0)={r4, @in6={{0xa, 0x4e21, 0xa17, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa249}}, 0x5, 0xfffffffffffff800}, &(0x7f0000000280)=0x90) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x4d, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x5, @mcast1, 0x2000000000000}, 0x1c) [ 1143.930426] FAULT_INJECTION: forcing a failure. [ 1143.930426] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.959535] CPU: 1 PID: 5273 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1143.966538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1143.975930] Call Trace: 22:08:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1143.976080] dump_stack+0x172/0x1f0 [ 1143.976105] should_fail.cold+0xa/0x1b [ 1143.986232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1143.986249] ? lock_downgrade+0x810/0x810 [ 1143.986275] __should_failslab+0x121/0x190 [ 1143.986294] should_failslab+0x9/0x14 [ 1143.986309] __kmalloc+0x2e2/0x750 [ 1143.986331] ? __list_lru_init+0xd5/0x720 [ 1143.986355] __list_lru_init+0xd5/0x720 [ 1143.995640] sget_userns+0x81b/0xd30 [ 1143.995658] ? kill_litter_super+0x60/0x60 [ 1143.995679] ? ns_test_super+0x50/0x50 [ 1143.995696] ? ns_test_super+0x50/0x50 [ 1143.995712] ? kill_litter_super+0x60/0x60 [ 1143.995726] sget+0x10c/0x150 [ 1143.995746] mount_bdev+0xff/0x3c0 [ 1144.003810] ? finish_unfinished+0x1120/0x1120 [ 1144.003831] get_super_block+0x35/0x40 [ 1144.003853] mount_fs+0xa8/0x31f [ 1144.003878] vfs_kern_mount.part.0+0x6f/0x410 [ 1144.003901] do_mount+0x53e/0x2bc0 [ 1144.003930] ? copy_mount_string+0x40/0x40 [ 1144.015626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.015646] ? copy_mount_options+0x280/0x3a0 [ 1144.015669] ksys_mount+0xdb/0x150 [ 1144.015691] __x64_sys_mount+0xbe/0x150 [ 1144.015713] do_syscall_64+0xfd/0x620 [ 1144.015735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.023804] RIP: 0033:0x45c27a [ 1144.023820] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1144.023829] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1144.023846] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a 22:08:50 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\"', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1144.023856] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1144.023866] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1144.023875] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1144.023885] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:50 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xa0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:50 executing program 3: 22:08:50 executing program 2 (fault-call:2 fault-nth:52): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:50 executing program 3: 22:08:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1144.509676] FAULT_INJECTION: forcing a failure. [ 1144.509676] name failslab, interval 1, probability 0, space 0, times 0 [ 1144.530236] CPU: 0 PID: 5298 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1144.537227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.546606] Call Trace: [ 1144.549230] dump_stack+0x172/0x1f0 [ 1144.552883] should_fail.cold+0xa/0x1b [ 1144.556797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1144.561950] ? lock_downgrade+0x810/0x810 [ 1144.566136] __should_failslab+0x121/0x190 [ 1144.570404] should_failslab+0x9/0x14 [ 1144.574226] __kmalloc+0x2e2/0x750 [ 1144.577791] ? __list_lru_init+0xd5/0x720 [ 1144.581975] __list_lru_init+0xd5/0x720 [ 1144.586068] sget_userns+0x81b/0xd30 [ 1144.589808] ? kill_litter_super+0x60/0x60 [ 1144.594085] ? ns_test_super+0x50/0x50 [ 1144.597996] ? ns_test_super+0x50/0x50 [ 1144.602079] ? kill_litter_super+0x60/0x60 [ 1144.606328] sget+0x10c/0x150 [ 1144.609456] mount_bdev+0xff/0x3c0 [ 1144.613011] ? finish_unfinished+0x1120/0x1120 [ 1144.617625] get_super_block+0x35/0x40 [ 1144.621542] mount_fs+0xa8/0x31f [ 1144.624936] vfs_kern_mount.part.0+0x6f/0x410 [ 1144.629645] do_mount+0x53e/0x2bc0 [ 1144.633218] ? copy_mount_string+0x40/0x40 [ 1144.637577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1144.643142] ? copy_mount_options+0x280/0x3a0 [ 1144.647667] ksys_mount+0xdb/0x150 [ 1144.651235] __x64_sys_mount+0xbe/0x150 [ 1144.655236] do_syscall_64+0xfd/0x620 [ 1144.659059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1144.664266] RIP: 0033:0x45c27a [ 1144.667477] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1144.686398] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1144.694228] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1144.701537] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:08:50 executing program 3: [ 1144.708834] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1144.716132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1144.723430] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0xfffffffffffffffe, @mcast1}, 0x1c) 22:08:50 executing program 3: 22:08:50 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs#', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:50 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:50 executing program 2 (fault-call:2 fault-nth:53): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:51 executing program 3: 22:08:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = dup(r0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000000)) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c009b000000000001a7715901d6d67ec47c3dc2dc2ab7c87665cc428b5d2607fc18aff07a6073cee296950dd839ad0c97989e707428c2c230f16456ab1885a8f46aab621a4f08"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1145.081689] FAULT_INJECTION: forcing a failure. [ 1145.081689] name failslab, interval 1, probability 0, space 0, times 0 [ 1145.093279] CPU: 1 PID: 5318 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1145.100243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.109619] Call Trace: [ 1145.112237] dump_stack+0x172/0x1f0 [ 1145.112267] should_fail.cold+0xa/0x1b [ 1145.119790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1145.124932] ? lock_downgrade+0x810/0x810 [ 1145.129118] __should_failslab+0x121/0x190 [ 1145.133379] should_failslab+0x9/0x14 [ 1145.137206] kmem_cache_alloc_trace+0x2cc/0x760 [ 1145.141897] ? kasan_unpoison_shadow+0x35/0x50 [ 1145.146499] ? kasan_kmalloc+0xce/0xf0 [ 1145.150418] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1145.155729] __list_lru_init+0x402/0x720 [ 1145.159834] sget_userns+0x81b/0xd30 [ 1145.163577] ? kill_litter_super+0x60/0x60 [ 1145.167839] ? ns_test_super+0x50/0x50 [ 1145.171747] ? ns_test_super+0x50/0x50 [ 1145.175667] ? kill_litter_super+0x60/0x60 [ 1145.179932] sget+0x10c/0x150 [ 1145.183069] mount_bdev+0xff/0x3c0 [ 1145.186627] ? finish_unfinished+0x1120/0x1120 [ 1145.191251] get_super_block+0x35/0x40 [ 1145.195174] mount_fs+0xa8/0x31f [ 1145.198591] vfs_kern_mount.part.0+0x6f/0x410 [ 1145.203142] do_mount+0x53e/0x2bc0 [ 1145.206715] ? copy_mount_string+0x40/0x40 [ 1145.210981] ? _copy_from_user+0xdd/0x150 [ 1145.215167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1145.220737] ? copy_mount_options+0x280/0x3a0 [ 1145.225267] ksys_mount+0xdb/0x150 [ 1145.228895] __x64_sys_mount+0xbe/0x150 [ 1145.232906] do_syscall_64+0xfd/0x620 [ 1145.236738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1145.241959] RIP: 0033:0x45c27a [ 1145.245177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1145.264287] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1145.272038] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a 22:08:51 executing program 3: [ 1145.279335] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1145.286630] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1145.293927] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1145.301220] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:51 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffdea) socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], 0x1}, 0x10000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000740)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80000001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}], 0x68}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x7ffe, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') gettid() mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) 22:08:51 executing program 2 (fault-call:2 fault-nth:54): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1145.392789] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1145.455220] libceph: mon1 [::1]:6789 socket error on write 22:08:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1145.516228] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1145.617772] FAULT_INJECTION: forcing a failure. [ 1145.617772] name failslab, interval 1, probability 0, space 0, times 0 [ 1145.643678] CPU: 1 PID: 5344 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1145.650650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1145.650658] Call Trace: [ 1145.650688] dump_stack+0x172/0x1f0 [ 1145.650712] should_fail.cold+0xa/0x1b [ 1145.666314] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1145.666335] ? lock_downgrade+0x810/0x810 [ 1145.679505] __should_failslab+0x121/0x190 [ 1145.683773] should_failslab+0x9/0x14 [ 1145.687629] kmem_cache_alloc_trace+0x2cc/0x760 [ 1145.692316] ? kasan_unpoison_shadow+0x35/0x50 [ 1145.696923] ? kasan_kmalloc+0xce/0xf0 [ 1145.700843] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1145.705812] __list_lru_init+0x402/0x720 [ 1145.709907] sget_userns+0x81b/0xd30 [ 1145.713648] ? kill_litter_super+0x60/0x60 [ 1145.717916] ? ns_test_super+0x50/0x50 [ 1145.721923] ? ns_test_super+0x50/0x50 [ 1145.725829] ? kill_litter_super+0x60/0x60 [ 1145.730090] sget+0x10c/0x150 [ 1145.733217] mount_bdev+0xff/0x3c0 [ 1145.736771] ? finish_unfinished+0x1120/0x1120 [ 1145.741375] get_super_block+0x35/0x40 [ 1145.745300] mount_fs+0xa8/0x31f [ 1145.748703] vfs_kern_mount.part.0+0x6f/0x410 [ 1145.753239] do_mount+0x53e/0x2bc0 [ 1145.756808] ? copy_mount_string+0x40/0x40 [ 1145.761068] ? _copy_from_user+0xdd/0x150 [ 1145.765242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1145.770816] ? copy_mount_options+0x280/0x3a0 [ 1145.775349] ksys_mount+0xdb/0x150 [ 1145.778917] __x64_sys_mount+0xbe/0x150 [ 1145.782924] do_syscall_64+0xfd/0x620 [ 1145.786753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1145.791969] RIP: 0033:0x45c27a [ 1145.795190] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 22:08:51 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsq', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1145.814378] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1145.822123] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1145.834716] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1145.842012] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1145.849309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1145.856613] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:51 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs,', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1145.940450] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:52 executing program 2 (fault-call:2 fault-nth:55): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1146.049675] ntfs: (device loop4): parse_options(): NLS character set [ 1146.049675] p852 not found. Using previous one utf8. [ 1146.061694] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:52 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsv', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1146.152503] FAULT_INJECTION: forcing a failure. [ 1146.152503] name failslab, interval 1, probability 0, space 0, times 0 [ 1146.172457] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1146.188507] CPU: 1 PID: 5361 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1146.199163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1146.208544] Call Trace: [ 1146.208577] dump_stack+0x172/0x1f0 [ 1146.208594] should_fail.cold+0xa/0x1b [ 1146.208611] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1146.208631] ? lock_downgrade+0x810/0x810 [ 1146.214877] __should_failslab+0x121/0x190 [ 1146.214896] should_failslab+0x9/0x14 [ 1146.214914] kmem_cache_alloc_trace+0x2cc/0x760 [ 1146.223917] ? kasan_unpoison_shadow+0x35/0x50 [ 1146.223933] ? kasan_kmalloc+0xce/0xf0 [ 1146.223956] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1146.223976] __list_lru_init+0x402/0x720 [ 1146.224002] sget_userns+0x81b/0xd30 [ 1146.232411] ? kill_litter_super+0x60/0x60 [ 1146.232430] ? ns_test_super+0x50/0x50 [ 1146.232443] ? ns_test_super+0x50/0x50 [ 1146.232463] ? kill_litter_super+0x60/0x60 [ 1146.232477] sget+0x10c/0x150 [ 1146.232497] mount_bdev+0xff/0x3c0 [ 1146.232508] ? finish_unfinished+0x1120/0x1120 [ 1146.232526] get_super_block+0x35/0x40 [ 1146.232543] mount_fs+0xa8/0x31f [ 1146.232564] vfs_kern_mount.part.0+0x6f/0x410 22:08:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1146.232586] do_mount+0x53e/0x2bc0 [ 1146.232608] ? copy_mount_string+0x40/0x40 [ 1146.232631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1146.232647] ? copy_mount_options+0x280/0x3a0 [ 1146.232667] ksys_mount+0xdb/0x150 [ 1146.232686] __x64_sys_mount+0xbe/0x150 [ 1146.232706] do_syscall_64+0xfd/0x620 [ 1146.232730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1146.246592] ntfs: (device loop4): parse_options(): NLS character set [ 1146.246592] p852 not found. Using previous one utf8. [ 1146.249699] RIP: 0033:0x45c27a [ 1146.249715] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1146.249722] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1146.249736] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1146.249750] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1146.255909] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1146.258766] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1146.258774] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1146.258781] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x4b564d03]}) 22:08:52 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:52 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ipv6_route\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e24, 0x3f, @remote, 0xfffffffffffffffb}, {0xa, 0x4e23, 0x0, @empty, 0x14}, 0x2, [0x1, 0x6, 0x1, 0x9, 0x0, 0x1, 0x3, 0x3]}, 0x5c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0cfa4dc6436aacae8757fff529711900000010100000"], 0x8) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'teql0\x00', {0x2, 0x4e22, @loopback}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fallocate(r2, 0x30, 0xfffffffffffffffe, 0x135) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r3 = getpgid(0xffffffffffffffff) tkill(r3, 0x2c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0xfffffffffffffffe, @empty, 0x4ffc}, 0x1c) 22:08:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00\x00\x00\x00\x00\xdb\x88yt\xa9\xd4\xb8\x04\x9e f\x06\xa8\b\xfc\xfe=\xd3\x12\x91\xf7\x86\xce\xe9*.\xd9\xcc\x0e\xeb\x0fn\x1b!p\x05W\xd7\xd3!\xc6\x16\xf2\xa6\x9f\x97^]X\ah1\x03\xcfHQo\xd9`c`1\x93\xe1\xcc1\t\xac\x8e\xeb4\x89\xd6\xa5\xd8n\xeao\xc6j\xdcl\x927\x8dI', 0x200002, 0x0) fchdir(r1) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) 22:08:52 executing program 2 (fault-call:2 fault-nth:56): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:52 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1146.727767] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 22:08:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) [ 1146.813818] ntfs: (device loop4): parse_options(): NLS character set [ 1146.813818] p852 not found. Using previous one utf8. [ 1146.826345] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:08:52 executing program 3: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="12ce0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340), 0xfffffffffffffe17}], 0x3, 0x0, 0x20e}}], 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01007300d8000000490927030000000000020000000002004b01fa3bd04551469b0e40c53cb64b66a8439bd175f8f608c9522b08c53d350f52b5122308fbc3b475befd1b75dcb16d42dde1ec"], 0x0, 0x4e}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1146.899765] FAULT_INJECTION: forcing a failure. [ 1146.899765] name failslab, interval 1, probability 0, space 0, times 0 22:08:52 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1146.932384] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1146.961083] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1146.981998] CPU: 0 PID: 5396 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1146.989006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:08:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) unlink(&(0x7f0000000400)='./file0\x00') [ 1146.998416] Call Trace: [ 1147.001048] dump_stack+0x172/0x1f0 [ 1147.002128] ptrace attach of "/root/syz-executor.3"[5410] was attempted by "/root/syz-executor.3"[5412] [ 1147.004732] should_fail.cold+0xa/0x1b [ 1147.004755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1147.004772] ? lock_downgrade+0x810/0x810 [ 1147.004803] __should_failslab+0x121/0x190 [ 1147.004827] should_failslab+0x9/0x14 [ 1147.035528] kmem_cache_alloc_trace+0x2cc/0x760 [ 1147.040194] ? kasan_unpoison_shadow+0x35/0x50 [ 1147.044793] ? kasan_kmalloc+0xce/0xf0 [ 1147.048717] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1147.053660] __list_lru_init+0x402/0x720 [ 1147.057742] sget_userns+0x81b/0xd30 [ 1147.061652] ? kill_litter_super+0x60/0x60 [ 1147.065935] ? ns_test_super+0x50/0x50 [ 1147.070035] ? ns_test_super+0x50/0x50 [ 1147.073943] ? kill_litter_super+0x60/0x60 [ 1147.073968] sget+0x10c/0x150 [ 1147.073991] mount_bdev+0xff/0x3c0 [ 1147.074006] ? finish_unfinished+0x1120/0x1120 [ 1147.074026] get_super_block+0x35/0x40 [ 1147.074045] mount_fs+0xa8/0x31f [ 1147.074079] vfs_kern_mount.part.0+0x6f/0x410 [ 1147.089556] do_mount+0x53e/0x2bc0 [ 1147.089574] ? retint_kernel+0x2d/0x2d [ 1147.089597] ? copy_mount_string+0x40/0x40 [ 1147.089616] ? copy_mount_options+0x198/0x3a0 [ 1147.089640] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 1147.122421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1147.127995] ? copy_mount_options+0x280/0x3a0 [ 1147.132532] ksys_mount+0xdb/0x150 [ 1147.136112] __x64_sys_mount+0xbe/0x150 [ 1147.140116] do_syscall_64+0xfd/0x620 [ 1147.143970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1147.149216] RIP: 0033:0x45c27a [ 1147.152424] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1147.171360] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1147.179102] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1147.186413] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1147.193720] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 22:08:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x913c9a33bbe3c82b) pipe(&(0x7f00000001c0)) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000240)={0x7, 0x1, 0xfffffffffffffffb, 0x80, 0x7, "06e02031d3a65a761b6c3b94c375496a079718", 0x4, 0xfffffffffffffffe}) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f00000000c0)=""/251) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0xa, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1147.201025] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1147.208608] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) link(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000100)="ea0a7a2100b812018ed80f060fc7ab000066b9d50a000066b8a41d000066ba000000000f30670f35baf80c66b848a5e18f66efbafc0c66b80300000066ef66b80500000066b9008000000f01c1f30fc7b70000f30f1f4000", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:08:53 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:53 executing program 2 (fault-call:2 fault-nth:57): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:53 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs`', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:tmpreaper_exec_t:s0\x00', 0x26) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1147.560290] FAULT_INJECTION: forcing a failure. [ 1147.560290] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.590632] CPU: 1 PID: 5435 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1147.597636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1147.607020] Call Trace: [ 1147.609646] dump_stack+0x172/0x1f0 [ 1147.613313] should_fail.cold+0xa/0x1b [ 1147.617249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1147.622397] ? lock_downgrade+0x810/0x810 [ 1147.622421] __should_failslab+0x121/0x190 [ 1147.622438] should_failslab+0x9/0x14 [ 1147.622451] kmem_cache_alloc_trace+0x2cc/0x760 [ 1147.622474] ? kasan_unpoison_shadow+0x35/0x50 [ 1147.622493] ? kasan_kmalloc+0xce/0xf0 [ 1147.644084] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1147.644108] __list_lru_init+0x402/0x720 [ 1147.644131] sget_userns+0x81b/0xd30 [ 1147.644146] ? kill_litter_super+0x60/0x60 [ 1147.644166] ? ns_test_super+0x50/0x50 [ 1147.644183] ? ns_test_super+0x50/0x50 [ 1147.644202] ? kill_litter_super+0x60/0x60 [ 1147.653050] sget+0x10c/0x150 [ 1147.653069] mount_bdev+0xff/0x3c0 [ 1147.653082] ? finish_unfinished+0x1120/0x1120 [ 1147.653101] get_super_block+0x35/0x40 [ 1147.653120] mount_fs+0xa8/0x31f [ 1147.653143] vfs_kern_mount.part.0+0x6f/0x410 [ 1147.653166] do_mount+0x53e/0x2bc0 [ 1147.653201] ? copy_mount_string+0x40/0x40 [ 1147.660997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1147.661013] ? copy_mount_options+0x280/0x3a0 [ 1147.661034] ksys_mount+0xdb/0x150 [ 1147.673076] __x64_sys_mount+0xbe/0x150 [ 1147.680430] do_syscall_64+0xfd/0x620 [ 1147.680448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1147.680466] RIP: 0033:0x45c27a [ 1147.680483] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1147.680497] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 [ 1147.688659] ORIG_RAX: 00000000000000a5 [ 1147.688669] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1147.688677] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1147.688684] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1147.688691] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1147.688698] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1147.691882] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:08:53 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xcd, &(0x7f0000000000), 0x3c) 22:08:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:54 executing program 2 (fault-call:2 fault-nth:58): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:54 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xcd, &(0x7f0000000000), 0x3c) 22:08:54 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1148.136090] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:08:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1148.276821] FAULT_INJECTION: forcing a failure. [ 1148.276821] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.291765] CPU: 0 PID: 5464 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1148.298742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.308120] Call Trace: [ 1148.308152] dump_stack+0x172/0x1f0 [ 1148.308175] should_fail.cold+0xa/0x1b [ 1148.308206] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1148.323404] ? lock_downgrade+0x810/0x810 [ 1148.327584] __should_failslab+0x121/0x190 [ 1148.331865] should_failslab+0x9/0x14 [ 1148.335680] kmem_cache_alloc_trace+0x2cc/0x760 [ 1148.340372] ? kasan_unpoison_shadow+0x35/0x50 [ 1148.344985] ? kasan_kmalloc+0xce/0xf0 [ 1148.348902] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1148.353864] __list_lru_init+0x402/0x720 [ 1148.357971] sget_userns+0x81b/0xd30 [ 1148.361718] ? kill_litter_super+0x60/0x60 [ 1148.365992] ? ns_test_super+0x50/0x50 [ 1148.369903] ? ns_test_super+0x50/0x50 22:08:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) link(0x0, &(0x7f0000000280)='./file0\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) getsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000000), 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@initdev, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, r0, 0x0, 0x40fdf) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRES16], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x4040015) [ 1148.373832] ? kill_litter_super+0x60/0x60 [ 1148.378099] sget+0x10c/0x150 [ 1148.381249] mount_bdev+0xff/0x3c0 [ 1148.384810] ? finish_unfinished+0x1120/0x1120 [ 1148.389416] get_super_block+0x35/0x40 [ 1148.393330] mount_fs+0xa8/0x31f [ 1148.396723] vfs_kern_mount.part.0+0x6f/0x410 [ 1148.401259] do_mount+0x53e/0x2bc0 [ 1148.404837] ? copy_mount_string+0x40/0x40 [ 1148.409103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.414669] ? copy_mount_options+0x280/0x3a0 [ 1148.419195] ksys_mount+0xdb/0x150 [ 1148.422764] __x64_sys_mount+0xbe/0x150 [ 1148.426784] do_syscall_64+0xfd/0x620 [ 1148.430620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.435836] RIP: 0033:0x45c27a [ 1148.439061] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1148.458000] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.465749] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1148.473056] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1148.480351] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1148.487661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1148.494974] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:54 executing program 2 (fault-call:2 fault-nth:59): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:54 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @local, 0x200}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100004"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xfffffffffffffffb, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f00000001c0)={0x8, 0x4, 0x0, 'queue1\x00', 0x3}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:54 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsj', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x10000006, 0xfffbffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000100), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0x9, &(0x7f00000003c0)='/dev/ion\x00', 0xffffffffffffffff}, 0x30) ioprio_set$pid(0x1, r4, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x63, 0x7d, 0x1, {{0x0, 0x45, 0x0, 0x3, {0x2, 0x0, 0x2}, 0x0, 0x1, 0x4c, 0x7f, 0x0, '', 0x9, '/dev/ion\x00', 0x0, '', 0x9, '/dev/ion\x00'}, 0x9, '/dev/ion\x00', r2, r3}}, 0x63) mlockall(0x7) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000480)={0x1, &(0x7f0000000440)=[{}]}) syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000040}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x14, 0x0, 0x8, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 1149.013739] FAULT_INJECTION: forcing a failure. [ 1149.013739] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.031549] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1149.048456] CPU: 0 PID: 5490 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1149.055460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.064850] Call Trace: [ 1149.067480] dump_stack+0x172/0x1f0 [ 1149.071182] should_fail.cold+0xa/0x1b [ 1149.075124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.080283] ? lock_downgrade+0x810/0x810 [ 1149.084494] __should_failslab+0x121/0x190 [ 1149.088758] should_failslab+0x9/0x14 [ 1149.092586] kmem_cache_alloc_trace+0x2cc/0x760 [ 1149.097288] ? kasan_unpoison_shadow+0x35/0x50 [ 1149.101905] ? kasan_kmalloc+0xce/0xf0 [ 1149.105838] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1149.110803] __list_lru_init+0x402/0x720 [ 1149.114901] sget_userns+0x81b/0xd30 [ 1149.118641] ? kill_litter_super+0x60/0x60 [ 1149.122902] ? ns_test_super+0x50/0x50 [ 1149.124174] QAT: Invalid ioctl [ 1149.126816] ? ns_test_super+0x50/0x50 [ 1149.126833] ? kill_litter_super+0x60/0x60 [ 1149.126849] sget+0x10c/0x150 [ 1149.126872] mount_bdev+0xff/0x3c0 [ 1149.126887] ? finish_unfinished+0x1120/0x1120 [ 1149.126919] get_super_block+0x35/0x40 [ 1149.126942] mount_fs+0xa8/0x31f [ 1149.156846] vfs_kern_mount.part.0+0x6f/0x410 [ 1149.161373] do_mount+0x53e/0x2bc0 [ 1149.164970] ? copy_mount_string+0x40/0x40 [ 1149.169244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.174812] ? copy_mount_options+0x280/0x3a0 [ 1149.179338] ksys_mount+0xdb/0x150 [ 1149.182898] __x64_sys_mount+0xbe/0x150 [ 1149.186919] do_syscall_64+0xfd/0x620 [ 1149.190755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.195974] RIP: 0033:0x45c27a [ 1149.199194] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1149.218119] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1149.225870] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1149.233168] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1149.240462] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1149.247846] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1149.255147] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:55 executing program 2 (fault-call:2 fault-nth:60): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1149.426877] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:08:55 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:55 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:55 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1149.758951] FAULT_INJECTION: forcing a failure. [ 1149.758951] name failslab, interval 1, probability 0, space 0, times 0 [ 1149.808620] CPU: 0 PID: 5519 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1149.815607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1149.815615] Call Trace: [ 1149.815646] dump_stack+0x172/0x1f0 [ 1149.815677] should_fail.cold+0xa/0x1b [ 1149.835193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1149.840323] ? lock_downgrade+0x810/0x810 [ 1149.844505] __should_failslab+0x121/0x190 [ 1149.848777] should_failslab+0x9/0x14 [ 1149.852607] kmem_cache_alloc_node_trace+0x274/0x720 [ 1149.857768] ? kmem_cache_alloc_trace+0x348/0x760 [ 1149.862649] ? kasan_unpoison_shadow+0x35/0x50 [ 1149.867284] __kmalloc_node+0x3d/0x80 [ 1149.871112] kvmalloc_node+0x68/0x100 [ 1149.874959] __list_lru_init+0x4d9/0x720 [ 1149.879088] sget_userns+0x81b/0xd30 [ 1149.882829] ? kill_litter_super+0x60/0x60 [ 1149.887100] ? ns_test_super+0x50/0x50 [ 1149.891034] ? ns_test_super+0x50/0x50 [ 1149.894964] ? kill_litter_super+0x60/0x60 [ 1149.899235] sget+0x10c/0x150 [ 1149.899256] mount_bdev+0xff/0x3c0 [ 1149.899268] ? finish_unfinished+0x1120/0x1120 [ 1149.899285] get_super_block+0x35/0x40 [ 1149.899302] mount_fs+0xa8/0x31f [ 1149.899324] vfs_kern_mount.part.0+0x6f/0x410 [ 1149.899345] do_mount+0x53e/0x2bc0 [ 1149.899367] ? copy_mount_string+0x40/0x40 [ 1149.931058] ? _copy_from_user+0xdd/0x150 [ 1149.931078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1149.931094] ? copy_mount_options+0x280/0x3a0 [ 1149.931116] ksys_mount+0xdb/0x150 [ 1149.931148] __x64_sys_mount+0xbe/0x150 [ 1149.931168] do_syscall_64+0xfd/0x620 [ 1149.931187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1149.931199] RIP: 0033:0x45c27a [ 1149.931217] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1149.940928] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1149.940944] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1149.940958] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:08:56 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1149.940966] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1149.940974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1149.940982] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1149.941603] QAT: Invalid ioctl [ 1150.041563] QAT: Invalid ioctl 22:08:56 executing program 2 (fault-call:2 fault-nth:61): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x10000006, 0xfffbffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000100), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r1, 0x0, 0x9, &(0x7f00000003c0)='/dev/ion\x00', 0xffffffffffffffff}, 0x30) ioprio_set$pid(0x1, r4, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x63, 0x7d, 0x1, {{0x0, 0x45, 0x0, 0x3, {0x2, 0x0, 0x2}, 0x0, 0x1, 0x4c, 0x7f, 0x0, '', 0x9, '/dev/ion\x00', 0x0, '', 0x9, '/dev/ion\x00'}, 0x9, '/dev/ion\x00', r2, r3}}, 0x63) mlockall(0x7) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000480)={0x1, &(0x7f0000000440)=[{}]}) syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000040}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x14, 0x0, 0x8, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 1150.161019] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1150.270370] FAULT_INJECTION: forcing a failure. [ 1150.270370] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.282300] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1150.301622] CPU: 0 PID: 5543 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1150.308625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.318038] Call Trace: [ 1150.320662] dump_stack+0x172/0x1f0 [ 1150.324331] should_fail.cold+0xa/0x1b [ 1150.328252] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.333383] ? lock_downgrade+0x810/0x810 [ 1150.337569] __should_failslab+0x121/0x190 [ 1150.341834] should_failslab+0x9/0x14 [ 1150.345664] kmem_cache_alloc_trace+0x2cc/0x760 [ 1150.350386] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1150.355395] __list_lru_init+0x402/0x720 [ 1150.359503] sget_userns+0x81b/0xd30 [ 1150.363251] ? kill_litter_super+0x60/0x60 [ 1150.367524] ? ns_test_super+0x50/0x50 [ 1150.371442] ? ns_test_super+0x50/0x50 [ 1150.375362] ? kill_litter_super+0x60/0x60 [ 1150.379623] sget+0x10c/0x150 [ 1150.382773] mount_bdev+0xff/0x3c0 [ 1150.386345] ? finish_unfinished+0x1120/0x1120 [ 1150.390965] get_super_block+0x35/0x40 [ 1150.394885] mount_fs+0xa8/0x31f [ 1150.398284] vfs_kern_mount.part.0+0x6f/0x410 [ 1150.402920] do_mount+0x53e/0x2bc0 [ 1150.406511] ? copy_mount_string+0x40/0x40 [ 1150.410787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1150.416360] ? copy_mount_options+0x280/0x3a0 [ 1150.420894] ksys_mount+0xdb/0x150 [ 1150.424471] __x64_sys_mount+0xbe/0x150 [ 1150.428481] do_syscall_64+0xfd/0x620 [ 1150.432317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.437622] RIP: 0033:0x45c27a [ 1150.440838] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1150.459767] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1150.467502] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1150.474804] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1150.482102] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1150.489414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1150.496712] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1150.512837] QAT: Invalid ioctl 22:08:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x204200) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0e0004000005000200faffffffffffffffae529f36"], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:56 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:56 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x01', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:56 executing program 2 (fault-call:2 fault-nth:62): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1150.820891] FAULT_INJECTION: forcing a failure. [ 1150.820891] name failslab, interval 1, probability 0, space 0, times 0 [ 1150.857726] CPU: 1 PID: 5565 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1150.864720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.874115] Call Trace: [ 1150.876745] dump_stack+0x172/0x1f0 [ 1150.880422] should_fail.cold+0xa/0x1b [ 1150.884379] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1150.889535] ? lock_downgrade+0x810/0x810 [ 1150.893818] __should_failslab+0x121/0x190 [ 1150.898112] should_failslab+0x9/0x14 [ 1150.902226] kmem_cache_alloc_trace+0x2cc/0x760 [ 1150.906931] ? kasan_unpoison_shadow+0x35/0x50 [ 1150.911546] ? kasan_kmalloc+0xce/0xf0 [ 1150.915484] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1150.920470] __list_lru_init+0x402/0x720 [ 1150.924577] sget_userns+0x81b/0xd30 [ 1150.928324] ? kill_litter_super+0x60/0x60 [ 1150.932596] ? ns_test_super+0x50/0x50 [ 1150.936516] ? ns_test_super+0x50/0x50 [ 1150.940429] ? kill_litter_super+0x60/0x60 [ 1150.944702] sget+0x10c/0x150 [ 1150.947847] mount_bdev+0xff/0x3c0 [ 1150.951411] ? finish_unfinished+0x1120/0x1120 [ 1150.956026] get_super_block+0x35/0x40 [ 1150.959942] mount_fs+0xa8/0x31f [ 1150.963340] vfs_kern_mount.part.0+0x6f/0x410 [ 1150.967871] do_mount+0x53e/0x2bc0 [ 1150.971442] ? retint_kernel+0x2d/0x2d [ 1150.975368] ? copy_mount_string+0x40/0x40 [ 1150.979638] ? copy_mount_options+0x1ea/0x3a0 [ 1150.984165] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1150.989044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1150.994627] ? copy_mount_options+0x280/0x3a0 [ 1150.999269] ksys_mount+0xdb/0x150 [ 1151.002846] __x64_sys_mount+0xbe/0x150 [ 1151.006881] do_syscall_64+0xfd/0x620 [ 1151.010718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.015942] RIP: 0033:0x45c27a [ 1151.019156] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1151.038112] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1151.045859] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1151.053160] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1151.060460] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1151.067758] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1151.075050] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1151.245939] __ntfs_warning: 29 callbacks suppressed [ 1151.245965] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1151.292950] QAT: Invalid ioctl 22:08:57 executing program 2 (fault-call:2 fault-nth:63): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:57 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xe0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:57 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1151.314556] ntfs: (device loop4): parse_options(): NLS character set [ 1151.314556] p852 not found. Using previous one utf8. [ 1151.333734] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1151.434046] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1151.454146] ntfs: (device loop4): parse_options(): NLS character set [ 1151.454146] p852 not found. Using previous one utf8. [ 1151.466817] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1151.488697] FAULT_INJECTION: forcing a failure. [ 1151.488697] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.519040] CPU: 0 PID: 5575 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1151.526038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1151.535412] Call Trace: 22:08:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x5f0, 0x144000106, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x502f59d8773e9ce8, &(0x7f00000001c0)=ANY=[], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f00000000c0)=0xc) sendto$inet6(r0, 0x0, 0x0, 0x80, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:57 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1005, 0x0) read(r0, &(0x7f0000000080)=""/144, 0x90) ioctl$int_in(r0, 0x2800000c0045009, &(0x7f00000001c0)=0x80000) ioctl$int_in(r0, 0x800060c004500a, &(0x7f0000000000)) [ 1151.538043] dump_stack+0x172/0x1f0 [ 1151.541702] should_fail.cold+0xa/0x1b [ 1151.545624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1151.550797] ? lock_downgrade+0x810/0x810 [ 1151.554998] __should_failslab+0x121/0x190 [ 1151.559262] should_failslab+0x9/0x14 [ 1151.563106] kmem_cache_alloc_trace+0x2cc/0x760 [ 1151.567805] ? kasan_unpoison_shadow+0x35/0x50 [ 1151.572417] ? kasan_kmalloc+0xce/0xf0 [ 1151.576335] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1151.581300] __list_lru_init+0x402/0x720 [ 1151.585403] sget_userns+0x81b/0xd30 [ 1151.589181] ? kill_litter_super+0x60/0x60 [ 1151.593438] ? ns_test_super+0x50/0x50 [ 1151.597344] ? ns_test_super+0x50/0x50 [ 1151.601244] ? kill_litter_super+0x60/0x60 [ 1151.605491] sget+0x10c/0x150 [ 1151.608612] mount_bdev+0xff/0x3c0 [ 1151.612159] ? finish_unfinished+0x1120/0x1120 [ 1151.616760] get_super_block+0x35/0x40 [ 1151.620669] mount_fs+0xa8/0x31f [ 1151.624061] vfs_kern_mount.part.0+0x6f/0x410 [ 1151.628596] do_mount+0x53e/0x2bc0 [ 1151.632155] ? retint_kernel+0x2d/0x2d [ 1151.636083] ? copy_mount_string+0x40/0x40 [ 1151.640334] ? copy_mount_options+0x208/0x3a0 [ 1151.644849] ? write_comp_data+0x10/0x70 [ 1151.648965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1151.654520] ? copy_mount_options+0x280/0x3a0 [ 1151.659029] ksys_mount+0xdb/0x150 [ 1151.662583] __x64_sys_mount+0xbe/0x150 [ 1151.666573] do_syscall_64+0xfd/0x620 [ 1151.670395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1151.675598] RIP: 0033:0x45c27a [ 1151.678800] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1151.697743] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1151.705488] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1151.712787] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1151.720078] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1151.727377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1151.734669] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:57 executing program 2 (fault-call:2 fault-nth:64): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000000)=0x1) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x1e) 22:08:58 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xf4', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:58 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x0e', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1152.001420] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1152.044484] FAULT_INJECTION: forcing a failure. [ 1152.044484] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.074628] CPU: 1 PID: 5604 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1152.077635] ntfs: (device loop4): parse_options(): NLS character set [ 1152.077635] p852 not found. Using previous one utf8. [ 1152.081622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.081630] Call Trace: [ 1152.081663] dump_stack+0x172/0x1f0 [ 1152.081691] should_fail.cold+0xa/0x1b [ 1152.081718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.096994] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1152.102689] ? lock_downgrade+0x810/0x810 [ 1152.102715] __should_failslab+0x121/0x190 [ 1152.102732] should_failslab+0x9/0x14 [ 1152.102745] kmem_cache_alloc_trace+0x2cc/0x760 [ 1152.102771] ? kasan_unpoison_shadow+0x35/0x50 [ 1152.102796] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1152.151828] __list_lru_init+0x402/0x720 [ 1152.155975] sget_userns+0x81b/0xd30 [ 1152.159722] ? kill_litter_super+0x60/0x60 [ 1152.163997] ? ns_test_super+0x50/0x50 [ 1152.167920] ? ns_test_super+0x50/0x50 [ 1152.171831] ? kill_litter_super+0x60/0x60 [ 1152.176098] sget+0x10c/0x150 [ 1152.179230] mount_bdev+0xff/0x3c0 [ 1152.182791] ? finish_unfinished+0x1120/0x1120 [ 1152.187405] get_super_block+0x35/0x40 [ 1152.191330] mount_fs+0xa8/0x31f [ 1152.194735] vfs_kern_mount.part.0+0x6f/0x410 [ 1152.199266] do_mount+0x53e/0x2bc0 [ 1152.202840] ? copy_mount_string+0x40/0x40 [ 1152.207105] ? _copy_from_user+0xdd/0x150 [ 1152.211291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1152.216857] ? copy_mount_options+0x280/0x3a0 [ 1152.221393] ksys_mount+0xdb/0x150 [ 1152.224958] __x64_sys_mount+0xbe/0x150 [ 1152.228966] do_syscall_64+0xfd/0x620 [ 1152.232805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.238011] RIP: 0033:0x45c27a [ 1152.241231] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1152.260157] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1152.267895] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1152.275206] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1152.282504] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1152.289798] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1152.297097] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8001004e20, 0x0, @ipv4={[], [], @loopback}}, 0xffffffea) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x22000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:58 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioprio_set$pid(0x2, 0x0, 0x0) read(r0, 0x0, 0x0) 22:08:58 executing program 2 (fault-call:2 fault-nth:65): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:58 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1152.603059] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1152.646306] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:08:58 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xf6', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1152.769859] FAULT_INJECTION: forcing a failure. [ 1152.769859] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.799328] CPU: 1 PID: 5638 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1152.806413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1152.816882] Call Trace: [ 1152.816919] dump_stack+0x172/0x1f0 [ 1152.816941] should_fail.cold+0xa/0x1b [ 1152.816966] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1152.816983] ? lock_downgrade+0x810/0x810 [ 1152.817015] __should_failslab+0x121/0x190 [ 1152.817033] should_failslab+0x9/0x14 [ 1152.817049] kmem_cache_alloc_trace+0x2cc/0x760 [ 1152.817064] ? kasan_unpoison_shadow+0x35/0x50 [ 1152.817098] ? kasan_kmalloc+0xce/0xf0 [ 1152.823335] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1152.823360] __list_lru_init+0x402/0x720 [ 1152.823385] sget_userns+0x81b/0xd30 [ 1152.823401] ? kill_litter_super+0x60/0x60 [ 1152.823420] ? ns_test_super+0x50/0x50 [ 1152.823439] ? ns_test_super+0x50/0x50 [ 1152.831613] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1152.832448] ? kill_litter_super+0x60/0x60 [ 1152.832474] sget+0x10c/0x150 [ 1152.832496] mount_bdev+0xff/0x3c0 [ 1152.862741] ? finish_unfinished+0x1120/0x1120 [ 1152.862765] get_super_block+0x35/0x40 [ 1152.862788] mount_fs+0xa8/0x31f [ 1152.862812] vfs_kern_mount.part.0+0x6f/0x410 22:08:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29010000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1152.862835] do_mount+0x53e/0x2bc0 [ 1152.862865] ? copy_mount_string+0x40/0x40 [ 1152.870711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1152.870730] ? copy_mount_options+0x280/0x3a0 [ 1152.870751] ksys_mount+0xdb/0x150 [ 1152.870770] __x64_sys_mount+0xbe/0x150 [ 1152.870790] do_syscall_64+0xfd/0x620 [ 1152.870811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1152.870824] RIP: 0033:0x45c27a [ 1152.870840] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1152.870849] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1152.870865] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1152.870875] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1152.870884] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1152.870892] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1152.870906] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:59 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000008060500ff0080fffdffff2e0a0000000c000100060000007d0a0d010c00edb99ff40d6c8479c787"], 0x2c}}, 0x0) 22:08:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000000)='./file0\x00', 0x1558c0, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:08:59 executing program 2 (fault-call:2 fault-nth:66): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:59 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x16', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1153.458427] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1153.481470] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1153.502841] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:08:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:08:59 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000080)=0x80) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000200)=0x20, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000032c0)) stat(0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000000)=""/22, &(0x7f0000000140)=0x16) getegid() getegid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)={'#! ', './file0', [], 0xa, "dd1f49ff5f58b583ceb5c1b11d2844e8d72467b27bb4b8f65f0c4d606ab0256e8d3b710ac43e2663f1906eb5ba8ce67a78509bd5f27da6cac6766faf9b49fa04853c3f269c7441c627132de4f8f35d438de9f0110144bdc3e2af51df3e1c62651fb0cac1ff485af19ef7db6b07"}, 0x78) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00\x00\x00\x06'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 1153.591560] FAULT_INJECTION: forcing a failure. [ 1153.591560] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.628371] CPU: 0 PID: 5669 Comm: syz-executor.2 Not tainted 4.19.66 #40 22:08:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @rand_addr, 0xfffffffffffffffc}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000100c489da1523087fb5ff91ffd62e040000001ac6"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1153.635366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1153.635374] Call Trace: [ 1153.635406] dump_stack+0x172/0x1f0 [ 1153.635430] should_fail.cold+0xa/0x1b [ 1153.635455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1153.660080] ? lock_downgrade+0x810/0x810 [ 1153.664285] __should_failslab+0x121/0x190 [ 1153.668561] should_failslab+0x9/0x14 [ 1153.672386] kmem_cache_alloc_trace+0x2cc/0x760 [ 1153.677089] ? kasan_unpoison_shadow+0x35/0x50 [ 1153.677108] ? kasan_kmalloc+0xce/0xf0 [ 1153.677134] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1153.677156] __list_lru_init+0x402/0x720 [ 1153.677178] sget_userns+0x81b/0xd30 [ 1153.698367] ? kill_litter_super+0x60/0x60 [ 1153.702637] ? ns_test_super+0x50/0x50 [ 1153.706546] ? ns_test_super+0x50/0x50 [ 1153.710444] ? kill_litter_super+0x60/0x60 [ 1153.714700] sget+0x10c/0x150 [ 1153.717823] mount_bdev+0xff/0x3c0 [ 1153.721633] ? finish_unfinished+0x1120/0x1120 [ 1153.726242] get_super_block+0x35/0x40 [ 1153.730156] mount_fs+0xa8/0x31f [ 1153.733551] vfs_kern_mount.part.0+0x6f/0x410 [ 1153.738087] do_mount+0x53e/0x2bc0 [ 1153.741670] ? copy_mount_string+0x40/0x40 [ 1153.745943] ? _copy_from_user+0xdd/0x150 [ 1153.750132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1153.755704] ? copy_mount_options+0x280/0x3a0 [ 1153.760254] ksys_mount+0xdb/0x150 [ 1153.763849] __x64_sys_mount+0xbe/0x150 [ 1153.767869] do_syscall_64+0xfd/0x620 [ 1153.771707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1153.776923] RIP: 0033:0x45c27a [ 1153.780144] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1153.799070] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1153.806813] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1153.814679] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1153.821989] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1153.831907] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1153.839216] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:08:59 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:08:59 executing program 2 (fault-call:2 fault-nth:67): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1153.949619] bond0: Releasing backup interface bond_slave_1 22:09:00 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xa0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1154.075400] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1154.099620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1154.119760] FAULT_INJECTION: forcing a failure. [ 1154.119760] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.144638] CPU: 0 PID: 5690 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1154.151635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1154.151643] Call Trace: [ 1154.151675] dump_stack+0x172/0x1f0 [ 1154.151701] should_fail.cold+0xa/0x1b 22:09:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r2, r2, 0x0, 0x0) [ 1154.151721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1154.151737] ? lock_downgrade+0x810/0x810 [ 1154.151769] __should_failslab+0x121/0x190 [ 1154.151791] should_failslab+0x9/0x14 [ 1154.151810] kmem_cache_alloc_trace+0x2cc/0x760 [ 1154.151834] ? kasan_unpoison_shadow+0x35/0x50 [ 1154.197869] ? kasan_kmalloc+0xce/0xf0 [ 1154.201792] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1154.206750] __list_lru_init+0x402/0x720 [ 1154.210831] sget_userns+0x81b/0xd30 [ 1154.214550] ? kill_litter_super+0x60/0x60 [ 1154.218791] ? ns_test_super+0x50/0x50 [ 1154.222702] ? ns_test_super+0x50/0x50 [ 1154.226617] ? kill_litter_super+0x60/0x60 [ 1154.230859] sget+0x10c/0x150 [ 1154.233980] mount_bdev+0xff/0x3c0 [ 1154.237532] ? finish_unfinished+0x1120/0x1120 [ 1154.242134] get_super_block+0x35/0x40 [ 1154.246057] mount_fs+0xa8/0x31f [ 1154.249455] vfs_kern_mount.part.0+0x6f/0x410 [ 1154.253989] do_mount+0x53e/0x2bc0 [ 1154.257556] ? copy_mount_string+0x40/0x40 [ 1154.261830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1154.267410] ? copy_mount_options+0x280/0x3a0 [ 1154.271951] ksys_mount+0xdb/0x150 [ 1154.275561] __x64_sys_mount+0xbe/0x150 [ 1154.279562] do_syscall_64+0xfd/0x620 [ 1154.283394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1154.288608] RIP: 0033:0x45c27a [ 1154.291820] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1154.310749] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1154.318501] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1154.325809] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1154.333107] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1154.340408] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1154.347710] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:00 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:00 executing program 3: fanotify_init(0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:09:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:00 executing program 2 (fault-call:2 fault-nth:68): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:00 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xf4', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1154.567556] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1154.586017] FAULT_INJECTION: forcing a failure. [ 1154.586017] name failslab, interval 1, probability 0, space 0, times 0 [ 1154.617724] CPU: 0 PID: 5714 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1154.624731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1154.634092] Call Trace: [ 1154.636686] dump_stack+0x172/0x1f0 [ 1154.640330] should_fail.cold+0xa/0x1b [ 1154.644249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1154.649388] ? lock_downgrade+0x810/0x810 [ 1154.653569] __should_failslab+0x121/0x190 [ 1154.657841] should_failslab+0x9/0x14 [ 1154.661706] kmem_cache_alloc_trace+0x2cc/0x760 [ 1154.666416] ? kasan_unpoison_shadow+0x35/0x50 [ 1154.671032] ? kasan_kmalloc+0xce/0xf0 [ 1154.674976] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1154.679948] __list_lru_init+0x402/0x720 [ 1154.684054] sget_userns+0x81b/0xd30 [ 1154.687812] ? kill_litter_super+0x60/0x60 [ 1154.692078] ? ns_test_super+0x50/0x50 [ 1154.696015] ? ns_test_super+0x50/0x50 [ 1154.699926] ? kill_litter_super+0x60/0x60 [ 1154.704194] sget+0x10c/0x150 [ 1154.707329] mount_bdev+0xff/0x3c0 [ 1154.710893] ? finish_unfinished+0x1120/0x1120 [ 1154.715526] get_super_block+0x35/0x40 [ 1154.719463] mount_fs+0xa8/0x31f [ 1154.722871] vfs_kern_mount.part.0+0x6f/0x410 [ 1154.727408] do_mount+0x53e/0x2bc0 [ 1154.731014] ? copy_mount_string+0x40/0x40 [ 1154.735312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1154.740887] ? copy_mount_options+0x280/0x3a0 [ 1154.745424] ksys_mount+0xdb/0x150 [ 1154.749011] __x64_sys_mount+0xbe/0x150 [ 1154.753022] do_syscall_64+0xfd/0x620 [ 1154.756861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1154.762082] RIP: 0033:0x45c27a [ 1154.765302] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1154.784405] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1154.792143] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1154.799438] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1154.806741] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 22:09:00 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1154.815549] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1154.822853] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:01 executing program 2 (fault-call:2 fault-nth:69): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:01 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1155.078937] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1155.158427] FAULT_INJECTION: forcing a failure. [ 1155.158427] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.195442] CPU: 1 PID: 5734 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1155.202495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1155.211889] Call Trace: [ 1155.214529] dump_stack+0x172/0x1f0 [ 1155.218207] should_fail.cold+0xa/0x1b [ 1155.222149] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1155.227306] ? lock_downgrade+0x810/0x810 [ 1155.231510] __should_failslab+0x121/0x190 [ 1155.235793] should_failslab+0x9/0x14 [ 1155.239626] kmem_cache_alloc_trace+0x2cc/0x760 [ 1155.244332] ? kasan_unpoison_shadow+0x35/0x50 [ 1155.248967] ? kasan_kmalloc+0xce/0xf0 [ 1155.252899] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1155.257880] __list_lru_init+0x402/0x720 [ 1155.261993] sget_userns+0x81b/0xd30 [ 1155.265756] ? kill_litter_super+0x60/0x60 [ 1155.270045] ? ns_test_super+0x50/0x50 [ 1155.273970] ? ns_test_super+0x50/0x50 [ 1155.277899] ? kill_litter_super+0x60/0x60 [ 1155.282175] sget+0x10c/0x150 [ 1155.285329] mount_bdev+0xff/0x3c0 [ 1155.288903] ? finish_unfinished+0x1120/0x1120 [ 1155.293527] get_super_block+0x35/0x40 [ 1155.297449] mount_fs+0xa8/0x31f [ 1155.300860] vfs_kern_mount.part.0+0x6f/0x410 [ 1155.305393] do_mount+0x53e/0x2bc0 [ 1155.308971] ? copy_mount_string+0x40/0x40 [ 1155.313245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1155.318820] ? copy_mount_options+0x280/0x3a0 [ 1155.323381] ksys_mount+0xdb/0x150 [ 1155.326964] __x64_sys_mount+0xbe/0x150 [ 1155.330971] do_syscall_64+0xfd/0x620 [ 1155.334800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1155.340010] RIP: 0033:0x45c27a 22:09:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x400) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendmmsg(r3, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)="4a6fe2c97989662ddc969b0e8c644c5cfd6784debd5ee2f755249e8d6f860d4f42565d1d06326ff86aa1140ab9a036fb39bd600e62a572a9e31ed283503be6ba4c44ad5dad0fff1b3554ce6b746ad035abf6d796c12fb93da83424238b01f09ceb2696a3fb1f38493dafdb94603fc1f7594ddbb52f6e0d5e5292c788a313371ab19a73b547ac1499791d985349ebc9d0", 0x200001d0}, {&(0x7f0000000240)="c7", 0x1}], 0x2}}], 0x1, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000001c0)=0x9) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0xcfce10230fb7e18b, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x81, 0x8001}, &(0x7f0000000400)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000440)={r5, @in6={{0xa, 0x4e20, 0x800, @loopback, 0x8}}, 0x100000001, 0xa88}, 0x90) shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000000c0)=""/201) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x40100, 0x0) getsockname$netrom(r7, &(0x7f0000000240)={{0x3, @default}, [@null, @bcast, @rose, @bcast, @rose, @bcast, @rose, @rose]}, &(0x7f00000002c0)=0x48) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1155.343229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1155.362154] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1155.369900] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1155.377238] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1155.384534] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1155.391835] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1155.399139] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:01 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1155.594597] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1155.608126] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:01 executing program 3: fanotify_init(0x0, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 22:09:01 executing program 2 (fault-call:2 fault-nth:70): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x52000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1155.792820] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 1155.802656] FAULT_INJECTION: forcing a failure. [ 1155.802656] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.827385] CPU: 1 PID: 5759 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1155.835532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1155.844905] Call Trace: [ 1155.847511] dump_stack+0x172/0x1f0 [ 1155.851905] should_fail.cold+0xa/0x1b [ 1155.851930] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1155.851946] ? lock_downgrade+0x810/0x810 [ 1155.851979] __should_failslab+0x121/0x190 [ 1155.861197] should_failslab+0x9/0x14 [ 1155.861213] kmem_cache_alloc_trace+0x2cc/0x760 [ 1155.861227] ? kasan_unpoison_shadow+0x35/0x50 [ 1155.861243] ? kasan_kmalloc+0xce/0xf0 [ 1155.861266] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1155.861286] __list_lru_init+0x402/0x720 [ 1155.861307] sget_userns+0x81b/0xd30 [ 1155.861321] ? kill_litter_super+0x60/0x60 [ 1155.861338] ? ns_test_super+0x50/0x50 [ 1155.861357] ? ns_test_super+0x50/0x50 [ 1155.911401] ? kill_litter_super+0x60/0x60 [ 1155.915659] sget+0x10c/0x150 [ 1155.919930] mount_bdev+0xff/0x3c0 [ 1155.923490] ? finish_unfinished+0x1120/0x1120 [ 1155.928113] get_super_block+0x35/0x40 [ 1155.932039] mount_fs+0xa8/0x31f [ 1155.935443] vfs_kern_mount.part.0+0x6f/0x410 [ 1155.939992] do_mount+0x53e/0x2bc0 [ 1155.943572] ? copy_mount_string+0x40/0x40 [ 1155.947857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1155.953429] ? copy_mount_options+0x280/0x3a0 [ 1155.957975] ksys_mount+0xdb/0x150 [ 1155.961551] __x64_sys_mount+0xbe/0x150 [ 1155.965555] do_syscall_64+0xfd/0x620 [ 1155.969388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1155.974602] RIP: 0033:0x45c27a [ 1155.977818] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1155.996745] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1156.004509] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1156.011810] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1156.019107] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1156.026404] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1156.033714] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) fstat(r0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1156.042711] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:02 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:02 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x01', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:02 executing program 2 (fault-call:2 fault-nth:71): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) [ 1156.352885] __ntfs_warning: 24 callbacks suppressed [ 1156.352902] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1156.399057] FAULT_INJECTION: forcing a failure. [ 1156.399057] name failslab, interval 1, probability 0, space 0, times 0 [ 1156.410915] ntfs: (device loop4): parse_options(): NLS character set [ 1156.410915] p852 not found. Using previous one utf8. [ 1156.426794] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1156.440831] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 1156.455260] CPU: 1 PID: 5780 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1156.462266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.471650] Call Trace: [ 1156.474284] dump_stack+0x172/0x1f0 [ 1156.477955] should_fail.cold+0xa/0x1b [ 1156.481891] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1156.487022] ? lock_downgrade+0x810/0x810 [ 1156.491216] __should_failslab+0x121/0x190 [ 1156.495495] should_failslab+0x9/0x14 [ 1156.499327] kmem_cache_alloc_trace+0x2cc/0x760 [ 1156.504027] ? kasan_unpoison_shadow+0x35/0x50 [ 1156.508648] ? kasan_kmalloc+0xce/0xf0 [ 1156.512581] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1156.517551] __list_lru_init+0x402/0x720 [ 1156.521657] sget_userns+0x84a/0xd30 [ 1156.525400] ? kill_litter_super+0x60/0x60 [ 1156.529670] ? ns_test_super+0x50/0x50 [ 1156.533594] ? ns_test_super+0x50/0x50 [ 1156.537501] ? kill_litter_super+0x60/0x60 [ 1156.541759] sget+0x10c/0x150 [ 1156.544914] mount_bdev+0xff/0x3c0 [ 1156.548488] ? finish_unfinished+0x1120/0x1120 [ 1156.553114] get_super_block+0x35/0x40 [ 1156.557227] mount_fs+0xa8/0x31f [ 1156.560688] vfs_kern_mount.part.0+0x6f/0x410 [ 1156.565222] do_mount+0x53e/0x2bc0 [ 1156.568799] ? copy_mount_string+0x40/0x40 [ 1156.573056] ? _copy_from_user+0xdd/0x150 [ 1156.577313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1156.582873] ? copy_mount_options+0x280/0x3a0 [ 1156.587402] ksys_mount+0xdb/0x150 [ 1156.590982] __x64_sys_mount+0xbe/0x150 [ 1156.594992] do_syscall_64+0xfd/0x620 [ 1156.598831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.604052] RIP: 0033:0x45c27a [ 1156.607280] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1156.626210] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1156.633954] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1156.641254] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1156.648550] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 22:09:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000001880)={0x0, 0x0, 0x4}, &(0x7f00000018c0)=0x8) prctl$PR_SET_SECUREBITS(0x1c, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001dc0)={0x0, 0xb4, &(0x7f0000001d00)=[@in6={0xa, 0x4e22, 0x3, @mcast2, 0x4e52}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, @in6={0xa, 0x4e21, 0x1, @rand_addr="b9de11c9b03eb00446a38cca6fa29880", 0x7fff}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e24, 0x4, @empty, 0x3ff}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f0000001e00)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000001e40)={0x0, 0x4}, &(0x7f0000001e80)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002080)=[{&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x9e, @empty, 0x10001}, 0x1c, &(0x7f0000000200)=[{&(0x7f00000000c0)="bd9ac2e021f19469457c291774fe2dbb87db318a327d7a25b29befcb0aeff137f990a9447f9c59e5efa1529a76aca8f707075f925bd11d67120e39019d7e48c0a02f1b3b7cf23d94bbc1f524182d0f3218e1dec9c131699ad4df765690510c7b48546535d6ab696a250fa2a1fe72d323349b8e282bafc772cc08270df6e994d6b73ba8e6dbb74d7842ff5b3ede1b4304b1baa65fe533f5b051817c2fb2762a67c14796c44061852d09cd64ed4056e6ec0fab3b", 0xb3}, {&(0x7f0000000180)="88a0acaa0a595a165197cf803e6d20d5537652ac4bf501cb0bdb9320f8a9fbd2e636824d94c2f756e00b1703ca75839e1d2a58d1e5b78dd04d59744fc60e3e884c2ea5c3ce455a7350f0471d", 0x4c}], 0x2, &(0x7f0000000240), 0x0, 0x4040000}, {&(0x7f0000000280)=@in6={0xa, 0x4e23, 0x1ff, @loopback, 0x25b}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000340)="5692aa22c3304a566a97e872674d760a04a4a1f748a04a6abe8a24e44cf33737bbd0cac7e5ddd044e27f10f65a7fcfa31ee2c55c513af67c5edcaeb1eb466e453d321923086072d565a52cfd812a87df0f1fbcf8c558c7c97dbd592062b95c50537fadc20c65bcd575a0c83d366b00649ecf64346ffc59c05ed090038248882d57005a201ecbefbcf91fa50fbfc8b9eb26305c8b92558c5969025264dc8012044db5cd2eb20c4961532cc77c98fbcaa830ddb1465d813ca1b3f0820b9c15bcaa220bad9bbb10716a21ca3f3e334c297710a3ffaa9cbb40f6c26f395d157fdca95bf2f9ba55d5bf90d13a6f1b0deb39afd32f5f17c7fd42", 0xf7}, {&(0x7f0000000440)="8429d75575310fdd90c384d9509855f58119f5f3db641b152bd081b1596967bff9c66c375dd010cb84cce66af7340f4368557ff2fc975caa66383c3c908ddea45f31e8eee8151f48f9395a7ef57d588f67e12f656b21e02d", 0x58}], 0x2, &(0x7f00000004c0)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x3e0}}], 0x18, 0x4000}, {&(0x7f0000000500)=@in6={0xa, 0x4e21, 0x3ff, @mcast2, 0x80000001}, 0x1c, &(0x7f0000001800)=[{&(0x7f0000000540)="ffbc2594f47c617e2e71a13c9a5135ece35d0dce56eb722b4638105f547bbb2933defac9d25afd6579c1f4f82b7d14a3f2de0d75c3c31847e3009dfc12a234e5740da78c1b9061a085ed5b5a50683e91c60e2c9f3b5f12e67732b2b88f809fb87a33447490400182a850a2fe395daa9d1f885365", 0x74}, {&(0x7f00000005c0)="a66d8e1110a78ff161628b5b1e2460e3d2d8d5a04a0280fbbe8cf87fa3a0871a64e4679c1f6a04b7121e343500ccb9a0ce0bceb92ece384eb8660293de11df3f375b3f5240df73aa10ea646ad19522530ba48680cdbb348917fd0d8427ac02ad2fda503538810cda7e5dc1b48b50c0545d5003034f8151f910e5141c225903d2f0d80e58f5c19ba829b8dc4029556628109907db148735c500171d9eebf045b758fb8c4e50ee8597a431218f26f15f4be501abde3c5dd6a6420842feb7c298b3c42ff67f4d188e3770f4455eba38cf28d4", 0xd1}, {&(0x7f00000006c0)="663a490e354a13dc0cc08b8cba60e4beeb5dd2b1c7bf1d0e86c05a2a01a2715157c74f4959a3a064a0ff23958edb1152f46216ddbca26d3e2094fe611a08c0bad88d408bbc0993690c6481e11f748bc623559f95b768af042c3f5c988bcf0632db5e9e51e18a2ed735ab6875e1c5cd3df28ce4b72a61c1f48c9867b5ffc82c79c15bec5fe3bfbd93c9e85c1f968bf5de05f6938aff490dea15eb31dbfec83046", 0xa0}, {&(0x7f0000000780)="ffb6e378d6e05bd172adc7b8c3fc15ed8856e0f5e0a0ee406dca24e851c04a408ea5c11486a66291a2b99d77ac3b466f24ad15376697254bc4acd6531cb5311eeb02c5124e8d4a0459e45167bac8e8f7b0b6ba89a4b8e96707029200d2ce020b0f58e053d2df0578244d3120e87cac6bbd0df170a7d1", 0x76}, {&(0x7f0000000800)="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", 0x1000}], 0x5, &(0x7f0000001900)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x9, 0x7, 0x6f9, r2}}], 0x20, 0x4040810}, {&(0x7f0000001940)=@in={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000001cc0)=[{&(0x7f0000001980)="568838a2406b58a7fedb5335da74e66764d02162c6cb417b169e748c4bf564d0bc8f829f908f8e92a67ec15e83111e3dba3a4190b91e544ed91267e96adde76c478f749c64ba2682d5", 0x49}, {&(0x7f0000001a00)="3b594f40c66876f5d1ac240149f146de0dce72d4de478dd3646a1914c8e3c3459e37aef3bb36c77f06f16ec29ff5fc8935f6432b8ffa3869b928a348d57d7abe034059f34a125ac7ac2dfa83bc33195fc844efa04441dd0a1030cb59eb0f872d5203024f6442e11a2fdffd4e089b6b564d81205f243694c39486c934a5fbb283c7fde1bc1099a4cf4cadb606f45ecbf9aaca663245bd038b7a6fe5663e781eb0859a50d009075d", 0xa7}, {&(0x7f0000001ac0)="db72c60279b06184200408e183927aab38caccf3730e9b7f06f424d7f0d3329880eb641bf722379e9bb071c1b73e64409d6363425c632b3d04c5566d735638fab148e937a7bda5718968c48e547b122aac97320c4542f546783b5257b8a8ff42ab33f5bbbf6b331d680239edff77079046d32cd0d1e11226538f70e4d1eef7147121f206f704637aef433a413a5b6039cb4297a5abb10b066cc6960335bf467d1998ca95693b3bd1ac9d6e7ad9917b27ddca8c6515d50594057095a2a6caafd3c9e100f7e9d714b43c982c852553f4c4388c45b6ca25dca8efeffdee5f6ed915569fc80a36be5fcca899e6af", 0xec}, {&(0x7f0000001bc0)="ef93f9e59ea6accad088b3b8259dc8ce0fe398312afce9e701362014d9ef9c7a07d5f7873712cdb1fc10ba8e42245747950b42fe807ea5aa0e5f09f3b03ee1184e32f95a3690cfa05103e73e6a4eba34caf628a90279c90363e50e681748c3af54259aee7c2f80acb41dc4a054c0aaa1290e51d277266032a18fcec38bfaf91458eaaa0f48f19adf1a84cdd35a50c543490c5d72a15d1dd776f70f1ff283627e86a7189fb3647b1581b8a97d7bd2f37ab587a454fe8f168ef273b3550a9f99796dffef40043da4958a117205e46fab3da02927bcd24322a47768e4", 0xdb}], 0x4, &(0x7f0000001ec0)=[@authinfo={0x18, 0x84, 0x6, {0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x1, 0x4, 0x9, r3}}, @init={0x18, 0x84, 0x0, {0x9, 0x6, 0x6, 0x100}}, @sndinfo={0x20, 0x84, 0x2, {0x400, 0x20c, 0x8, 0x3c66, r4}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0xa73}}], 0xc0, 0x4000040}, {&(0x7f0000001f80)=@in={0x2, 0x4e23, @rand_addr=0x7}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001fc0)="094e656511a51e7d2cf24b0788e66a821ef59f96b11629c1877e030bab572e6e85d2f34ae6a0ffb542d30203f62a066f9a60e082c17b68c691", 0x39}, {&(0x7f0000002000)}], 0x2, 0x0, 0x0, 0x40}], 0x5, 0x40) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) socket$inet6(0xa, 0x2, 0x7) [ 1156.655843] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1156.663140] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:02 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:02 executing program 3: syslog(0x3, &(0x7f0000000000)=""/13, 0xbd) [ 1156.879496] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 22:09:02 executing program 2 (fault-call:2 fault-nth:72): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'teql0\x00', 0x300}) [ 1156.962070] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1156.997704] ntfs: (device loop4): parse_options(): NLS character set [ 1156.997704] p852 not found. Using previous one utf8. 22:09:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x80000000, @loopback, 0x7}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r3 = dup(r1) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000100)=0x3ff, &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1157.009570] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:09:03 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:03 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xafff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) arch_prctl$ARCH_SET_GS(0x1001, 0x3) [ 1157.107082] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1157.142915] FAULT_INJECTION: forcing a failure. [ 1157.142915] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.154311] CPU: 0 PID: 5814 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1157.161265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1157.170645] Call Trace: [ 1157.173280] dump_stack+0x172/0x1f0 [ 1157.176977] should_fail.cold+0xa/0x1b [ 1157.180901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1157.180922] ? lock_downgrade+0x810/0x810 [ 1157.180950] __should_failslab+0x121/0x190 [ 1157.180975] should_failslab+0x9/0x14 [ 1157.180988] kmem_cache_alloc_trace+0x2cc/0x760 [ 1157.181002] ? kasan_unpoison_shadow+0x35/0x50 [ 1157.181018] ? kasan_kmalloc+0xce/0xf0 [ 1157.181039] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1157.181059] __list_lru_init+0x402/0x720 [ 1157.181095] sget_userns+0x84a/0xd30 [ 1157.181110] ? kill_litter_super+0x60/0x60 [ 1157.181129] ? ns_test_super+0x50/0x50 [ 1157.232454] ? ns_test_super+0x50/0x50 [ 1157.236369] ? kill_litter_super+0x60/0x60 [ 1157.240639] sget+0x10c/0x150 [ 1157.243788] mount_bdev+0xff/0x3c0 [ 1157.247354] ? finish_unfinished+0x1120/0x1120 [ 1157.251975] get_super_block+0x35/0x40 [ 1157.255906] mount_fs+0xa8/0x31f [ 1157.259306] vfs_kern_mount.part.0+0x6f/0x410 [ 1157.263832] do_mount+0x53e/0x2bc0 [ 1157.267415] ? copy_mount_string+0x40/0x40 [ 1157.271689] ? _copy_from_user+0xdd/0x150 [ 1157.275890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1157.281472] ? copy_mount_options+0x280/0x3a0 [ 1157.286019] ksys_mount+0xdb/0x150 [ 1157.289603] __x64_sys_mount+0xbe/0x150 [ 1157.293610] do_syscall_64+0xfd/0x620 [ 1157.297444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1157.302659] RIP: 0033:0x45c27a [ 1157.305873] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1157.324806] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1157.332549] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1157.339936] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1157.347282] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1157.354580] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1157.361883] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1157.389612] ntfs: (device loop4): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 1157.436164] ntfs: (device loop4): parse_options(): NLS character set [ 1157.436164] p852 not found. Using previous one utf8. [ 1157.456398] ntfs: (device loop4): parse_options(): Unrecognized mount option . 22:09:03 executing program 2 (fault-call:2 fault-nth:73): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:03 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1157.500692] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1157.620651] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1157.628167] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1157.661306] FAULT_INJECTION: forcing a failure. [ 1157.661306] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.685144] CPU: 1 PID: 5836 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1157.692390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1157.692398] Call Trace: [ 1157.692428] dump_stack+0x172/0x1f0 [ 1157.692460] should_fail.cold+0xa/0x1b [ 1157.712009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1157.717156] ? lock_downgrade+0x810/0x810 [ 1157.721344] __should_failslab+0x121/0x190 [ 1157.721365] should_failslab+0x9/0x14 [ 1157.729440] __kmalloc+0x2e2/0x750 [ 1157.733028] ? __list_lru_init+0xd5/0x720 [ 1157.737214] __list_lru_init+0xd5/0x720 [ 1157.741219] sget_userns+0x84a/0xd30 [ 1157.741235] ? kill_litter_super+0x60/0x60 [ 1157.741257] ? ns_test_super+0x50/0x50 [ 1157.749234] ? ns_test_super+0x50/0x50 [ 1157.749248] ? kill_litter_super+0x60/0x60 [ 1157.749262] sget+0x10c/0x150 [ 1157.749281] mount_bdev+0xff/0x3c0 [ 1157.749294] ? finish_unfinished+0x1120/0x1120 [ 1157.749313] get_super_block+0x35/0x40 [ 1157.757146] mount_fs+0xa8/0x31f [ 1157.757167] vfs_kern_mount.part.0+0x6f/0x410 [ 1157.757190] do_mount+0x53e/0x2bc0 [ 1157.788070] ? retint_kernel+0x2d/0x2d [ 1157.792002] ? copy_mount_string+0x40/0x40 [ 1157.796274] ? copy_mount_options+0x198/0x3a0 [ 1157.800806] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 1157.805682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1157.811255] ? copy_mount_options+0x280/0x3a0 [ 1157.815790] ksys_mount+0xdb/0x150 [ 1157.819373] __x64_sys_mount+0xbe/0x150 [ 1157.823396] do_syscall_64+0xfd/0x620 [ 1157.828278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1157.835326] RIP: 0033:0x45c27a [ 1157.838547] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 22:09:03 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xafff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) arch_prctl$ARCH_SET_GS(0x1001, 0x3) 22:09:03 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1157.857484] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1157.865228] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1157.872525] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1157.879825] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1157.887124] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1157.894421] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:04 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00160000004000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) pread64(r1, &(0x7f00000000c0)=""/189, 0xbd, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:04 executing program 2 (fault-call:2 fault-nth:74): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:04 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:04 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xafff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) arch_prctl$ARCH_SET_GS(0x1001, 0x3) 22:09:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1158.169570] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1158.190259] FAULT_INJECTION: forcing a failure. [ 1158.190259] name failslab, interval 1, probability 0, space 0, times 0 [ 1158.216020] CPU: 0 PID: 5854 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1158.223117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1158.232500] Call Trace: [ 1158.235133] dump_stack+0x172/0x1f0 [ 1158.238800] should_fail.cold+0xa/0x1b [ 1158.242811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1158.247962] ? lock_downgrade+0x810/0x810 [ 1158.247988] __should_failslab+0x121/0x190 [ 1158.248008] should_failslab+0x9/0x14 [ 1158.248022] __kmalloc+0x2e2/0x750 [ 1158.248043] ? __list_lru_init+0xd5/0x720 [ 1158.248064] __list_lru_init+0xd5/0x720 [ 1158.248095] sget_userns+0x84a/0xd30 [ 1158.248108] ? kill_litter_super+0x60/0x60 [ 1158.248124] ? ns_test_super+0x50/0x50 [ 1158.280588] ? ns_test_super+0x50/0x50 [ 1158.280603] ? kill_litter_super+0x60/0x60 [ 1158.280618] sget+0x10c/0x150 [ 1158.280638] mount_bdev+0xff/0x3c0 [ 1158.280650] ? finish_unfinished+0x1120/0x1120 [ 1158.280666] get_super_block+0x35/0x40 [ 1158.280684] mount_fs+0xa8/0x31f [ 1158.280708] vfs_kern_mount.part.0+0x6f/0x410 [ 1158.280731] do_mount+0x53e/0x2bc0 [ 1158.280755] ? copy_mount_string+0x40/0x40 [ 1158.280778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1158.280793] ? copy_mount_options+0x280/0x3a0 [ 1158.280816] ksys_mount+0xdb/0x150 [ 1158.280836] __x64_sys_mount+0xbe/0x150 [ 1158.280858] do_syscall_64+0xfd/0x620 [ 1158.280879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1158.280892] RIP: 0033:0x45c27a [ 1158.280910] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1158.280918] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1158.280935] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1158.280944] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1158.280960] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1158.280970] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1158.280979] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:04 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) [ 1158.513324] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:04 executing program 2 (fault-call:2 fault-nth:75): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1158.555137] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa0010000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1158.621781] print_req_error: I/O error, dev loop3, sector 64 22:09:04 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1158.674406] print_req_error: I/O error, dev loop3, sector 256 [ 1158.681616] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1158.691320] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1158.718798] print_req_error: I/O error, dev loop3, sector 512 [ 1158.724844] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1158.760089] print_req_error: I/O error, dev loop3, sector 64 22:09:04 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1158.839688] print_req_error: I/O error, dev loop3, sector 512 [ 1158.846203] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1158.861689] FAULT_INJECTION: forcing a failure. [ 1158.861689] name failslab, interval 1, probability 0, space 0, times 0 [ 1158.868658] print_req_error: I/O error, dev loop3, sector 1024 [ 1158.879433] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1158.881202] CPU: 1 PID: 5876 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1158.895698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1158.905345] Call Trace: [ 1158.907978] dump_stack+0x172/0x1f0 [ 1158.911736] should_fail.cold+0xa/0x1b [ 1158.915679] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1158.920900] ? lock_downgrade+0x810/0x810 [ 1158.925107] __should_failslab+0x121/0x190 [ 1158.929378] should_failslab+0x9/0x14 [ 1158.933217] kmem_cache_alloc_trace+0x2cc/0x760 [ 1158.937952] ? kasan_unpoison_shadow+0x35/0x50 [ 1158.942578] ? kasan_kmalloc+0xce/0xf0 [ 1158.946530] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1158.951502] __list_lru_init+0x402/0x720 [ 1158.955601] sget_userns+0x84a/0xd30 [ 1158.959356] ? kill_litter_super+0x60/0x60 [ 1158.963622] ? ns_test_super+0x50/0x50 [ 1158.967536] ? ns_test_super+0x50/0x50 [ 1158.971445] ? kill_litter_super+0x60/0x60 [ 1158.975712] sget+0x10c/0x150 [ 1158.978853] mount_bdev+0xff/0x3c0 [ 1158.982414] ? finish_unfinished+0x1120/0x1120 [ 1158.987035] get_super_block+0x35/0x40 [ 1158.991062] mount_fs+0xa8/0x31f [ 1158.994490] vfs_kern_mount.part.0+0x6f/0x410 [ 1158.999022] do_mount+0x53e/0x2bc0 [ 1159.002595] ? copy_mount_string+0x40/0x40 [ 1159.006862] ? copy_mount_options+0x1ea/0x3a0 [ 1159.011388] ? copy_mount_options+0x1f0/0x3a0 [ 1159.015909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.021476] ? copy_mount_options+0x280/0x3a0 [ 1159.026004] ksys_mount+0xdb/0x150 [ 1159.029568] __x64_sys_mount+0xbe/0x150 [ 1159.033769] do_syscall_64+0xfd/0x620 [ 1159.037596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.042807] RIP: 0033:0x45c27a [ 1159.046018] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1159.064940] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1159.072672] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1159.079960] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1159.087249] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1159.094549] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1159.101847] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1159.184924] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:05 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) recvfrom$inet6(r0, &(0x7f0000000340)=""/4096, 0x1000, 0x2, &(0x7f00000000c0)={0xa, 0x4e20, 0x200, @rand_addr="04ea854eaf6f8145a46b3a53c53b9444"}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x13, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="0d5cd1f965787a6cdbe129e5a595a96a53402c0299fb2fab22516f24b3904b6b8c84dcd45f348adcbdaa8f7c6a295ec83fd1f2963c7b30ec72f437c36ec42d61b5d4d29ef1035f41dc5b1ab8eb9f845035d740bb25df579b621641b10e85afe94a796b6f835a4199125aa2600b8fbc9aaee421e56f2345cfebe7c5b4910612fd84074c56a76fe8b032aa1d2518fd5c202e016bcb030683d86e6624390fcdeb7630"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r2, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:05 executing program 2 (fault-call:2 fault-nth:76): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1159.342995] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1159.362575] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1159.379962] audit: type=1400 audit(1565474945.394:123): avc: denied { map } for pid=5894 comm="syz-executor.5" path="/dev/autofs" dev="devtmpfs" ino=1097 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:autofs_device_t:s0 tclass=chr_file permissive=1 [ 1159.439072] print_req_error: I/O error, dev loop3, sector 64 [ 1159.445644] print_req_error: I/O error, dev loop3, sector 1024 [ 1159.453506] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1159.473685] print_req_error: I/O error, dev loop3, sector 2048 22:09:05 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="ad27f93c8727361e"], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1159.483996] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1159.505845] print_req_error: I/O error, dev loop3, sector 64 [ 1159.525223] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1159.536341] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1159.539588] FAULT_INJECTION: forcing a failure. [ 1159.539588] name failslab, interval 1, probability 0, space 0, times 0 [ 1159.553904] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) [ 1159.580750] CPU: 0 PID: 5898 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1159.587738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1159.587744] Call Trace: [ 1159.587771] dump_stack+0x172/0x1f0 [ 1159.587793] should_fail.cold+0xa/0x1b [ 1159.587810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1159.587833] ? lock_downgrade+0x810/0x810 [ 1159.616605] __should_failslab+0x121/0x190 [ 1159.616626] should_failslab+0x9/0x14 [ 1159.616641] kmem_cache_alloc_trace+0x2cc/0x760 [ 1159.616657] ? kasan_unpoison_shadow+0x35/0x50 [ 1159.616672] ? kasan_kmalloc+0xce/0xf0 [ 1159.616694] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1159.642871] __list_lru_init+0x402/0x720 [ 1159.646972] sget_userns+0x84a/0xd30 [ 1159.650706] ? kill_litter_super+0x60/0x60 [ 1159.654979] ? ns_test_super+0x50/0x50 [ 1159.659068] ? ns_test_super+0x50/0x50 [ 1159.662985] ? kill_litter_super+0x60/0x60 [ 1159.667247] sget+0x10c/0x150 [ 1159.670381] mount_bdev+0xff/0x3c0 [ 1159.670396] ? finish_unfinished+0x1120/0x1120 [ 1159.670420] get_super_block+0x35/0x40 [ 1159.678583] mount_fs+0xa8/0x31f [ 1159.678608] vfs_kern_mount.part.0+0x6f/0x410 [ 1159.678629] do_mount+0x53e/0x2bc0 [ 1159.678653] ? copy_mount_string+0x40/0x40 [ 1159.678671] ? _copy_from_user+0xdd/0x150 [ 1159.678690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1159.678704] ? copy_mount_options+0x280/0x3a0 [ 1159.678723] ksys_mount+0xdb/0x150 [ 1159.678740] __x64_sys_mount+0xbe/0x150 [ 1159.678759] do_syscall_64+0xfd/0x620 [ 1159.678779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1159.678792] RIP: 0033:0x45c27a [ 1159.678808] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1159.678815] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1159.678830] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1159.678838] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1159.678853] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 22:09:05 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:05 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:05 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x100000001}, 0x4) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f00000000c0)={0x0, {0xd40, 0xfffffffffffffff9}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1159.689559] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1159.690645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1159.690655] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1159.725002] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1160.025423] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1160.061739] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:06 executing program 2 (fault-call:2 fault-nth:77): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000140)={0x1, 'syz1\x00'}) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f00000000c0)) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1160.085243] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1160.095929] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xd8010000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1160.223127] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 22:09:06 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:06 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1160.289368] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1160.350847] FAULT_INJECTION: forcing a failure. [ 1160.350847] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.354223] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1160.378431] CPU: 0 PID: 5935 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1160.385438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1160.386813] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1160.394921] Call Trace: [ 1160.394964] dump_stack+0x172/0x1f0 [ 1160.394988] should_fail.cold+0xa/0x1b [ 1160.395009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1160.395026] ? lock_downgrade+0x810/0x810 [ 1160.395055] __should_failslab+0x121/0x190 [ 1160.395072] should_failslab+0x9/0x14 [ 1160.395088] kmem_cache_alloc_trace+0x2cc/0x760 [ 1160.395102] ? kasan_unpoison_shadow+0x35/0x50 [ 1160.395117] ? kasan_kmalloc+0xce/0xf0 [ 1160.395141] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1160.395162] __list_lru_init+0x402/0x720 [ 1160.395188] sget_userns+0x84a/0xd30 [ 1160.457543] ? kill_litter_super+0x60/0x60 [ 1160.461797] ? ns_test_super+0x50/0x50 [ 1160.465695] ? ns_test_super+0x50/0x50 [ 1160.469591] ? kill_litter_super+0x60/0x60 [ 1160.473840] sget+0x10c/0x150 [ 1160.476975] mount_bdev+0xff/0x3c0 [ 1160.480523] ? finish_unfinished+0x1120/0x1120 [ 1160.485115] get_super_block+0x35/0x40 [ 1160.489015] mount_fs+0xa8/0x31f [ 1160.492400] vfs_kern_mount.part.0+0x6f/0x410 [ 1160.496912] do_mount+0x53e/0x2bc0 [ 1160.500471] ? copy_mount_string+0x40/0x40 [ 1160.504726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1160.510281] ? copy_mount_options+0x280/0x3a0 [ 1160.514800] ksys_mount+0xdb/0x150 [ 1160.518362] __x64_sys_mount+0xbe/0x150 [ 1160.522366] do_syscall_64+0xfd/0x620 [ 1160.526183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1160.531385] RIP: 0033:0x45c27a [ 1160.534606] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1160.553793] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1160.561541] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1160.568839] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1160.576147] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1160.583449] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1160.590739] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1160.628774] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1160.654375] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1160.674406] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) 22:09:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) socket(0xa, 0x8000a, 0x2) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:06 executing program 2 (fault-call:2 fault-nth:78): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1160.705905] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:06 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:06 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x0e', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffff1f00, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:06 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x01', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1160.933279] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1160.939441] FAULT_INJECTION: forcing a failure. [ 1160.939441] name failslab, interval 1, probability 0, space 0, times 0 22:09:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1160.993401] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1161.016550] CPU: 0 PID: 5963 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1161.023536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1161.032921] Call Trace: [ 1161.035535] dump_stack+0x172/0x1f0 [ 1161.039177] should_fail.cold+0xa/0x1b [ 1161.043085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1161.048221] ? lock_downgrade+0x810/0x810 [ 1161.052407] __should_failslab+0x121/0x190 [ 1161.056667] should_failslab+0x9/0x14 [ 1161.060490] kmem_cache_alloc_trace+0x2cc/0x760 [ 1161.065189] ? kasan_unpoison_shadow+0x35/0x50 [ 1161.069797] ? kasan_kmalloc+0xce/0xf0 [ 1161.073713] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1161.078673] __list_lru_init+0x402/0x720 [ 1161.082765] sget_userns+0x84a/0xd30 [ 1161.086500] ? kill_litter_super+0x60/0x60 [ 1161.090757] ? ns_test_super+0x50/0x50 [ 1161.094667] ? ns_test_super+0x50/0x50 [ 1161.098567] ? kill_litter_super+0x60/0x60 [ 1161.102833] sget+0x10c/0x150 [ 1161.105969] mount_bdev+0xff/0x3c0 [ 1161.109531] ? finish_unfinished+0x1120/0x1120 [ 1161.114142] get_super_block+0x35/0x40 [ 1161.118063] mount_fs+0xa8/0x31f [ 1161.121462] vfs_kern_mount.part.0+0x6f/0x410 [ 1161.125988] do_mount+0x53e/0x2bc0 [ 1161.129551] ? copy_mount_string+0x40/0x40 [ 1161.133805] ? _copy_from_user+0xdd/0x150 [ 1161.137990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1161.143556] ? copy_mount_options+0x280/0x3a0 [ 1161.148107] ksys_mount+0xdb/0x150 [ 1161.151676] __x64_sys_mount+0xbe/0x150 [ 1161.155681] do_syscall_64+0xfd/0x620 [ 1161.159512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1161.164723] RIP: 0033:0x45c27a [ 1161.167934] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1161.186864] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1161.194602] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1161.201895] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1161.209184] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1161.216500] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1161.223795] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1161.251428] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1161.261384] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1161.309532] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1161.335720] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 22:09:07 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x01', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:07 executing program 2 (fault-call:2 fault-nth:79): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1161.419273] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1161.450765] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 22:09:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000002f80)=[{{&(0x7f0000003380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x6b, &(0x7f0000000680)=[{&(0x7f0000000340)=""/194, 0xc2}, {&(0x7f0000000240)=""/113, 0x71}, {&(0x7f0000000440)=""/78, 0x4e}, {&(0x7f00000004c0)=""/143, 0x8f}, {&(0x7f0000000580)=""/251, 0xfb}], 0x5, &(0x7f0000000700)=""/153, 0x99}, 0x1000}, {{0x0, 0x0, &(0x7f0000003240)=[{&(0x7f00000002c0)=""/7, 0x7}, {&(0x7f00000007c0)=""/238, 0xee}], 0x2, &(0x7f0000000900)=""/12, 0xc}, 0x5}, {{&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000003280)=""/217, 0xd9}, {&(0x7f0000000ac0)=""/62, 0x3e}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/215, 0xd7}], 0x4}, 0x80000001}, {{&(0x7f0000001c40)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001cc0)=""/196, 0xc4}, {&(0x7f0000001dc0)=""/67, 0x43}, {&(0x7f0000001e40)=""/243, 0xf3}], 0x3, &(0x7f0000001f80)=""/4096, 0x1000}, 0x4}], 0x4, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="d720fd48670868b60756eca717f4505fe0f7a5bc6282f428967bcb8421836715d538d1148b87d61dfa6e2dbd209d8340df96bfac44efc728de181ad6a50649539aeb583c7a121aef751fdf13cbd48da5f3811ad2e93527ae80f0c200507d80e1f11bb43f643ab7024074555c6219847b0b903b597ac159f62d4a336e4568cea7aab12ead02e4ee1c684224dfc7852eed280a5885aa9e45e997c58ce1ffc63b9234acf2e19ff6970033e151b64c60e9735318c04d1790f239f0a49f9c67073a5feb47c10da35f0052"], 0x8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0x2, 0x4) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000030c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000003080)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000003100)={0x9, 0x108, 0xfa00, {r4, 0xbf, "fce3d8", "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"}}, 0x110) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x34, &(0x7f0000000000)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1161.491386] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) 22:09:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:07 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:07 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) [ 1161.618655] FAULT_INJECTION: forcing a failure. [ 1161.618655] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.677977] CPU: 1 PID: 5992 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1161.684981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1161.694468] Call Trace: [ 1161.697113] dump_stack+0x172/0x1f0 [ 1161.701156] should_fail.cold+0xa/0x1b [ 1161.705096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1161.710263] ? lock_downgrade+0x810/0x810 [ 1161.714466] __should_failslab+0x121/0x190 [ 1161.718902] should_failslab+0x9/0x14 [ 1161.722744] kmem_cache_alloc_trace+0x2cc/0x760 22:09:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="5f0155375215cc4c28ea4e3e21ea511de8359489c306a5022feb30f0f4ece4"], 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x836}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x621}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r3 = semget$private(0x0, 0x2, 0x20) semop(r3, &(0x7f0000000000)=[{0x2, 0x20, 0x1800}, {0x0, 0x9, 0x1000}], 0x2) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1161.727449] ? kasan_unpoison_shadow+0x35/0x50 [ 1161.732089] ? kasan_kmalloc+0xce/0xf0 [ 1161.736026] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1161.741390] __list_lru_init+0x402/0x720 [ 1161.745512] sget_userns+0x84a/0xd30 [ 1161.749260] ? kill_litter_super+0x60/0x60 [ 1161.753555] ? ns_test_super+0x50/0x50 [ 1161.757494] ? ns_test_super+0x50/0x50 [ 1161.761417] ? kill_litter_super+0x60/0x60 [ 1161.765712] sget+0x10c/0x150 [ 1161.769125] mount_bdev+0xff/0x3c0 [ 1161.772699] ? finish_unfinished+0x1120/0x1120 [ 1161.777327] get_super_block+0x35/0x40 [ 1161.781369] mount_fs+0xa8/0x31f [ 1161.784783] vfs_kern_mount.part.0+0x6f/0x410 [ 1161.789323] do_mount+0x53e/0x2bc0 [ 1161.792913] ? copy_mount_string+0x40/0x40 [ 1161.797194] ? _copy_from_user+0xdd/0x150 [ 1161.801384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1161.806970] ? copy_mount_options+0x280/0x3a0 [ 1161.811533] ksys_mount+0xdb/0x150 [ 1161.815124] __x64_sys_mount+0xbe/0x150 [ 1161.819151] do_syscall_64+0xfd/0x620 [ 1161.823009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1161.835183] RIP: 0033:0x45c27a [ 1161.838407] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1161.857464] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1161.865743] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1161.873045] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1161.880344] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1161.887753] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1161.895078] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:08 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1162.003155] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:08 executing program 2 (fault-call:2 fault-nth:80): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000280)=ANY=[@ANYBLOB="0c3317fb622da400000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) socket$nl_crypto(0x10, 0x3, 0x15) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x206000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r3, 0xd1, "c23bcd", "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"}}, 0x110) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000340)={0xb9, 0x4, 0x5, "efcc19604e97da287997eb96f6db71f58b6054ce3d8ddf23815a9d1b2188c55df6b34dd11556d10e8d7947dc76f982b5703606c727a8927093a608239a0e9466f113d34691c75f727cb3ec2fda1c37ee53a1cfedfeda34b4b24e8e1aff53bf97dbca6d973c75f85454d62b3cd603630ea7be0ba07f310c222ab4d705e2f61b55cf7554d647ddd7c16842fccca0590e38d51271014631956a630ac6f0275ee24810f787eb99c6e821ee76b4686840c45441334ea45dc845a67a"}) [ 1162.088908] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1162.118410] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 22:09:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1162.139519] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 1162.156752] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1162.167076] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:08 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1162.187020] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1162.272865] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1162.284388] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1162.301474] FAULT_INJECTION: forcing a failure. [ 1162.301474] name failslab, interval 1, probability 0, space 0, times 0 [ 1162.324365] CPU: 0 PID: 6019 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1162.331359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1162.331367] Call Trace: [ 1162.331400] dump_stack+0x172/0x1f0 [ 1162.331427] should_fail.cold+0xa/0x1b [ 1162.331447] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1162.331468] ? lock_downgrade+0x810/0x810 [ 1162.331497] __should_failslab+0x121/0x190 [ 1162.331518] should_failslab+0x9/0x14 [ 1162.331534] kmem_cache_alloc_trace+0x2cc/0x760 [ 1162.331553] ? kasan_unpoison_shadow+0x35/0x50 [ 1162.331580] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1162.343598] __list_lru_init+0x402/0x720 [ 1162.343625] sget_userns+0x84a/0xd30 [ 1162.351147] ? kill_litter_super+0x60/0x60 [ 1162.351164] ? ns_test_super+0x50/0x50 [ 1162.351177] ? ns_test_super+0x50/0x50 [ 1162.351188] ? kill_litter_super+0x60/0x60 [ 1162.351201] sget+0x10c/0x150 [ 1162.351218] mount_bdev+0xff/0x3c0 [ 1162.351232] ? finish_unfinished+0x1120/0x1120 [ 1162.351249] get_super_block+0x35/0x40 22:09:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) prctl$PR_GET_THP_DISABLE(0x2a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1162.357794] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1162.360535] mount_fs+0xa8/0x31f [ 1162.360558] vfs_kern_mount.part.0+0x6f/0x410 [ 1162.360580] do_mount+0x53e/0x2bc0 [ 1162.360602] ? copy_mount_string+0x40/0x40 [ 1162.360625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1162.360638] ? copy_mount_options+0x280/0x3a0 [ 1162.360655] ksys_mount+0xdb/0x150 [ 1162.360673] __x64_sys_mount+0xbe/0x150 [ 1162.360693] do_syscall_64+0xfd/0x620 [ 1162.365355] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1162.368767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1162.368780] RIP: 0033:0x45c27a [ 1162.368795] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1162.368802] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1162.368816] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1162.368824] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1162.368832] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1162.368839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1162.368846] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1162.553634] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) 22:09:08 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:08 executing program 2 (fault-call:2 fault-nth:81): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:08 executing program 3: mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000003000)=[{{&(0x7f00000000c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f0000000000)=""/32, 0x20}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/29, 0x1d}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000240)=""/4, 0x4}, {&(0x7f0000001340)=""/215, 0xd7}, {&(0x7f0000001440)=""/216, 0xd8}], 0x8, &(0x7f0000001540)=""/229, 0xe5}, 0x7}, {{&(0x7f0000001640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000002980)=[{&(0x7f00000016c0)=""/62, 0x3e}, {&(0x7f0000001700)=""/20, 0x14}, {&(0x7f0000001740)=""/15, 0xf}, {&(0x7f0000001780)=""/20, 0x14}, {&(0x7f00000017c0)=""/71, 0x1f}, {&(0x7f0000001840)=""/72, 0x48}, {&(0x7f00000018c0)=""/96, 0x60}, {&(0x7f0000001940)=""/12, 0xc}, {&(0x7f0000001980)=""/4096, 0x1000}], 0x9}, 0x8}, {{&(0x7f0000002a40)=@l2, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002ac0)=""/165, 0xa5}, {&(0x7f0000002b80)=""/221, 0xdd}], 0x2}, 0x400}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002cc0)=""/30, 0x1e}, {&(0x7f0000002d00)=""/218, 0xda}, {&(0x7f0000002e00)=""/44, 0x2c}], 0x3}, 0x4}, {{&(0x7f0000002e80)=@x25={0x9, @remote}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002f00)=""/52, 0x34}], 0x1, &(0x7f0000002f80)=""/84, 0x54}, 0x4}], 0x5, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0080000006100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:08 executing program 3: mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) [ 1162.769722] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1162.841004] FAULT_INJECTION: forcing a failure. [ 1162.841004] name failslab, interval 1, probability 0, space 0, times 0 [ 1162.852909] CPU: 0 PID: 6042 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1162.859879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1162.869255] Call Trace: [ 1162.871880] dump_stack+0x172/0x1f0 [ 1162.875543] should_fail.cold+0xa/0x1b [ 1162.879466] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1162.884608] ? lock_downgrade+0x810/0x810 [ 1162.888796] __should_failslab+0x121/0x190 [ 1162.893061] should_failslab+0x9/0x14 [ 1162.897089] kmem_cache_alloc_trace+0x2cc/0x760 [ 1162.901792] ? kasan_unpoison_shadow+0x35/0x50 [ 1162.906409] ? kasan_kmalloc+0xce/0xf0 [ 1162.910345] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1162.915329] __list_lru_init+0x402/0x720 [ 1162.919430] sget_userns+0x84a/0xd30 [ 1162.923168] ? kill_litter_super+0x60/0x60 [ 1162.927439] ? ns_test_super+0x50/0x50 [ 1162.931362] ? ns_test_super+0x50/0x50 [ 1162.935282] ? kill_litter_super+0x60/0x60 [ 1162.939559] sget+0x10c/0x150 [ 1162.942701] mount_bdev+0xff/0x3c0 [ 1162.946268] ? finish_unfinished+0x1120/0x1120 [ 1162.950917] get_super_block+0x35/0x40 [ 1162.954850] mount_fs+0xa8/0x31f [ 1162.958265] vfs_kern_mount.part.0+0x6f/0x410 [ 1162.962822] do_mount+0x53e/0x2bc0 [ 1162.966407] ? copy_mount_string+0x40/0x40 [ 1162.970673] ? _copy_from_user+0xdd/0x150 [ 1162.974858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1162.980427] ? copy_mount_options+0x280/0x3a0 [ 1162.985003] ksys_mount+0xdb/0x150 [ 1162.988582] __x64_sys_mount+0xbe/0x150 [ 1162.992587] do_syscall_64+0xfd/0x620 [ 1162.996452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1163.001756] RIP: 0033:0x45c27a [ 1163.004982] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1163.023915] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.031660] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a 22:09:09 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1163.038950] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1163.046242] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1163.053535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1163.060828] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:09 executing program 3: mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:09 executing program 2 (fault-call:2 fault-nth:82): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:09 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40000, 0x0) sendto$x25(r0, &(0x7f00000001c0)="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", 0xfb, 0xa45eb5c609048f7, &(0x7f00000002c0)={0x9, @null=' \x00'}, 0x12) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x8, 0x101000) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x8) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100, 0x4001) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x15, 0xc, "220cf5ee1e538bffa13ba29cb0cce9fdf35f533616362dcf574ec496e30c742d312e37096bf1ae60a556d2003381155fe9151c717d0891fc1a837e2ac3cc92d7", "4342b73e86bf797caf859d00c3f32b8a26e946786af17fa245299e7b2a5340aa", [0x5, 0x40]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_GET_TSC(0x19, &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r1, 0x0, 0xfffffffffffffe3c, 0x0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @mcast1, 0xfffffffffffffffc}, 0x1c) 22:09:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0ffffffff, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1163.389987] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 1163.422263] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:09 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:09 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:09 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1163.602331] FAULT_INJECTION: forcing a failure. [ 1163.602331] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.626807] CPU: 1 PID: 6068 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1163.633790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1163.643165] Call Trace: [ 1163.645786] dump_stack+0x172/0x1f0 [ 1163.649445] should_fail.cold+0xa/0x1b [ 1163.653405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1163.658535] ? lock_downgrade+0x810/0x810 [ 1163.662729] __should_failslab+0x121/0x190 [ 1163.666995] should_failslab+0x9/0x14 [ 1163.670825] kmem_cache_alloc_trace+0x2cc/0x760 [ 1163.675518] ? kasan_unpoison_shadow+0x35/0x50 [ 1163.680125] ? kasan_kmalloc+0xce/0xf0 [ 1163.684054] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1163.689015] __list_lru_init+0x402/0x720 [ 1163.693106] sget_userns+0x84a/0xd30 [ 1163.696839] ? kill_litter_super+0x60/0x60 [ 1163.701108] ? ns_test_super+0x50/0x50 [ 1163.705021] ? ns_test_super+0x50/0x50 [ 1163.708956] ? kill_litter_super+0x60/0x60 [ 1163.713222] sget+0x10c/0x150 [ 1163.716365] mount_bdev+0xff/0x3c0 [ 1163.719926] ? finish_unfinished+0x1120/0x1120 [ 1163.724535] get_super_block+0x35/0x40 [ 1163.728449] mount_fs+0xa8/0x31f [ 1163.731862] vfs_kern_mount.part.0+0x6f/0x410 [ 1163.736383] do_mount+0x53e/0x2bc0 [ 1163.739952] ? copy_mount_string+0x40/0x40 [ 1163.744226] ? _copy_from_user+0xdd/0x150 [ 1163.748397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1163.753972] ? copy_mount_options+0x280/0x3a0 [ 1163.758526] ksys_mount+0xdb/0x150 [ 1163.762183] __x64_sys_mount+0xbe/0x150 [ 1163.766217] do_syscall_64+0xfd/0x620 [ 1163.770080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1163.775295] RIP: 0033:0x45c27a [ 1163.778513] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 22:09:09 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) [ 1163.797441] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.805192] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1163.812499] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1163.819797] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1163.830235] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1163.837708] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:09 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) [ 1163.918376] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:10 executing program 2 (fault-call:2 fault-nth:83): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:10 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:10 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1164.070810] FAULT_INJECTION: forcing a failure. [ 1164.070810] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.093513] CPU: 1 PID: 6092 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1164.100495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.109870] Call Trace: [ 1164.112499] dump_stack+0x172/0x1f0 [ 1164.116167] should_fail.cold+0xa/0x1b 22:09:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1164.120096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1164.125229] ? lock_downgrade+0x810/0x810 [ 1164.129406] __should_failslab+0x121/0x190 [ 1164.133666] should_failslab+0x9/0x14 [ 1164.137505] kmem_cache_alloc_trace+0x2cc/0x760 [ 1164.142202] ? kasan_unpoison_shadow+0x35/0x50 [ 1164.146808] ? kasan_kmalloc+0xce/0xf0 [ 1164.150736] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1164.155709] __list_lru_init+0x402/0x720 [ 1164.159808] sget_userns+0x84a/0xd30 [ 1164.163551] ? kill_litter_super+0x60/0x60 [ 1164.168189] ? ns_test_super+0x50/0x50 [ 1164.172110] ? ns_test_super+0x50/0x50 [ 1164.176031] ? kill_litter_super+0x60/0x60 [ 1164.180298] sget+0x10c/0x150 [ 1164.183435] mount_bdev+0xff/0x3c0 [ 1164.187033] ? finish_unfinished+0x1120/0x1120 [ 1164.191731] get_super_block+0x35/0x40 [ 1164.195658] mount_fs+0xa8/0x31f [ 1164.199065] vfs_kern_mount.part.0+0x6f/0x410 [ 1164.203602] do_mount+0x53e/0x2bc0 [ 1164.207173] ? copy_mount_string+0x40/0x40 [ 1164.211450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.217019] ? copy_mount_options+0x280/0x3a0 [ 1164.221548] ksys_mount+0xdb/0x150 [ 1164.225117] __x64_sys_mount+0xbe/0x150 [ 1164.229124] do_syscall_64+0xfd/0x620 [ 1164.232955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1164.238166] RIP: 0033:0x45c27a [ 1164.241374] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1164.260559] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1164.268300] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1164.275602] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1164.282902] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1164.290200] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1164.297504] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC, @ANYRESHEX=r0, @ANYRES64=r0, @ANYRESHEX=0x0, @ANYRESDEC=r0], @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYBLOB="e573514d79c0d3928184d257bf72a1a813adb288880f3677e91e63a7f4c04eb08f043c3c370f43258bf3c92a6e9e56e5e694ba4fb508af9a757fb77a69ca43b4224f9c59fa99a2467462c3d8c720970360608e91b34152ee917ccfd1bba9eb999d36c610b1a08f736968c9e91cb657154ebb1a6f8f8f73ba"], @ANYRES64]], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) timer_create(0x3, &(0x7f0000000040)={0x0, 0x31, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_delete(r2) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:10 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:10 executing program 2 (fault-call:2 fault-nth:84): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1164.423842] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1164.436227] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:10 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:10 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@default, @default, @default, 0x4, 0x40, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1164.619933] FAULT_INJECTION: forcing a failure. [ 1164.619933] name failslab, interval 1, probability 0, space 0, times 0 [ 1164.683511] CPU: 0 PID: 6115 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1164.690493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.690501] Call Trace: [ 1164.690530] dump_stack+0x172/0x1f0 [ 1164.690553] should_fail.cold+0xa/0x1b [ 1164.710247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1164.715478] ? lock_downgrade+0x810/0x810 [ 1164.719668] __should_failslab+0x121/0x190 [ 1164.724033] should_failslab+0x9/0x14 [ 1164.727851] kmem_cache_alloc_trace+0x2cc/0x760 [ 1164.732551] ? kasan_unpoison_shadow+0x35/0x50 [ 1164.737192] ? kasan_kmalloc+0xce/0xf0 [ 1164.741115] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1164.746142] __list_lru_init+0x402/0x720 [ 1164.750512] sget_userns+0x84a/0xd30 [ 1164.754270] ? kill_litter_super+0x60/0x60 [ 1164.758537] ? ns_test_super+0x50/0x50 [ 1164.762463] ? ns_test_super+0x50/0x50 [ 1164.766380] ? kill_litter_super+0x60/0x60 [ 1164.770644] sget+0x10c/0x150 [ 1164.773781] mount_bdev+0xff/0x3c0 [ 1164.777347] ? finish_unfinished+0x1120/0x1120 [ 1164.782079] get_super_block+0x35/0x40 [ 1164.786012] mount_fs+0xa8/0x31f [ 1164.789407] vfs_kern_mount.part.0+0x6f/0x410 [ 1164.794013] do_mount+0x53e/0x2bc0 [ 1164.797578] ? copy_mount_string+0x40/0x40 [ 1164.801837] ? _copy_from_user+0xdd/0x150 [ 1164.806015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.812623] ? copy_mount_options+0x280/0x3a0 [ 1164.818018] ksys_mount+0xdb/0x150 [ 1164.821592] __x64_sys_mount+0xbe/0x150 [ 1164.825603] do_syscall_64+0xfd/0x620 22:09:10 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000040)='udf\x00', 0xc102, 0x0) [ 1164.829439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1164.834659] RIP: 0033:0x45c27a [ 1164.837881] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1164.857107] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1164.864984] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1164.872311] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:09:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0c00000022a30c42ee54cbb8001009a64a695fee00"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1164.879641] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1164.887985] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1164.895310] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:10 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:11 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:11 executing program 2 (fault-call:2 fault-nth:85): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1165.016719] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:11 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000040)='udf\x00', 0xc102, 0x0) 22:09:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1165.130674] FAULT_INJECTION: forcing a failure. [ 1165.130674] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.142993] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1165.177272] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1165.183732] CPU: 0 PID: 6149 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1165.193909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.203288] Call Trace: [ 1165.205902] dump_stack+0x172/0x1f0 [ 1165.209545] should_fail.cold+0xa/0x1b [ 1165.213450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1165.218576] ? lock_downgrade+0x810/0x810 [ 1165.222754] __should_failslab+0x121/0x190 [ 1165.227033] should_failslab+0x9/0x14 [ 1165.230863] kmem_cache_alloc_trace+0x2cc/0x760 [ 1165.235559] ? kasan_unpoison_shadow+0x35/0x50 [ 1165.240168] ? kasan_kmalloc+0xce/0xf0 [ 1165.244079] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1165.249020] __list_lru_init+0x402/0x720 [ 1165.253095] sget_userns+0x84a/0xd30 [ 1165.256818] ? kill_litter_super+0x60/0x60 [ 1165.261074] ? ns_test_super+0x50/0x50 [ 1165.264986] ? ns_test_super+0x50/0x50 [ 1165.268891] ? kill_litter_super+0x60/0x60 [ 1165.273149] sget+0x10c/0x150 [ 1165.276282] mount_bdev+0xff/0x3c0 [ 1165.279838] ? finish_unfinished+0x1120/0x1120 [ 1165.284447] get_super_block+0x35/0x40 [ 1165.288350] mount_fs+0xa8/0x31f [ 1165.291738] vfs_kern_mount.part.0+0x6f/0x410 [ 1165.296263] do_mount+0x53e/0x2bc0 [ 1165.299817] ? copy_mount_string+0x40/0x40 [ 1165.304059] ? _copy_from_user+0xdd/0x150 [ 1165.308213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.313762] ? copy_mount_options+0x280/0x3a0 [ 1165.318265] ksys_mount+0xdb/0x150 [ 1165.321817] __x64_sys_mount+0xbe/0x150 [ 1165.325799] do_syscall_64+0xfd/0x620 [ 1165.329610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.334818] RIP: 0033:0x45c27a [ 1165.338105] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1165.357040] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1165.364774] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a 22:09:11 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0xc102, 0x0) [ 1165.372073] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1165.379346] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1165.386627] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1165.393906] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:11 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:11 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:11 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0xc102, 0x0) 22:09:11 executing program 2 (fault-call:2 fault-nth:86): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1165.614629] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1165.740136] FAULT_INJECTION: forcing a failure. [ 1165.740136] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.753586] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue [ 1165.768433] CPU: 1 PID: 6173 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1165.775425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.784806] Call Trace: [ 1165.787427] dump_stack+0x172/0x1f0 [ 1165.791090] should_fail.cold+0xa/0x1b [ 1165.795017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1165.800145] ? lock_downgrade+0x810/0x810 [ 1165.804338] __should_failslab+0x121/0x190 [ 1165.808604] should_failslab+0x9/0x14 [ 1165.812428] kmem_cache_alloc_trace+0x2cc/0x760 [ 1165.817121] ? kasan_unpoison_shadow+0x35/0x50 [ 1165.821718] ? kasan_kmalloc+0xce/0xf0 [ 1165.821743] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1165.821767] __list_lru_init+0x402/0x720 [ 1165.821790] sget_userns+0x84a/0xd30 [ 1165.821809] ? kill_litter_super+0x60/0x60 [ 1165.836356] ? ns_test_super+0x50/0x50 [ 1165.836375] ? ns_test_super+0x50/0x50 [ 1165.836390] ? kill_litter_super+0x60/0x60 [ 1165.836409] sget+0x10c/0x150 [ 1165.863558] mount_bdev+0xff/0x3c0 [ 1165.867127] ? finish_unfinished+0x1120/0x1120 [ 1165.871925] get_super_block+0x35/0x40 [ 1165.875844] mount_fs+0xa8/0x31f [ 1165.879249] vfs_kern_mount.part.0+0x6f/0x410 [ 1165.883778] do_mount+0x53e/0x2bc0 [ 1165.887361] ? copy_mount_string+0x40/0x40 [ 1165.891632] ? copy_mount_options+0x203/0x3a0 [ 1165.896246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.901905] ? copy_mount_options+0x280/0x3a0 [ 1165.906444] ksys_mount+0xdb/0x150 [ 1165.910022] __x64_sys_mount+0xbe/0x150 [ 1165.914031] do_syscall_64+0xfd/0x620 [ 1165.919392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.924605] RIP: 0033:0x45c27a 22:09:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0xda7a, 0x2442) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="62000000d3cd5e945e2ed8a196edd0847f145a67afc48beac4ab9e4304f1b09824b01c86168bba2c3d43da70d926df828296d90912ece9e25e7e10fa81896d24dab53e364a32fcde08805acada6139b7868e2bac000271ae73c40300000021eaada1be0257fa"], &(0x7f0000000000)=0x6a) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r4, 0x15}, &(0x7f0000000180)=0x8) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x102, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r6 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x90000) ioctl$LOOP_SET_FD(r6, 0x4c00, r3) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000200)={r4, 0x3176, 0x1ff, 0x1, 0x6, 0xff}, 0x14) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000380), 0x4) 22:09:12 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x0f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:12 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0xc102, 0x0) [ 1165.927820] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1165.946743] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1165.954577] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1165.961872] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1165.969168] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1165.976466] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1165.983763] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:12 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) 22:09:12 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:12 executing program 2 (fault-call:2 fault-nth:87): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1166.266239] print_req_error: 38 callbacks suppressed [ 1166.266249] print_req_error: I/O error, dev loop3, sector 64 [ 1166.268206] FAULT_INJECTION: forcing a failure. [ 1166.268206] name failslab, interval 1, probability 0, space 0, times 0 [ 1166.289866] CPU: 1 PID: 6196 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1166.297029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.297035] Call Trace: [ 1166.297063] dump_stack+0x172/0x1f0 [ 1166.297083] should_fail.cold+0xa/0x1b [ 1166.297103] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1166.309141] ? lock_downgrade+0x810/0x810 [ 1166.309168] __should_failslab+0x121/0x190 [ 1166.309186] should_failslab+0x9/0x14 [ 1166.309201] kmem_cache_alloc_trace+0x2cc/0x760 [ 1166.309218] ? kasan_unpoison_shadow+0x35/0x50 [ 1166.309233] ? kasan_kmalloc+0xce/0xf0 [ 1166.309257] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1166.316799] __list_lru_init+0x402/0x720 [ 1166.316823] sget_userns+0x84a/0xd30 [ 1166.316839] ? kill_litter_super+0x60/0x60 [ 1166.316859] ? ns_test_super+0x50/0x50 [ 1166.326131] ? ns_test_super+0x50/0x50 [ 1166.326147] ? kill_litter_super+0x60/0x60 [ 1166.326161] sget+0x10c/0x150 [ 1166.326182] mount_bdev+0xff/0x3c0 [ 1166.326202] ? finish_unfinished+0x1120/0x1120 [ 1166.334261] get_super_block+0x35/0x40 [ 1166.334284] mount_fs+0xa8/0x31f [ 1166.334307] vfs_kern_mount.part.0+0x6f/0x410 [ 1166.334328] do_mount+0x53e/0x2bc0 [ 1166.339941] print_req_error: I/O error, dev loop3, sector 256 [ 1166.344184] ? retint_kernel+0x2d/0x2d 22:09:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1166.344209] ? copy_mount_string+0x40/0x40 [ 1166.344232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.344252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.348495] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1166.353201] ? copy_mount_options+0x280/0x3a0 [ 1166.353222] ksys_mount+0xdb/0x150 [ 1166.353242] __x64_sys_mount+0xbe/0x150 [ 1166.353262] do_syscall_64+0xfd/0x620 [ 1166.353285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.357851] print_req_error: I/O error, dev loop3, sector 512 [ 1166.362158] RIP: 0033:0x45c27a [ 1166.362175] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1166.362181] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1166.362196] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1166.362204] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:09:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1166.362211] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1166.362219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1166.362227] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1166.406936] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1166.417217] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1166.426130] UDF-fs: Scanning with blocksize 512 failed [ 1166.445928] print_req_error: I/O error, dev loop3, sector 64 22:09:12 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1166.748866] print_req_error: I/O error, dev loop3, sector 512 [ 1166.755385] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1166.769997] print_req_error: I/O error, dev loop3, sector 1024 [ 1166.782746] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1166.803505] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x6}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x1, 0x70, 0xcb, 0xfff, 0x19a, 0x0, 0x0, 0x100, 0x1000, 0x8, 0x3a, 0x0, 0x5, 0x8, 0x7f, 0xffffffffffffffe1, 0x8, 0x97, 0x9, 0x4, 0x1, 0x4, 0x0, 0x100000000, 0x7, 0x3, 0x100, 0x6, 0x0, 0x867d, 0xfffffffffffffffa, 0x0, 0x9, 0x5, 0x20, 0x8, 0x1, 0x4, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x10000, 0x7ff, 0x2, 0x3, 0x9, 0x3, 0x8}) socket$key(0xf, 0x3, 0x2) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$char_usb(r4, &(0x7f0000000200)=""/197, 0xc5) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000200)={0xa}) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0xfffffffffffffd3e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000180)={0xa, 0x4e20, 0x1, @mcast1}, 0x1c) 22:09:12 executing program 2 (fault-call:2 fault-nth:88): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1166.854084] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1166.888791] UDF-fs: Scanning with blocksize 1024 failed [ 1166.895310] print_req_error: I/O error, dev loop3, sector 64 [ 1166.969666] print_req_error: I/O error, dev loop3, sector 1024 [ 1166.976999] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1166.999144] print_req_error: I/O error, dev loop3, sector 2048 [ 1167.005257] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 22:09:13 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1167.015347] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1167.038390] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1167.045558] UDF-fs: Scanning with blocksize 2048 failed [ 1167.057395] print_req_error: I/O error, dev loop3, sector 64 22:09:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1167.079952] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1167.092910] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1167.104023] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1167.104460] FAULT_INJECTION: forcing a failure. [ 1167.104460] name failslab, interval 1, probability 0, space 0, times 0 [ 1167.111486] UDF-fs: Scanning with blocksize 4096 failed [ 1167.137270] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) [ 1167.153338] CPU: 0 PID: 6220 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1167.160335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.169794] Call Trace: [ 1167.172518] dump_stack+0x172/0x1f0 [ 1167.176202] should_fail.cold+0xa/0x1b [ 1167.180133] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1167.185276] ? lock_downgrade+0x810/0x810 [ 1167.189475] __should_failslab+0x121/0x190 [ 1167.193770] should_failslab+0x9/0x14 [ 1167.197615] kmem_cache_alloc_trace+0x2cc/0x760 [ 1167.202329] ? kasan_unpoison_shadow+0x35/0x50 [ 1167.206978] ? kasan_kmalloc+0xce/0xf0 [ 1167.210937] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1167.216196] __list_lru_init+0x402/0x720 [ 1167.220620] sget_userns+0x84a/0xd30 [ 1167.224732] ? kill_litter_super+0x60/0x60 [ 1167.229450] ? ns_test_super+0x50/0x50 [ 1167.233548] ? ns_test_super+0x50/0x50 [ 1167.233562] ? kill_litter_super+0x60/0x60 [ 1167.233577] sget+0x10c/0x150 [ 1167.233613] mount_bdev+0xff/0x3c0 [ 1167.249222] ? finish_unfinished+0x1120/0x1120 [ 1167.253882] get_super_block+0x35/0x40 [ 1167.258263] mount_fs+0xa8/0x31f [ 1167.261946] vfs_kern_mount.part.0+0x6f/0x410 [ 1167.267440] do_mount+0x53e/0x2bc0 [ 1167.271156] ? copy_mount_string+0x40/0x40 [ 1167.275697] ? copy_mount_options+0x1d9/0x3a0 [ 1167.280255] ? copy_mount_options+0x1d9/0x3a0 [ 1167.284798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.290942] ? copy_mount_options+0x280/0x3a0 [ 1167.295586] ksys_mount+0xdb/0x150 [ 1167.299305] __x64_sys_mount+0xbe/0x150 [ 1167.303585] do_syscall_64+0xfd/0x620 [ 1167.308300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1167.313872] RIP: 0033:0x45c27a [ 1167.317335] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1167.336808] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1167.344924] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1167.352912] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1167.360413] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1167.368022] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1167.375767] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1167.383319] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:13 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) [ 1167.490062] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:13 executing program 2 (fault-call:2 fault-nth:89): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1167.600355] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1167.609540] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1167.625167] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 22:09:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1167.653585] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1167.678842] UDF-fs: Scanning with blocksize 512 failed [ 1167.696647] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1167.720847] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1167.725670] FAULT_INJECTION: forcing a failure. [ 1167.725670] name failslab, interval 1, probability 0, space 0, times 0 [ 1167.745123] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 22:09:13 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1167.754797] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1167.767013] UDF-fs: Scanning with blocksize 1024 failed [ 1167.781699] CPU: 1 PID: 6239 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1167.789230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1167.810137] Call Trace: [ 1167.813445] dump_stack+0x172/0x1f0 [ 1167.817705] should_fail.cold+0xa/0x1b [ 1167.822706] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1167.828600] ? lock_downgrade+0x810/0x810 [ 1167.834129] __should_failslab+0x121/0x190 [ 1167.839264] should_failslab+0x9/0x14 [ 1167.843679] kmem_cache_alloc_trace+0x2cc/0x760 [ 1167.849392] ? kasan_unpoison_shadow+0x35/0x50 [ 1167.854733] ? kasan_kmalloc+0xce/0xf0 [ 1167.861122] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1167.866840] __list_lru_init+0x402/0x720 [ 1167.873092] sget_userns+0x84a/0xd30 [ 1167.877475] ? kill_litter_super+0x60/0x60 [ 1167.882218] ? ns_test_super+0x50/0x50 [ 1167.886671] ? ns_test_super+0x50/0x50 [ 1167.891312] ? kill_litter_super+0x60/0x60 [ 1167.897049] sget+0x10c/0x150 [ 1167.902359] mount_bdev+0xff/0x3c0 [ 1167.906636] ? finish_unfinished+0x1120/0x1120 [ 1167.912788] get_super_block+0x35/0x40 [ 1167.919161] mount_fs+0xa8/0x31f [ 1167.923482] vfs_kern_mount.part.0+0x6f/0x410 [ 1167.928631] do_mount+0x53e/0x2bc0 [ 1167.934398] ? retint_kernel+0x2d/0x2d [ 1167.938706] ? copy_mount_string+0x40/0x40 [ 1167.943737] ? copy_mount_options+0x1d9/0x3a0 [ 1167.949127] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 1167.955195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1167.962225] ? copy_mount_options+0x280/0x3a0 [ 1167.967569] ksys_mount+0xdb/0x150 [ 1167.971660] __x64_sys_mount+0xbe/0x150 [ 1167.976134] do_syscall_64+0xfd/0x620 [ 1167.980255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1167.986703] RIP: 0033:0x45c27a [ 1167.990406] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1168.014329] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1168.023748] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1168.032613] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1168.043568] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1168.051887] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1168.061492] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$unix(r1, &(0x7f00000000c0)="8d3516308c0b76ee00ec2ba325f252efdafa84de4cf1f20da3edbdb6760a24682666841b387fe6d2c67250e003ce861dd97b975279d4f816bd50a536409cc92443e3176ea2f1839eef1d9553aa4054592769c87c0f45f3c4a6542f07dd9ae7c3b3d7b902ec00500ac1885611b0dbf2d8ee14aa6512d4c2e4e38e8f0fa667f1341dd6b71404dbce8e84b4230c0261efef50c50ce293337e1dd387fdd8638599d8953c43c56b54072f6beb1cff0ca9c4e9061175f60c0668918b4101fc9b6d9a04994243671d82e8eba17154807a6c5b0d5a6cf9590f2d1151ffce812372ca718da7dce26d", 0xe4, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1168.170040] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1168.201071] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 22:09:14 executing program 2 (fault-call:2 fault-nth:90): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:14 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1168.279589] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1168.318592] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 22:09:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYRES32], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$rxrpc(r1, &(0x7f00000000c0)="af53326bcca032b12d4521d9af7b795e9756b4fe742268e2b746ea324bce9c702dd02bd099f9c0b63c4ced1caa443bfadae7e72e3e941efc4c5daa36a3b8511a891c1712519111a4d4976fd15d6d68d26762cf1be127ad3814520e7f48a444aa0099bf4bd6209c74c693fa8339b8de82d9cb5d73ff06f859afa0d44d4cd537d51b9026d12ec4db0f317a06f09cce566d0f53408fb000d43e6b21783ccb7b4cb8d0768f839ef5194d44a7aeca0df8d36401394ec5a1ca81e4cabebd5e8c2f8d1c763fad557f482909", 0xc8, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1168.334347] UDF-fs: Scanning with blocksize 2048 failed [ 1168.399069] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1168.447225] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1168.468030] FAULT_INJECTION: forcing a failure. [ 1168.468030] name failslab, interval 1, probability 0, space 0, times 0 [ 1168.483293] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1168.502117] CPU: 1 PID: 6270 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1168.510508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1168.520879] Call Trace: [ 1168.523626] dump_stack+0x172/0x1f0 [ 1168.528103] should_fail.cold+0xa/0x1b [ 1168.532656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1168.538587] ? lock_downgrade+0x810/0x810 [ 1168.543248] __should_failslab+0x121/0x190 [ 1168.548061] should_failslab+0x9/0x14 [ 1168.552958] kmem_cache_alloc_trace+0x2cc/0x760 [ 1168.558814] ? kasan_unpoison_shadow+0x35/0x50 [ 1168.563975] ? kasan_kmalloc+0xce/0xf0 [ 1168.567921] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1168.573426] __list_lru_init+0x402/0x720 [ 1168.573447] sget_userns+0x84a/0xd30 [ 1168.573468] ? kill_litter_super+0x60/0x60 [ 1168.573486] ? ns_test_super+0x50/0x50 [ 1168.573505] ? ns_test_super+0x50/0x50 [ 1168.596504] ? kill_litter_super+0x60/0x60 [ 1168.601307] sget+0x10c/0x150 [ 1168.605895] mount_bdev+0xff/0x3c0 [ 1168.610272] ? finish_unfinished+0x1120/0x1120 [ 1168.615573] get_super_block+0x35/0x40 [ 1168.620020] mount_fs+0xa8/0x31f [ 1168.623986] vfs_kern_mount.part.0+0x6f/0x410 [ 1168.629071] do_mount+0x53e/0x2bc0 [ 1168.633283] ? copy_mount_string+0x40/0x40 [ 1168.638385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.645088] ? copy_mount_options+0x280/0x3a0 [ 1168.650379] ksys_mount+0xdb/0x150 [ 1168.654607] __x64_sys_mount+0xbe/0x150 [ 1168.658991] do_syscall_64+0xfd/0x620 [ 1168.663304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1168.668680] RIP: 0033:0x45c27a [ 1168.672007] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1168.693318] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:09:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c2af293bd000000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1168.701459] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1168.709942] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1168.717810] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1168.726148] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1168.734512] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:14 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1168.752114] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1168.775103] UDF-fs: Scanning with blocksize 4096 failed [ 1168.793261] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) 22:09:14 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) 22:09:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:14 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1168.902538] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x4) getsockname$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x0) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000140)) clock_settime(0x4, &(0x7f00000000c0)={r2, r3+10000000}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000080)=0x400000000002124, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:15 executing program 2 (fault-call:2 fault-nth:91): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1168.962837] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1169.114975] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1169.136647] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1169.149258] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1169.150188] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1169.157562] UDF-fs: Scanning with blocksize 512 failed [ 1169.175368] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1169.201560] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 22:09:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000002ac0)=[{{&(0x7f00000000c0)=@nl, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000000)=""/36, 0x24}, {&(0x7f0000000140)=""/177, 0xb1}, {&(0x7f0000000200)=""/212, 0xd4}, {&(0x7f0000000340)=""/101, 0x65}, {&(0x7f00000003c0)=""/138, 0x8a}, {&(0x7f0000000480)=""/81, 0x51}, {&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)=""/89, 0x59}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x9, &(0x7f0000001680)=""/241, 0xf1}, 0x81}, {{&(0x7f0000001780)=@isdn, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001800)=""/245, 0xf5}, {&(0x7f0000001900)=""/34, 0x22}, {&(0x7f0000001940)=""/100, 0x64}], 0x3}, 0xff}, {{&(0x7f0000001a00)=@rc, 0x80, &(0x7f0000002a80)=[{&(0x7f0000001a80)=""/4096, 0x1000}], 0x1}, 0x2}], 0x3, 0x44000102, 0x0) creat(&(0x7f0000002b80)='./file0\x00', 0x2e) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="413931d6ffd2d331"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1169.214644] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1169.233699] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1169.247679] UDF-fs: Scanning with blocksize 1024 failed [ 1169.259307] FAULT_INJECTION: forcing a failure. 22:09:15 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1169.259307] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.285809] CPU: 0 PID: 6297 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1169.293528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.303570] Call Trace: [ 1169.303603] dump_stack+0x172/0x1f0 [ 1169.303629] should_fail.cold+0xa/0x1b [ 1169.311358] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1169.311373] ? lock_downgrade+0x810/0x810 [ 1169.311395] __should_failslab+0x121/0x190 [ 1169.311411] should_failslab+0x9/0x14 [ 1169.311423] kmem_cache_alloc_trace+0x2cc/0x760 [ 1169.311436] ? kasan_unpoison_shadow+0x35/0x50 [ 1169.311460] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1169.311480] __list_lru_init+0x402/0x720 [ 1169.311502] sget_userns+0x84a/0xd30 [ 1169.350694] ? kill_litter_super+0x60/0x60 [ 1169.361460] ? ns_test_super+0x50/0x50 [ 1169.361476] ? ns_test_super+0x50/0x50 [ 1169.361488] ? kill_litter_super+0x60/0x60 [ 1169.361502] sget+0x10c/0x150 [ 1169.361521] mount_bdev+0xff/0x3c0 [ 1169.361533] ? finish_unfinished+0x1120/0x1120 [ 1169.361549] get_super_block+0x35/0x40 [ 1169.361568] mount_fs+0xa8/0x31f [ 1169.410896] vfs_kern_mount.part.0+0x6f/0x410 [ 1169.416276] do_mount+0x53e/0x2bc0 [ 1169.421459] ? copy_mount_string+0x40/0x40 [ 1169.426577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1169.433720] ? copy_mount_options+0x280/0x3a0 [ 1169.438817] ksys_mount+0xdb/0x150 [ 1169.442916] __x64_sys_mount+0xbe/0x150 [ 1169.447424] do_syscall_64+0xfd/0x620 [ 1169.451939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1169.457770] RIP: 0033:0x45c27a [ 1169.462038] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1169.483707] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1169.493022] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1169.500880] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:09:15 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfsk', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1169.509962] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1169.517815] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1169.527433] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x5deabd68d97d0a24, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000000c0)=0x3) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000002c0)={0x34, 0x0, &(0x7f0000000280)}) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="a4a414146f3cddf2e7f21ea5d4f3"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x8, 0xa04}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="ab000000800876888be1f59cdf72107921e2c91006318473c9388d27cb0d93a5cfd8df5a4bef0c959489f705fcc6ea081670877662750389637d808f90a6b2913693dd2ec3d5a684c312030f63f7ccbe994918ec2832e6e34f9d681144d2a6df348ddaef7624f15ac4aa39a29007468ea8eb22822b76e455ee32117b72c5f5bb649f39db1ce55dda185bdfaa93828fad4c52dfb1fef44f2e4efff97c49e11b58be3b9ea5cdd2d5d17c6f25b8db252b"], &(0x7f0000000240)=0xb3) [ 1169.649424] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1169.676942] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1169.698012] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found [ 1169.707807] UDF-fs: Scanning with blocksize 2048 failed [ 1169.782375] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=256, location=256 [ 1169.802920] UDF-fs: error (device loop3): udf_read_tagged: read failed, block=512, location=512 [ 1169.819616] UDF-fs: warning (device loop3): udf_load_vrs: No anchor found 22:09:15 executing program 2 (fault-call:2 fault-nth:92): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1169.868512] UDF-fs: Scanning with blocksize 4096 failed [ 1169.875360] UDF-fs: warning (device loop3): udf_fill_super: No partition found (1) 22:09:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1169.958086] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xafff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x9) arch_prctl$ARCH_SET_GS(0x1001, 0x3) 22:09:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c0001e41f11933a"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:16 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1170.087890] FAULT_INJECTION: forcing a failure. [ 1170.087890] name failslab, interval 1, probability 0, space 0, times 0 22:09:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xafff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f00000005c0)={0xffffffffffffffff}}, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$tipc2(0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3ff}}, 0x18) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x8000) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x3) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x4000082) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x30f) 22:09:16 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1170.138867] CPU: 1 PID: 6329 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1170.147280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1170.157754] Call Trace: [ 1170.160575] dump_stack+0x172/0x1f0 [ 1170.164556] should_fail.cold+0xa/0x1b [ 1170.168765] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1170.175229] ? lock_downgrade+0x810/0x810 [ 1170.179883] __should_failslab+0x121/0x190 [ 1170.185139] should_failslab+0x9/0x14 [ 1170.189817] kmem_cache_alloc_trace+0x2cc/0x760 [ 1170.194723] ? kasan_unpoison_shadow+0x35/0x50 [ 1170.200343] ? kasan_kmalloc+0xce/0xf0 [ 1170.204744] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1170.211246] __list_lru_init+0x402/0x720 [ 1170.216754] sget_userns+0x84a/0xd30 [ 1170.220704] ? kill_litter_super+0x60/0x60 [ 1170.225807] ? ns_test_super+0x50/0x50 [ 1170.230281] ? ns_test_super+0x50/0x50 [ 1170.235711] ? kill_litter_super+0x60/0x60 [ 1170.240435] sget+0x10c/0x150 [ 1170.244786] mount_bdev+0xff/0x3c0 [ 1170.248554] ? finish_unfinished+0x1120/0x1120 [ 1170.253374] get_super_block+0x35/0x40 [ 1170.258942] mount_fs+0xa8/0x31f [ 1170.263636] vfs_kern_mount.part.0+0x6f/0x410 [ 1170.268751] do_mount+0x53e/0x2bc0 [ 1170.273607] ? copy_mount_string+0x40/0x40 [ 1170.279301] ? _copy_from_user+0xdd/0x150 [ 1170.284761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.290989] ? copy_mount_options+0x280/0x3a0 [ 1170.296921] ksys_mount+0xdb/0x150 [ 1170.301925] __x64_sys_mount+0xbe/0x150 [ 1170.307870] do_syscall_64+0xfd/0x620 [ 1170.313903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1170.320147] RIP: 0033:0x45c27a [ 1170.324097] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1170.347257] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1170.355797] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1170.363881] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1170.372558] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1170.380383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1170.388670] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:16 executing program 2 (fault-call:2 fault-nth:93): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1170.507338] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1170.567878] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1170.604789] FAULT_INJECTION: forcing a failure. [ 1170.604789] name failslab, interval 1, probability 0, space 0, times 0 [ 1170.628918] CPU: 0 PID: 6352 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1170.638053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1170.649811] Call Trace: [ 1170.652543] dump_stack+0x172/0x1f0 [ 1170.656781] should_fail.cold+0xa/0x1b [ 1170.660997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1170.661012] ? lock_downgrade+0x810/0x810 [ 1170.661038] __should_failslab+0x121/0x190 [ 1170.661057] should_failslab+0x9/0x14 [ 1170.661079] kmem_cache_alloc_trace+0x2cc/0x760 [ 1170.687806] ? kasan_unpoison_shadow+0x35/0x50 [ 1170.693441] ? kasan_kmalloc+0xce/0xf0 [ 1170.693468] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1170.693491] __list_lru_init+0x402/0x720 [ 1170.693516] sget_userns+0x84a/0xd30 [ 1170.693537] ? kill_litter_super+0x60/0x60 22:09:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:16 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1170.712320] ? ns_test_super+0x50/0x50 [ 1170.712339] ? ns_test_super+0x50/0x50 [ 1170.712353] ? kill_litter_super+0x60/0x60 [ 1170.712369] sget+0x10c/0x150 [ 1170.712391] mount_bdev+0xff/0x3c0 [ 1170.712411] ? finish_unfinished+0x1120/0x1120 [ 1170.739071] get_super_block+0x35/0x40 [ 1170.739093] mount_fs+0xa8/0x31f [ 1170.739114] vfs_kern_mount.part.0+0x6f/0x410 [ 1170.739132] do_mount+0x53e/0x2bc0 [ 1170.739154] ? copy_mount_string+0x40/0x40 [ 1170.739180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.739194] ? copy_mount_options+0x280/0x3a0 [ 1170.739216] ksys_mount+0xdb/0x150 [ 1170.739236] __x64_sys_mount+0xbe/0x150 [ 1170.739258] do_syscall_64+0xfd/0x620 [ 1170.739279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1170.739291] RIP: 0033:0x45c27a [ 1170.739307] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1170.739316] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1170.739331] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1170.739341] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1170.739351] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1170.739359] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1170.739368] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000), &(0x7f0000000080)=0xffffffffffffff28) 22:09:17 executing program 2 (fault-call:2 fault-nth:94): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1170.978981] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:17 executing program 3: 22:09:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2200000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:17 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1171.129595] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1171.151392] FAULT_INJECTION: forcing a failure. [ 1171.151392] name failslab, interval 1, probability 0, space 0, times 0 [ 1171.188768] CPU: 0 PID: 6377 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1171.196730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1171.207558] Call Trace: [ 1171.210387] dump_stack+0x172/0x1f0 [ 1171.214707] should_fail.cold+0xa/0x1b [ 1171.218841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1171.224397] ? lock_downgrade+0x810/0x810 [ 1171.228973] __should_failslab+0x121/0x190 [ 1171.233836] should_failslab+0x9/0x14 [ 1171.238807] kmem_cache_alloc_trace+0x2cc/0x760 [ 1171.245129] ? kasan_unpoison_shadow+0x35/0x50 [ 1171.250623] ? kasan_kmalloc+0xce/0xf0 [ 1171.254831] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1171.261583] __list_lru_init+0x402/0x720 [ 1171.266111] sget_userns+0x84a/0xd30 [ 1171.270330] ? kill_litter_super+0x60/0x60 [ 1171.277415] ? ns_test_super+0x50/0x50 [ 1171.283744] ? ns_test_super+0x50/0x50 [ 1171.290036] ? kill_litter_super+0x60/0x60 [ 1171.295369] sget+0x10c/0x150 [ 1171.299046] mount_bdev+0xff/0x3c0 [ 1171.303223] ? finish_unfinished+0x1120/0x1120 [ 1171.308702] get_super_block+0x35/0x40 [ 1171.313205] mount_fs+0xa8/0x31f [ 1171.317514] vfs_kern_mount.part.0+0x6f/0x410 [ 1171.323459] do_mount+0x53e/0x2bc0 [ 1171.327760] ? copy_mount_string+0x40/0x40 [ 1171.332960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.340580] ? copy_mount_options+0x280/0x3a0 [ 1171.345543] ksys_mount+0xdb/0x150 [ 1171.349584] __x64_sys_mount+0xbe/0x150 [ 1171.354843] do_syscall_64+0xfd/0x620 [ 1171.359750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1171.365582] RIP: 0033:0x45c27a 22:09:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c00000000100000ba50234feb3a06524ca01e174cc01e69ec2921b7cfc32f1eccb3b8262290990500d3ac881cde37f29750a474c6430d446a58d95f1a4eef40470b39c781327a6b80c4314b952f3f6dbf649a539ce044ff"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:17 executing program 3: [ 1171.369258] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1171.390376] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1171.402640] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1171.412514] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1171.421072] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1171.430254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1171.440108] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:17 executing program 3: 22:09:17 executing program 2 (fault-call:2 fault-nth:95): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:17 executing program 3: 22:09:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00004140898800"], 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:17 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1171.660711] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 22:09:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2901000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:17 executing program 3: [ 1171.784265] FAULT_INJECTION: forcing a failure. [ 1171.784265] name failslab, interval 1, probability 0, space 0, times 0 [ 1171.819406] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1171.833134] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1171.844875] CPU: 0 PID: 6400 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1171.853705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1171.863819] Call Trace: [ 1171.863854] dump_stack+0x172/0x1f0 [ 1171.870335] should_fail.cold+0xa/0x1b [ 1171.874378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1171.879816] ? lock_downgrade+0x810/0x810 22:09:17 executing program 3: [ 1171.884886] __should_failslab+0x121/0x190 [ 1171.890363] should_failslab+0x9/0x14 [ 1171.894660] kmem_cache_alloc_trace+0x2cc/0x760 [ 1171.899558] ? reacquire_held_locks+0xb7/0x3e0 [ 1171.904852] ? sget_userns+0x208/0xd30 [ 1171.908887] reiserfs_fill_super+0xfe/0x2eb0 [ 1171.913622] ? finish_unfinished+0x1120/0x1120 [ 1171.920050] ? up_write+0x1c/0x150 [ 1171.924016] ? snprintf+0xbb/0xf0 [ 1171.928151] ? vsprintf+0x40/0x40 [ 1171.931986] ? wait_for_completion+0x440/0x440 [ 1171.936985] ? ns_test_super+0x50/0x50 [ 1171.941196] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1171.947295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.953357] mount_bdev+0x304/0x3c0 [ 1171.957550] ? finish_unfinished+0x1120/0x1120 [ 1171.962918] get_super_block+0x35/0x40 [ 1171.967076] mount_fs+0xa8/0x31f [ 1171.971052] vfs_kern_mount.part.0+0x6f/0x410 [ 1171.975983] do_mount+0x53e/0x2bc0 [ 1171.980032] ? copy_mount_string+0x40/0x40 [ 1171.986118] ? _copy_from_user+0xdd/0x150 [ 1171.991394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.998371] ? copy_mount_options+0x280/0x3a0 [ 1172.004041] ksys_mount+0xdb/0x150 [ 1172.007896] __x64_sys_mount+0xbe/0x150 [ 1172.012423] do_syscall_64+0xfd/0x620 [ 1172.016573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1172.023349] RIP: 0033:0x45c27a [ 1172.026688] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1172.048627] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1172.057091] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1172.065287] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1172.073434] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1172.082283] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1172.090892] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:18 executing program 3: 22:09:18 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2c00000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:18 executing program 3: 22:09:18 executing program 2 (fault-call:2 fault-nth:96): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1172.315294] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:18 executing program 3: 22:09:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1172.460017] FAULT_INJECTION: forcing a failure. [ 1172.460017] name failslab, interval 1, probability 0, space 0, times 0 [ 1172.475930] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1172.512574] CPU: 0 PID: 6428 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1172.521572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.534413] Call Trace: [ 1172.537242] dump_stack+0x172/0x1f0 [ 1172.542309] should_fail.cold+0xa/0x1b [ 1172.546792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1172.552385] ? lock_downgrade+0x810/0x810 [ 1172.557034] __should_failslab+0x121/0x190 [ 1172.561584] should_failslab+0x9/0x14 [ 1172.565699] kmem_cache_alloc_trace+0x2cc/0x760 [ 1172.570850] ? kasan_unpoison_shadow+0x35/0x50 [ 1172.576212] ? kasan_kmalloc+0xce/0xf0 [ 1172.580906] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1172.586933] __list_lru_init+0x402/0x720 [ 1172.591327] sget_userns+0x84a/0xd30 [ 1172.595804] ? kill_litter_super+0x60/0x60 [ 1172.600389] ? ns_test_super+0x50/0x50 [ 1172.604627] ? ns_test_super+0x50/0x50 [ 1172.608690] ? kill_litter_super+0x60/0x60 [ 1172.613054] sget+0x10c/0x150 [ 1172.616646] mount_bdev+0xff/0x3c0 [ 1172.620403] ? finish_unfinished+0x1120/0x1120 [ 1172.625157] get_super_block+0x35/0x40 [ 1172.629187] mount_fs+0xa8/0x31f [ 1172.632693] vfs_kern_mount.part.0+0x6f/0x410 [ 1172.637506] do_mount+0x53e/0x2bc0 [ 1172.641369] ? copy_mount_string+0x40/0x40 [ 1172.646655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1172.652352] ? copy_mount_options+0x280/0x3a0 [ 1172.657731] ksys_mount+0xdb/0x150 [ 1172.661320] __x64_sys_mount+0xbe/0x150 [ 1172.665469] do_syscall_64+0xfd/0x620 [ 1172.669477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1172.674730] RIP: 0033:0x45c27a [ 1172.678135] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1172.698371] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:09:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00200100300000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:18 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:18 executing program 3: [ 1172.706567] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1172.714236] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1172.721722] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1172.729029] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1172.736847] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:18 executing program 3: 22:09:18 executing program 2 (fault-call:2 fault-nth:97): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1172.903819] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1172.931941] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 22:09:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:19 executing program 3: 22:09:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) write(r1, &(0x7f0000000140)="3b52ef38530f12c92ada3a1115f7d598b1c1d6d942f85a18c1c2c4a49e8f74b26341dd9d044fe8b05bfaf7ec159e96eb9c82ed5101a217057e64caee776bf07553ef2eeee52c9bb7c5f93e85ae6ecac6088be53162f33690b57e9abf5fe6cd5360ea89e3646d5b63b48980f71f79817c49ece5f1fb1ec1cffbda622e6b20138d7a3cb325094ddc7105741a4366ee886d6275ba86af476c78d2cd7be61be742fa7bf5143e55e1f1d141c652aba71b3c9f62d8277b19eda3340f103ffb35de6fd060a0653b4315ac68466b67ed1731ee367d12b5d2cb9cb7ca3843a5b8d8d9103a2a2cb1a681df0df77882a07d24d3c397", 0xf0) r4 = ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000240)=0x0) r6 = getpgid(0xffffffffffffffff) kcmp(r5, r6, 0x0, r3, r4) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x52d, 0x5, 0x10000, 0x7}]}) 22:09:19 executing program 3: [ 1173.085351] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 [ 1173.139095] FAULT_INJECTION: forcing a failure. [ 1173.139095] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.178801] CPU: 0 PID: 6457 Comm: syz-executor.2 Not tainted 4.19.66 #40 22:09:19 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:19 executing program 3: [ 1173.186111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.195798] Call Trace: [ 1173.198615] dump_stack+0x172/0x1f0 [ 1173.202405] should_fail.cold+0xa/0x1b [ 1173.206749] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1173.212429] ? lock_downgrade+0x810/0x810 [ 1173.216743] __should_failslab+0x121/0x190 [ 1173.221046] should_failslab+0x9/0x14 [ 1173.224893] kmem_cache_alloc_trace+0x2cc/0x760 [ 1173.230191] ? reacquire_held_locks+0xb7/0x3e0 [ 1173.234818] ? sget_userns+0x208/0xd30 [ 1173.238844] reiserfs_fill_super+0xfe/0x2eb0 [ 1173.243712] ? finish_unfinished+0x1120/0x1120 [ 1173.248526] ? up_write+0x1c/0x150 [ 1173.252299] ? snprintf+0xbb/0xf0 [ 1173.256432] ? vsprintf+0x40/0x40 [ 1173.260280] ? wait_for_completion+0x440/0x440 [ 1173.265049] ? ns_test_super+0x50/0x50 [ 1173.269044] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1173.274205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.280157] mount_bdev+0x304/0x3c0 [ 1173.284104] ? finish_unfinished+0x1120/0x1120 [ 1173.289645] get_super_block+0x35/0x40 [ 1173.293774] mount_fs+0xa8/0x31f [ 1173.297678] vfs_kern_mount.part.0+0x6f/0x410 [ 1173.303027] do_mount+0x53e/0x2bc0 [ 1173.306657] ? copy_mount_string+0x40/0x40 [ 1173.311966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.317800] ? copy_mount_options+0x280/0x3a0 [ 1173.322354] ksys_mount+0xdb/0x150 [ 1173.326368] __x64_sys_mount+0xbe/0x150 [ 1173.330385] do_syscall_64+0xfd/0x620 [ 1173.331238] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1173.334229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.334244] RIP: 0033:0x45c27a [ 1173.334260] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1173.334269] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1173.334285] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a 22:09:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f00000000c0)=""/182) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5200000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) 22:09:19 executing program 3: [ 1173.334302] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1173.379976] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1173.379985] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1173.379992] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1173.503180] Unknown ioctl -2147199696 22:09:19 executing program 2 (fault-call:2 fault-nth:98): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:19 executing program 3: [ 1173.566903] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1173.586939] Unknown ioctl -2147199696 22:09:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xc00, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 22:09:19 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:19 executing program 3: [ 1173.716572] FAULT_INJECTION: forcing a failure. [ 1173.716572] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.746137] CPU: 1 PID: 6487 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1173.753157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.762760] Call Trace: [ 1173.765406] dump_stack+0x172/0x1f0 [ 1173.769086] should_fail.cold+0xa/0x1b [ 1173.773070] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1173.778218] ? lock_downgrade+0x810/0x810 [ 1173.782727] __should_failslab+0x121/0x190 [ 1173.787036] should_failslab+0x9/0x14 [ 1173.790908] kmem_cache_alloc_trace+0x2cc/0x760 [ 1173.795634] ? __lockdep_init_map+0x10c/0x5b0 [ 1173.800188] ? cancel_delayed_work+0x2d0/0x2d0 [ 1173.805258] __kthread_create_on_node+0xf2/0x460 [ 1173.810244] ? __kthread_parkme+0x1b0/0x1b0 [ 1173.814635] ? __lock_is_held+0xb6/0x140 [ 1173.819167] ? cancel_delayed_work+0x2d0/0x2d0 [ 1173.824170] kthread_create_on_node+0xbb/0xf0 [ 1173.828727] ? __kthread_create_on_node+0x460/0x460 [ 1173.834109] ? kmem_cache_alloc_node_trace+0x34f/0x720 [ 1173.839891] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1173.844793] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1173.850285] init_rescuer.part.0+0x7d/0x190 [ 1173.854930] __alloc_workqueue_key+0xb8e/0xee0 [ 1173.859736] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1173.865186] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 1173.870435] ? __lockdep_init_map+0x10c/0x5b0 [ 1173.874980] ? __lockdep_init_map+0x10c/0x5b0 [ 1173.880026] ? debug_mutex_init+0x2d/0x60 [ 1173.884225] reiserfs_fill_super+0x377/0x2eb0 [ 1173.888853] ? finish_unfinished+0x1120/0x1120 [ 1173.893485] ? up_write+0x1c/0x150 [ 1173.897155] ? snprintf+0xbb/0xf0 [ 1173.900818] ? vsprintf+0x40/0x40 [ 1173.905205] ? wait_for_completion+0x440/0x440 [ 1173.910083] ? ns_test_super+0x50/0x50 [ 1173.914308] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1173.921036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.927030] mount_bdev+0x304/0x3c0 [ 1173.930800] ? finish_unfinished+0x1120/0x1120 [ 1173.935532] get_super_block+0x35/0x40 [ 1173.939656] mount_fs+0xa8/0x31f [ 1173.943738] vfs_kern_mount.part.0+0x6f/0x410 [ 1173.948473] do_mount+0x53e/0x2bc0 [ 1173.952249] ? copy_mount_string+0x40/0x40 [ 1173.956643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.962537] ? copy_mount_options+0x280/0x3a0 [ 1173.967231] ksys_mount+0xdb/0x150 [ 1173.970825] __x64_sys_mount+0xbe/0x150 [ 1173.975043] do_syscall_64+0xfd/0x620 [ 1173.978893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1173.984297] RIP: 0033:0x45c27a [ 1173.987662] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1174.006628] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:09:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="c10631de3c0600000c9696c97b4a3e9151007c9e25668278"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1174.014403] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1174.022635] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1174.030050] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1174.037557] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1174.045419] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 22:09:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f0000000440)={[{@utf8='utf8'}, {@nls={'nls', 0x3d, '\np852'}}]}) [ 1174.059411] REISERFS warning (device loop2): reiserfs_fill_super: Cannot allocate commit workqueue 22:09:20 executing program 3: 22:09:20 executing program 1: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:20 executing program 2 (fault-call:2 fault-nth:99): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) 22:09:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) [ 1174.268878] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 1174.310323] FAULT_INJECTION: forcing a failure. [ 1174.310323] name failslab, interval 1, probability 0, space 0, times 0 [ 1174.322791] CPU: 0 PID: 6509 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1174.330197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.340099] Call Trace: [ 1174.342825] dump_stack+0x172/0x1f0 [ 1174.346621] should_fail.cold+0xa/0x1b [ 1174.350633] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1174.355779] ? lock_downgrade+0x810/0x810 [ 1174.359989] __should_failslab+0x121/0x190 [ 1174.364447] should_failslab+0x9/0x14 [ 1174.368473] __kmalloc_track_caller+0x2de/0x750 [ 1174.373298] ? __lockdep_init_map+0x10c/0x5b0 [ 1174.378022] ? __lockdep_init_map+0x10c/0x5b0 [ 1174.382699] ? reiserfs_fill_super+0xb2b/0x2eb0 [ 1174.387945] kstrdup+0x3a/0x70 [ 1174.391193] reiserfs_fill_super+0xb2b/0x2eb0 [ 1174.396684] ? finish_unfinished+0x1120/0x1120 [ 1174.401932] ? up_write+0x1c/0x150 [ 1174.406053] ? snprintf+0xbb/0xf0 [ 1174.410559] ? vsprintf+0x40/0x40 [ 1174.414213] ? wait_for_completion+0x440/0x440 [ 1174.419329] ? ns_test_super+0x50/0x50 [ 1174.424127] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1174.429324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.434963] mount_bdev+0x304/0x3c0 [ 1174.438627] ? finish_unfinished+0x1120/0x1120 [ 1174.443341] get_super_block+0x35/0x40 [ 1174.447274] mount_fs+0xa8/0x31f [ 1174.450832] vfs_kern_mount.part.0+0x6f/0x410 [ 1174.456189] do_mount+0x53e/0x2bc0 [ 1174.459774] ? copy_mount_string+0x40/0x40 [ 1174.464078] ? _copy_from_user+0xdd/0x150 [ 1174.468633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.474463] ? copy_mount_options+0x280/0x3a0 [ 1174.479519] ksys_mount+0xdb/0x150 [ 1174.483141] __x64_sys_mount+0xbe/0x150 [ 1174.487291] do_syscall_64+0xfd/0x620 [ 1174.491553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1174.498195] RIP: 0033:0x45c27a [ 1174.501724] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1174.521173] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1174.529818] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1174.538698] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 [ 1174.546944] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 22:09:20 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100000"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xb5c3, 0x422000) write$P9_RVERSION(r2, &(0x7f00000000c0)={0x13, 0x65, 0xffff, 0xdc, 0x6, '9P2000'}, 0x13) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1174.554521] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1174.561939] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1174.592159] REISERFS warning (device loop2): reiserfs_fill_super: Cannot allocate memory for journal device name [ 1174.606191] ------------[ cut here ]------------ [ 1174.611179] kernel BUG at fs/reiserfs/lock.c:44! [ 1174.618251] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1174.623839] CPU: 0 PID: 6509 Comm: syz-executor.2 Not tainted 4.19.66 #40 [ 1174.630792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.641966] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 1174.648795] Code: 5d c3 e8 b8 60 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 a4 c4 10 05 e8 9f 60 89 ff 5b 41 5c 5d c3 e8 95 60 89 ff <0f> 0b e8 8e f3 bf ff eb a1 e8 a7 f3 bf ff e9 33 ff ff ff e8 9d f3 [ 1174.668595] RSP: 0018:ffff88805db07a88 EFLAGS: 00010246 [ 1174.674521] RAX: 0000000000040000 RBX: ffff8880a3952940 RCX: ffffc9000a2b1000 [ 1174.682096] RDX: 0000000000040000 RSI: ffffffff81e1fe9b RDI: ffff8880a39529e8 [ 1174.690150] RBP: ffff88805db07a98 R08: 0000000000000065 R09: ffffed1015d05079 [ 1174.697719] R10: ffffed1015d05078 R11: ffff8880ae8283c7 R12: 00000000ffffffea [ 1174.705211] R13: ffff88805fb74040 R14: ffff88805db07c38 R15: ffff8880a3952940 [ 1174.712695] FS: 00007f1a1c642700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1174.720988] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1174.726927] CR2: 00007fe8e5d12988 CR3: 0000000097ea8000 CR4: 00000000001406f0 [ 1174.734514] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1174.742437] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1174.749768] Call Trace: [ 1174.752661] reiserfs_fill_super+0x2b51/0x2eb0 [ 1174.757415] ? finish_unfinished+0x1120/0x1120 [ 1174.762169] ? up_write+0x1c/0x150 [ 1174.765745] ? snprintf+0xbb/0xf0 [ 1174.769311] ? vsprintf+0x40/0x40 [ 1174.772896] ? wait_for_completion+0x440/0x440 [ 1174.778209] ? ns_test_super+0x50/0x50 [ 1174.782553] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1174.787606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.802029] mount_bdev+0x304/0x3c0 [ 1174.805782] ? finish_unfinished+0x1120/0x1120 [ 1174.812278] get_super_block+0x35/0x40 [ 1174.816456] mount_fs+0xa8/0x31f [ 1174.819946] vfs_kern_mount.part.0+0x6f/0x410 [ 1174.824581] do_mount+0x53e/0x2bc0 [ 1174.828163] ? copy_mount_string+0x40/0x40 [ 1174.832436] ? _copy_from_user+0xdd/0x150 [ 1174.836710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.842414] ? copy_mount_options+0x280/0x3a0 [ 1174.846981] ksys_mount+0xdb/0x150 [ 1174.850564] __x64_sys_mount+0xbe/0x150 [ 1174.855191] do_syscall_64+0xfd/0x620 [ 1174.859820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1174.865822] RIP: 0033:0x45c27a [ 1174.869041] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1174.888318] RSP: 002b:00007f1a1c641a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1174.896246] RAX: ffffffffffffffda RBX: 00007f1a1c641b40 RCX: 000000000045c27a [ 1174.903820] RDX: 00007f1a1c641ae0 RSI: 0000000020000140 RDI: 00007f1a1c641b00 22:09:20 executing program 0: syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsold='jqfmt=vfsold'}, {@jdev={'jdev', 0x3d, './bus'}, 0x7}]}) [ 1174.911302] RBP: 0000000000000000 R08: 00007f1a1c641b40 R09: 00007f1a1c641ae0 [ 1174.919198] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000006 [ 1174.926584] R13: 00000000004c8a8d R14: 00000000004df970 R15: 0000000000000005 [ 1174.933988] Modules linked in: [ 1174.941548] ---[ end trace ed5e6dc60bd3dc3c ]--- [ 1174.941762] kobject: 'loop4' (000000009da5634f): kobject_uevent_env [ 1174.947460] RIP: 0010:reiserfs_write_unlock+0xeb/0x110 [ 1174.961157] Code: 5d c3 e8 b8 60 89 ff 48 8d 7b 28 48 c7 83 a8 00 00 00 00 00 00 00 e8 a4 c4 10 05 e8 9f 60 89 ff 5b 41 5c 5d c3 e8 95 60 89 ff <0f> 0b e8 8e f3 bf ff eb a1 e8 a7 f3 bf ff e9 33 ff ff ff e8 9d f3 [ 1174.966256] kobject: 'loop4' (000000009da5634f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1174.981713] RSP: 0018:ffff88805db07a88 EFLAGS: 00010246 [ 1174.997585] RAX: 0000000000040000 RBX: ffff8880a3952940 RCX: ffffc9000a2b1000 [ 1175.006873] RDX: 0000000000040000 RSI: ffffffff81e1fe9b RDI: ffff8880a39529e8 [ 1175.014590] RBP: ffff88805db07a98 R08: 0000000000000065 R09: ffffed1015d05079 [ 1175.023012] R10: ffffed1015d05078 R11: ffff8880ae8283c7 R12: 00000000ffffffea [ 1175.031758] R13: ffff88805fb74040 R14: ffff88805db07c38 R15: ffff8880a3952940 [ 1175.042476] FS: 00007f1a1c642700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1175.042614] kobject: 'loop1' (0000000018908242): kobject_uevent_env [ 1175.051439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1175.065451] kobject: 'loop1' (0000000018908242): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1175.069312] kobject: 'loop3' (000000006a092731): kobject_uevent_env [ 1175.083618] CR2: 0000000000960004 CR3: 0000000097ea8000 CR4: 00000000001406f0 [ 1175.093368] kobject: 'loop3' (000000006a092731): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1175.104880] kobject: 'loop5' (00000000f198c43f): kobject_uevent_env 22:09:21 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0x374, 0x1f, 0x50, 0x4d}, 0xfffffd90) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f0000511000/0x4000)=nil, 0x4000, 0x8) [ 1175.111431] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1175.119197] kobject: 'loop5' (00000000f198c43f): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1175.121020] kobject: 'loop4' (000000009da5634f): kobject_uevent_env [ 1175.139999] kobject: 'loop1' (0000000018908242): kobject_uevent_env [ 1175.147281] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 22:09:21 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="0c00000000100008"], 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x400000000002127, 0x4) recvmmsg(r0, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/68, 0x44}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2}, 0x3}, {{&(0x7f0000000140)=@l2, 0x80, &(0x7f0000003540)=[{&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000000200)=""/174, 0xae}, {&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/178, 0xb2}, {&(0x7f0000002400)=""/48, 0x30}, {&(0x7f0000002440)=""/4, 0x4}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/44, 0x2c}, {&(0x7f00000034c0)=""/65, 0x41}], 0xa}}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000003600)=""/151, 0x97}, {&(0x7f00000036c0)=""/141, 0x8d}, {&(0x7f0000003780)=""/61, 0x3d}, {&(0x7f00000037c0)=""/35, 0x23}, {&(0x7f0000003800)=""/253, 0xfd}], 0x5, &(0x7f0000003980)=""/182, 0xb6}, 0x7fffffff}, {{&(0x7f0000003a40)=@ipx, 0x80, &(0x7f0000004d40)=[{&(0x7f0000003ac0)=""/166, 0xa6}, {&(0x7f0000003b80)=""/122, 0x7a}, {&(0x7f0000003c00)=""/112, 0x70}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000004c80)=""/190, 0xbe}], 0x5, &(0x7f0000004dc0)=""/162, 0xa2}, 0xd2}], 0x4, 0x122, &(0x7f0000004f80)={0x0, 0x989680}) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 1175.148528] kobject: 'loop4' (000000009da5634f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1175.154921] kobject: 'loop1' (0000000018908242): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1175.177227] Kernel panic - not syncing: Fatal exception [ 1175.184571] Kernel Offset: disabled [ 1175.188658] Rebooting in 86400 seconds..