(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3c000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x5, 0x0, 0x5c, "8811e78754a539d39c2bd2a41ea8c8aa024d86cdc834bc92000025fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:21 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:21 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140)=0x3, 0x4) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r2 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x1f}, &(0x7f00000000c0)=0x30) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0x2}, &(0x7f0000000200)=0x8) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 658.150327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8035], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 658.201607] FAT-fs (loop1): bogus number of reserved sectors [ 658.207675] FAT-fs (loop1): Can't find a valid FAT filesystem [ 658.296410] FAULT_INJECTION: forcing a failure. [ 658.296410] name failslab, interval 1, probability 0, space 0, times 0 [ 658.307866] CPU: 1 PID: 11189 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 658.316804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.326171] Call Trace: [ 658.328774] dump_stack+0x1b9/0x294 [ 658.332419] ? dump_stack_print_info.cold.2+0x52/0x52 [ 658.337641] should_fail.cold.4+0xa/0x1a [ 658.341727] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 658.346845] ? save_stack+0x43/0xd0 [ 658.350481] ? kmem_cache_alloc_trace+0x152/0x780 [ 658.355333] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 658.360529] ? __list_lru_init+0x456/0x790 [ 658.364773] ? sget_userns+0x73a/0xf00 [ 658.368672] ? graph_lock+0x170/0x170 [ 658.372484] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 658.377249] ? do_mount+0x564/0x3070 [ 658.380972] ? ksys_mount+0x12d/0x140 [ 658.384778] ? __x64_sys_mount+0xbe/0x150 [ 658.388938] ? do_syscall_64+0x1b1/0x800 [ 658.393011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.398390] ? find_held_lock+0x36/0x1c0 [ 658.402472] ? __lock_is_held+0xb5/0x140 [ 658.406574] ? check_same_owner+0x320/0x320 [ 658.410918] ? rcu_note_context_switch+0x710/0x710 [ 658.415872] __should_failslab+0x124/0x180 [ 658.420126] should_failslab+0x9/0x14 [ 658.423938] kmem_cache_alloc_trace+0x2cb/0x780 [ 658.428626] ? __kmalloc_node+0x33/0x70 [ 658.432610] ? __kmalloc_node+0x33/0x70 [ 658.436602] ? rcu_read_lock_sched_held+0x108/0x120 [ 658.441646] __memcg_init_list_lru_node+0x17d/0x2c0 [ 658.446682] ? kvfree_rcu+0x20/0x20 [ 658.450323] ? __kmalloc_node+0x47/0x70 [ 658.454319] __list_lru_init+0x456/0x790 [ 658.458399] ? list_lru_destroy+0x4c0/0x4c0 [ 658.462736] ? mark_held_locks+0xc9/0x160 [ 658.466900] ? __raw_spin_lock_init+0x1c/0x100 [ 658.471495] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 658.476523] ? __lockdep_init_map+0x105/0x590 [ 658.481034] ? lockdep_init_map+0x9/0x10 [ 658.485111] sget_userns+0x73a/0xf00 [ 658.488831] ? get_anon_bdev+0x2f0/0x2f0 [ 658.492918] ? destroy_unused_super.part.11+0x110/0x110 [ 658.498292] ? __alloc_pages_nodemask+0xacf/0xd70 [ 658.503160] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 658.508197] ? kasan_check_read+0x11/0x20 [ 658.512362] ? cap_capable+0x1f9/0x260 [ 658.516275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.521819] ? security_capable+0x99/0xc0 [ 658.525984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.531530] ? ns_capable_common+0x13f/0x170 [ 658.535960] ? get_anon_bdev+0x2f0/0x2f0 [ 658.540032] sget+0x10b/0x150 [ 658.543156] ? fuse_get_root_inode+0x190/0x190 [ 658.547750] mount_nodev+0x33/0x110 [ 658.551393] fuse_mount+0x2c/0x40 [ 658.554862] mount_fs+0xae/0x328 [ 658.558252] vfs_kern_mount.part.34+0xd4/0x4d0 [ 658.562848] ? may_umount+0xb0/0xb0 [ 658.566489] ? _raw_read_unlock+0x22/0x30 [ 658.570648] ? __get_fs_type+0x97/0xc0 [ 658.574575] do_mount+0x564/0x3070 [ 658.578138] ? copy_mount_string+0x40/0x40 [ 658.582382] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 658.587410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 658.592189] ? retint_kernel+0x10/0x10 [ 658.596104] ? copy_mount_options+0x1f0/0x380 [ 658.600612] ? copy_mount_options+0x202/0x380 [ 658.605118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.610664] ? copy_mount_options+0x285/0x380 [ 658.615180] ksys_mount+0x12d/0x140 [ 658.618826] __x64_sys_mount+0xbe/0x150 [ 658.622809] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 658.627842] do_syscall_64+0x1b1/0x800 [ 658.631739] ? finish_task_switch+0x1ca/0x840 [ 658.636250] ? syscall_return_slowpath+0x5c0/0x5c0 [ 658.641193] ? syscall_return_slowpath+0x30f/0x5c0 [ 658.646143] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 658.651530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 658.656404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.661601] RIP: 0033:0x455a09 [ 658.664798] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 658.672522] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 658.679799] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 658.687078] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 658.694352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 658.701630] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 658.709949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x80) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="c143f329b76879e7956d01", 0xb) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) finit_module(r0, &(0x7f00000000c0)='\\*GPLsecurity%ppp1*\\em0)\\security-wlan0\x00', 0x3) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) 2033/05/18 03:37:22 executing program 1 (fault-call:2 fault-nth:18): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:22 executing program 0: r0 = socket(0x8, 0x1, 0xdf3f) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, {0xa, 0x4e24, 0x2400000, @loopback={0x0, 0x1}, 0x20}, 0x594, [0x7f, 0x3, 0x1f, 0x9, 0x4, 0x1f, 0x4, 0x1ff]}, 0x5c) r1 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r2, 0x4, 0x3, [0x5, 0x1, 0x4]}, &(0x7f0000000280)=0xe) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000000000018000000000000000000000"], 0x1}, 0x1}, 0x0) [ 658.859527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:22 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) accept4$unix(r0, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x80800) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) pselect6(0x40, &(0x7f00000002c0)={0x5, 0x8, 0xd61b, 0x20, 0x2, 0x7, 0x7, 0x7}, &(0x7f0000000300)={0x509, 0x1, 0x100000001, 0x7, 0x0, 0x80, 0x401, 0x2f5}, &(0x7f0000000340)={0x0, 0x9, 0x1ff, 0x1, 0x1, 0x800000000, 0x9, 0x1000}, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="40abbe49017cc2290885164af6eb2d00d120a53e90a1f03f6cabbbb5f2605bc53b9a51aea456cc637a0e0e35b5afcefeba8a4b68a12f1460e18126682e073771d01633df190ee76b49c99a0144df29a7d53f09110e05c67c467bf19926a8c81c1296229899596628c0ca39e9997293bee71ca2b2e411780e5f4ec0dc226d4d5b7372e6e42fca5fde70b99789d8c2ee24e6eda67d91e461f5837dcaab1dc0dbf7358451d75e871c44d8bd3ac2d16ed975e2326404d6077864008c683a7e8e68da9ae1a6286896c9daba1b1f6a2cab138ccfcea75ca8aab486cb0165477a38ac3d3f45dc9e1e44dcfe68d4062b186a471cd5a96fed6d2dc5", 0xf7) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0xfffffffffffffeda) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x8480, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480), &(0x7f00000004c0)=0x8) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='com.apple.FinderInfo\x00') 2033/05/18 03:37:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:22 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x100) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="99af1903462d0ec8575b9489", 0xc) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x6c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 658.924987] FAT-fs (loop1): bogus number of reserved sectors [ 658.930900] FAT-fs (loop1): Can't find a valid FAT filesystem [ 658.995462] FAULT_INJECTION: forcing a failure. [ 658.995462] name failslab, interval 1, probability 0, space 0, times 0 [ 659.006782] CPU: 0 PID: 11241 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 659.014078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.023441] Call Trace: [ 659.026061] dump_stack+0x1b9/0x294 [ 659.029326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 659.029712] ? dump_stack_print_info.cold.2+0x52/0x52 2033/05/18 03:37:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 659.029752] should_fail.cold.4+0xa/0x1a [ 659.029775] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 659.054433] ? save_stack+0x43/0xd0 [ 659.058081] ? kmem_cache_alloc_trace+0x152/0x780 [ 659.062944] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 659.068155] ? __list_lru_init+0x456/0x790 [ 659.072414] ? sget_userns+0x73a/0xf00 [ 659.076333] ? graph_lock+0x170/0x170 [ 659.080149] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 659.084921] ? do_mount+0x564/0x3070 [ 659.088649] ? ksys_mount+0x12d/0x140 2033/05/18 03:37:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001aae7cf2bf9b44f3000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) [ 659.092467] ? __x64_sys_mount+0xbe/0x150 [ 659.096628] ? do_syscall_64+0x1b1/0x800 [ 659.100701] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.106090] ? find_held_lock+0x36/0x1c0 [ 659.110181] ? __lock_is_held+0xb5/0x140 [ 659.114286] ? check_same_owner+0x320/0x320 [ 659.118628] ? rcu_note_context_switch+0x710/0x710 [ 659.123582] __should_failslab+0x124/0x180 [ 659.127837] should_failslab+0x9/0x14 [ 659.131657] kmem_cache_alloc_trace+0x2cb/0x780 [ 659.136343] ? __kmalloc_node+0x33/0x70 [ 659.140334] ? __kmalloc_node+0x33/0x70 2033/05/18 03:37:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x2800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 659.144327] ? rcu_read_lock_sched_held+0x108/0x120 [ 659.149369] __memcg_init_list_lru_node+0x17d/0x2c0 [ 659.154398] ? kvfree_rcu+0x20/0x20 [ 659.158045] ? __kmalloc_node+0x47/0x70 [ 659.162053] __list_lru_init+0x456/0x790 [ 659.166138] ? list_lru_destroy+0x4c0/0x4c0 [ 659.170478] ? mark_held_locks+0xc9/0x160 [ 659.174649] ? __raw_spin_lock_init+0x1c/0x100 [ 659.179252] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 659.184288] ? __lockdep_init_map+0x105/0x590 [ 659.188806] ? lockdep_init_map+0x9/0x10 [ 659.192886] sget_userns+0x73a/0xf00 2033/05/18 03:37:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 659.196612] ? get_anon_bdev+0x2f0/0x2f0 [ 659.200700] ? destroy_unused_super.part.11+0x110/0x110 [ 659.206080] ? __alloc_pages_nodemask+0xacf/0xd70 [ 659.210952] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 659.215994] ? kasan_check_read+0x11/0x20 [ 659.220171] ? cap_capable+0x1f9/0x260 [ 659.224087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.225532] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 659.229632] ? security_capable+0x99/0xc0 2033/05/18 03:37:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 659.229660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.229679] ? ns_capable_common+0x13f/0x170 [ 659.229703] ? get_anon_bdev+0x2f0/0x2f0 [ 659.229720] sget+0x10b/0x150 [ 659.229742] ? fuse_get_root_inode+0x190/0x190 [ 659.265849] mount_nodev+0x33/0x110 [ 659.269500] fuse_mount+0x2c/0x40 [ 659.272972] mount_fs+0xae/0x328 [ 659.276387] vfs_kern_mount.part.34+0xd4/0x4d0 [ 659.280997] ? may_umount+0xb0/0xb0 [ 659.284647] ? _raw_read_unlock+0x22/0x30 [ 659.288805] ? __get_fs_type+0x97/0xc0 [ 659.292719] do_mount+0x564/0x3070 [ 659.296276] ? do_raw_spin_unlock+0x9e/0x2e0 [ 659.300706] ? copy_mount_string+0x40/0x40 [ 659.304960] ? rcu_pm_notify+0xc0/0xc0 [ 659.308877] ? copy_mount_options+0x5f/0x380 [ 659.313301] ? rcu_read_lock_sched_held+0x108/0x120 [ 659.318336] ? kmem_cache_alloc_trace+0x616/0x780 [ 659.323204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 659.328769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.334319] ? copy_mount_options+0x285/0x380 [ 659.338843] ksys_mount+0x12d/0x140 [ 659.342499] __x64_sys_mount+0xbe/0x150 [ 659.346485] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 659.351527] do_syscall_64+0x1b1/0x800 [ 659.355429] ? finish_task_switch+0x1ca/0x840 [ 659.359941] ? syscall_return_slowpath+0x5c0/0x5c0 [ 659.364888] ? syscall_return_slowpath+0x30f/0x5c0 [ 659.369937] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 659.375328] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 659.380199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.385400] RIP: 0033:0x455a09 [ 659.388602] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 659.396324] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 659.403601] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 659.410884] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 659.418165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 659.425442] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) exit(0xfd85) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[]}, 0x1}, 0x0) 2033/05/18 03:37:23 executing program 1 (fault-call:2 fault-nth:19): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:23 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup3(r1, r1, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) getsockname$ipx(r0, &(0x7f0000000140), &(0x7f0000000180)=0x10) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000100)={0xf2, 0x9, 0x4}) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46, 0x4000000000}, 0x0) 2033/05/18 03:37:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8864000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000140)=""/171) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 659.574308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 659.600963] FAT-fs (loop1): bogus number of reserved sectors [ 659.606938] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:23 executing program 6: r0 = semget(0x2, 0x2, 0x400) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f0000000180)=""/144) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80200, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140), 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) openat$cgroup_type(r1, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r3 = accept$alg(r2, 0x0, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0xb, &(0x7f0000000240), &(0x7f00000002c0)=0x4) sendmsg$alg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) accept$alg(r1, 0x0, 0x0) 2033/05/18 03:37:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800e], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 659.682860] FAULT_INJECTION: forcing a failure. [ 659.682860] name failslab, interval 1, probability 0, space 0, times 0 [ 659.694377] CPU: 0 PID: 11290 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 659.701666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.711028] Call Trace: [ 659.713639] dump_stack+0x1b9/0x294 [ 659.717298] ? dump_stack_print_info.cold.2+0x52/0x52 [ 659.722527] should_fail.cold.4+0xa/0x1a [ 659.726615] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:37:23 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 659.731744] ? save_stack+0x43/0xd0 [ 659.735389] ? kmem_cache_alloc_trace+0x152/0x780 [ 659.738826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 659.740242] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 659.740259] ? __list_lru_init+0x456/0x790 [ 659.740278] ? sget_userns+0x73a/0xf00 [ 659.740300] ? graph_lock+0x170/0x170 [ 659.740320] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 659.772484] ? do_mount+0x564/0x3070 [ 659.776214] ? ksys_mount+0x12d/0x140 2033/05/18 03:37:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 659.780026] ? __x64_sys_mount+0xbe/0x150 [ 659.784187] ? do_syscall_64+0x1b1/0x800 [ 659.788310] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.793714] ? find_held_lock+0x36/0x1c0 [ 659.797800] ? __lock_is_held+0xb5/0x140 [ 659.801903] ? check_same_owner+0x320/0x320 [ 659.806248] ? rcu_note_context_switch+0x710/0x710 [ 659.811205] __should_failslab+0x124/0x180 [ 659.815463] should_failslab+0x9/0x14 [ 659.819279] kmem_cache_alloc_trace+0x2cb/0x780 [ 659.823963] ? __kmalloc_node+0x33/0x70 [ 659.827960] ? __kmalloc_node+0x33/0x70 2033/05/18 03:37:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 659.831958] ? rcu_read_lock_sched_held+0x108/0x120 [ 659.837011] __memcg_init_list_lru_node+0x17d/0x2c0 [ 659.842052] ? kvfree_rcu+0x20/0x20 [ 659.845701] ? __kmalloc_node+0x47/0x70 [ 659.849704] __list_lru_init+0x456/0x790 [ 659.853792] ? list_lru_destroy+0x4c0/0x4c0 [ 659.858134] ? mark_held_locks+0xc9/0x160 [ 659.862306] ? __raw_spin_lock_init+0x1c/0x100 [ 659.867289] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 659.872327] ? __lockdep_init_map+0x105/0x590 [ 659.876805] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 659.876846] ? lockdep_init_map+0x9/0x10 [ 659.891210] sget_userns+0x73a/0xf00 [ 659.894937] ? get_anon_bdev+0x2f0/0x2f0 [ 659.899029] ? destroy_unused_super.part.11+0x110/0x110 [ 659.904415] ? __alloc_pages_nodemask+0xacf/0xd70 [ 659.909287] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 659.914327] ? kasan_check_read+0x11/0x20 [ 659.918501] ? cap_capable+0x1f9/0x260 [ 659.922417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.927975] ? security_capable+0x99/0xc0 [ 659.932145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.937693] ? ns_capable_common+0x13f/0x170 [ 659.942123] ? get_anon_bdev+0x2f0/0x2f0 [ 659.946207] sget+0x10b/0x150 [ 659.949341] ? fuse_get_root_inode+0x190/0x190 [ 659.953943] mount_nodev+0x33/0x110 [ 659.957598] fuse_mount+0x2c/0x40 [ 659.961074] mount_fs+0xae/0x328 [ 659.964471] vfs_kern_mount.part.34+0xd4/0x4d0 [ 659.969072] ? may_umount+0xb0/0xb0 [ 659.972717] ? _raw_read_unlock+0x22/0x30 [ 659.976876] ? __get_fs_type+0x97/0xc0 [ 659.980794] do_mount+0x564/0x3070 [ 659.984363] ? copy_mount_string+0x40/0x40 [ 659.988611] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 659.993643] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 659.998421] ? retint_kernel+0x10/0x10 [ 660.002341] ? copy_mount_options+0x1f0/0x380 [ 660.006852] ? copy_mount_options+0x200/0x380 [ 660.011365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.016913] ? copy_mount_options+0x285/0x380 [ 660.021432] ksys_mount+0x12d/0x140 [ 660.025077] __x64_sys_mount+0xbe/0x150 [ 660.029064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 660.034101] do_syscall_64+0x1b1/0x800 [ 660.038008] ? syscall_return_slowpath+0x5c0/0x5c0 [ 660.042960] ? syscall_return_slowpath+0x30f/0x5c0 [ 660.047911] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 660.053295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 660.058162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.063359] RIP: 0033:0x455a09 [ 660.066557] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 660.074281] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 660.081561] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 660.088837] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 660.096116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 660.103399] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:24 executing program 1 (fault-call:2 fault-nth:20): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101201, 0x0) write$rdma_cm(0xffffffffffffff9c, &(0x7f0000000780)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000740)={0xffffffff}, 0x2, 0x1000}}, 0x20) write$rdma_cm(r1, &(0x7f00000007c0)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3b8a, @mcast1={0xff, 0x1, [], 0x1}, 0xe1c2}, {0xa, 0x4e20, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x20}, r2}}, 0x48) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800e0000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x3, 0x0, 0x9, 0x5}, 0x8) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000240), 0xfffffff0) 2033/05/18 03:37:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) pselect6(0x40, &(0x7f0000000100)={0x1ff, 0x8, 0x6, 0x33, 0xffff, 0x53, 0xfffffffffffffbff, 0xff}, &(0x7f0000000140)={0x1, 0x7, 0x6, 0x813, 0x800, 0xfff, 0x3f, 0x10001}, &(0x7f0000000180)={0x38c, 0x8, 0x0, 0x20, 0xfffffffffffffffb, 0x200, 0x2, 0x1f}, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240)={&(0x7f0000000200)={0x7fff}, 0x8}) socket(0x9, 0x6, 0x10000) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:24 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3ff, 0x4, [0x4, 0x5, 0x1, 0xffffffff00000001]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0xff, 0xc000000000, 0x6}, &(0x7f0000000200)=0x10) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 660.594784] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 660.608951] FAT-fs (loop1): bogus number of reserved sectors [ 660.614894] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) r1 = socket(0x10, 0x3, 0x0) socketpair$inet6(0xa, 0x3, 0x5, &(0x7f0000000040)) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220000000000000000008eabe15230e042fc7a14cf92489a"], 0x1}, 0x1}, 0x0) [ 660.712505] FAULT_INJECTION: forcing a failure. [ 660.712505] name failslab, interval 1, probability 0, space 0, times 0 [ 660.723866] CPU: 0 PID: 11331 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 660.731153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.740605] Call Trace: [ 660.743215] dump_stack+0x1b9/0x294 [ 660.746868] ? dump_stack_print_info.cold.2+0x52/0x52 [ 660.752110] should_fail.cold.4+0xa/0x1a [ 660.756199] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 660.761329] ? save_stack+0x43/0xd0 [ 660.764974] ? kmem_cache_alloc_trace+0x152/0x780 [ 660.769831] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 660.775035] ? __list_lru_init+0x456/0x790 [ 660.779283] ? sget_userns+0x73a/0xf00 [ 660.783187] ? graph_lock+0x170/0x170 [ 660.787003] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 660.791777] ? do_mount+0x564/0x3070 [ 660.795504] ? ksys_mount+0x12d/0x140 [ 660.799323] ? __x64_sys_mount+0xbe/0x150 [ 660.803492] ? do_syscall_64+0x1b1/0x800 [ 660.807575] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.812965] ? find_held_lock+0x36/0x1c0 [ 660.817056] ? __lock_is_held+0xb5/0x140 [ 660.821168] ? check_same_owner+0x320/0x320 [ 660.825510] ? rcu_note_context_switch+0x710/0x710 [ 660.830461] __should_failslab+0x124/0x180 [ 660.834713] should_failslab+0x9/0x14 [ 660.838526] kmem_cache_alloc_trace+0x2cb/0x780 [ 660.843205] ? __kmalloc_node+0x33/0x70 [ 660.847192] ? __kmalloc_node+0x33/0x70 [ 660.851184] ? rcu_read_lock_sched_held+0x108/0x120 [ 660.856225] __memcg_init_list_lru_node+0x17d/0x2c0 [ 660.861289] ? kvfree_rcu+0x20/0x20 [ 660.864936] ? __kmalloc_node+0x47/0x70 [ 660.868946] __list_lru_init+0x456/0x790 [ 660.873035] ? list_lru_destroy+0x4c0/0x4c0 [ 660.877377] ? mark_held_locks+0xc9/0x160 [ 660.881550] ? __raw_spin_lock_init+0x1c/0x100 [ 660.886148] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 660.891178] ? __lockdep_init_map+0x105/0x590 [ 660.895695] ? lockdep_init_map+0x9/0x10 [ 660.899774] sget_userns+0x73a/0xf00 [ 660.903498] ? get_anon_bdev+0x2f0/0x2f0 [ 660.907587] ? destroy_unused_super.part.11+0x110/0x110 [ 660.912967] ? __alloc_pages_nodemask+0xacf/0xd70 [ 660.917831] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 660.922867] ? kasan_check_read+0x11/0x20 [ 660.927039] ? cap_capable+0x1f9/0x260 [ 660.930953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.936507] ? security_capable+0x99/0xc0 [ 660.940678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.946228] ? ns_capable_common+0x13f/0x170 [ 660.950655] ? get_anon_bdev+0x2f0/0x2f0 [ 660.954725] sget+0x10b/0x150 [ 660.957848] ? fuse_get_root_inode+0x190/0x190 [ 660.962446] mount_nodev+0x33/0x110 [ 660.966090] fuse_mount+0x2c/0x40 [ 660.969558] mount_fs+0xae/0x328 [ 660.972946] vfs_kern_mount.part.34+0xd4/0x4d0 [ 660.977543] ? may_umount+0xb0/0xb0 [ 660.981181] ? _raw_read_unlock+0x22/0x30 [ 660.985342] ? __get_fs_type+0x97/0xc0 [ 660.989252] do_mount+0x564/0x3070 [ 660.992802] ? do_raw_spin_unlock+0x9e/0x2e0 [ 660.997236] ? copy_mount_string+0x40/0x40 [ 661.001485] ? rcu_pm_notify+0xc0/0xc0 [ 661.005403] ? copy_mount_options+0x5f/0x380 [ 661.009820] ? rcu_read_lock_sched_held+0x108/0x120 [ 661.014851] ? kmem_cache_alloc_trace+0x616/0x780 [ 661.019711] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 661.025272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.030820] ? copy_mount_options+0x285/0x380 [ 661.035333] ksys_mount+0x12d/0x140 [ 661.038976] __x64_sys_mount+0xbe/0x150 [ 661.042959] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 661.047991] do_syscall_64+0x1b1/0x800 [ 661.051886] ? finish_task_switch+0x1ca/0x840 [ 661.056403] ? syscall_return_slowpath+0x5c0/0x5c0 [ 661.061348] ? syscall_return_slowpath+0x30f/0x5c0 [ 661.066296] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 661.071681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 661.076556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.081752] RIP: 0033:0x455a09 [ 661.084947] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 661.092843] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 661.100123] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 661.107400] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 2033/05/18 03:37:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:24 executing program 0: r0 = socket(0x17, 0x1, 0x0) ioctl(r0, 0x890f, &(0x7f0000000140)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0x2bc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRES64=r1], 0x1}, 0x1, 0x0, 0x0, 0x2}, 0x0) 2033/05/18 03:37:24 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 2033/05/18 03:37:24 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000000)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000fb00000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x78) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:24 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) fcntl$setown(r0, 0x8, r1) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:24 executing program 1 (fault-call:2 fault-nth:21): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 661.114676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 661.121953] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 661.202233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:25 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x381000) recvfrom$ax25(r1, &(0x7f0000000040)=""/95, 0x5f, 0x0, &(0x7f00000000c0)={0x3, {"1ff697ea2035b0"}, 0x1}, 0x10) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:25 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000cc0)={{0x5, 0x0, 0x6, 0x6, "1e0fbb6a0a56b2e74aec3932e6c4c38737238f0e188261bf3d1b8465877d49830b0eccf2e39596a0bac1944a", 0x3}, 0x6, [0x7fffffff, 0xd22, 0x8, 0x3, 0xe00000, 0xadd4, 0x4, 0x100, 0x6, 0x0, 0x8, 0x43, 0xfffffffffffffffb, 0x0, 0x8, 0x5, 0x400, 0x0, 0x8, 0x7, 0x4, 0x6, 0x0, 0xe24, 0x5, 0x5b0d, 0x7fffffff, 0xa1a, 0x9, 0x0, 0x100000000, 0x1f, 0x7fffffff, 0x80, 0x2, 0xfffffffffffeffff, 0x0, 0xfffffffffffffffe, 0x6, 0xffff, 0x6, 0x1, 0x100000000000, 0x6, 0x614, 0x2, 0x1, 0x4, 0xf8, 0x2, 0x0, 0x88c, 0xfff, 0x3, 0x80, 0x4, 0x4, 0x4, 0x1, 0x10000, 0x8, 0x4, 0x8, 0x5, 0x1, 0x5, 0xa2, 0x8, 0x4, 0x5, 0x9, 0x5, 0x7, 0x4, 0x7ff, 0x101, 0x4, 0x6, 0x100000000, 0x6, 0x5, 0x3ff, 0x0, 0x4, 0x800, 0x101, 0xfffffffffffffff9, 0x80000000, 0xa7, 0x2, 0x4, 0x7, 0xfffffffffffffff8, 0x3, 0x1f, 0x8000, 0x2, 0xffffffffffffffff, 0x9, 0x9, 0x0, 0x400, 0x3, 0x1, 0x7, 0x3, 0xffffffffffffffff, 0x1, 0x3, 0x100000000, 0x7fff, 0x908, 0x1, 0x4e64, 0x2, 0x1e9, 0xdc, 0x4, 0x3, 0x9, 0x4, 0x5, 0x5, 0x5, 0x92, 0x0, 0x4a1, 0x4]}) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'speck128\x00'}, 0x58) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f00000001c0)=0xcc, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10880, 0x0) getpriority(0x1, r2) [ 661.251108] FAT-fs (loop1): bogus number of reserved sectors [ 661.257107] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 661.301127] FAULT_INJECTION: forcing a failure. [ 661.301127] name failslab, interval 1, probability 0, space 0, times 0 [ 661.312465] CPU: 0 PID: 11372 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 661.319755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.329122] Call Trace: [ 661.331736] dump_stack+0x1b9/0x294 [ 661.335390] ? dump_stack_print_info.cold.2+0x52/0x52 [ 661.340623] should_fail.cold.4+0xa/0x1a [ 661.344715] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:37:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffdd86], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 661.349843] ? save_stack+0x43/0xd0 [ 661.353494] ? kmem_cache_alloc_trace+0x152/0x780 [ 661.358446] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 661.363658] ? __list_lru_init+0x456/0x790 [ 661.367915] ? sget_userns+0x73a/0xf00 [ 661.371828] ? graph_lock+0x170/0x170 [ 661.375651] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 661.380427] ? do_mount+0x564/0x3070 [ 661.384162] ? ksys_mount+0x12d/0x140 [ 661.387978] ? __x64_sys_mount+0xbe/0x150 [ 661.392150] ? do_syscall_64+0x1b1/0x800 [ 661.396231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 2033/05/18 03:37:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0xc3d0ca45ba0d6b3d) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/158) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x10000000, 0x0, 0x8, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 661.401622] ? find_held_lock+0x36/0x1c0 [ 661.402176] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 661.405706] ? __lock_is_held+0xb5/0x140 [ 661.405750] ? check_same_owner+0x320/0x320 [ 661.424462] ? rcu_note_context_switch+0x710/0x710 [ 661.429415] __should_failslab+0x124/0x180 [ 661.433670] should_failslab+0x9/0x14 [ 661.437483] kmem_cache_alloc_trace+0x2cb/0x780 [ 661.442165] ? __kmalloc_node+0x33/0x70 [ 661.446155] ? __kmalloc_node+0x33/0x70 2033/05/18 03:37:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x7400000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 661.450145] ? rcu_read_lock_sched_held+0x108/0x120 [ 661.455194] __memcg_init_list_lru_node+0x17d/0x2c0 [ 661.460234] ? kvfree_rcu+0x20/0x20 [ 661.463888] ? __kmalloc_node+0x47/0x70 [ 661.467897] __list_lru_init+0x456/0x790 [ 661.471996] ? list_lru_destroy+0x4c0/0x4c0 [ 661.476338] ? mark_held_locks+0xc9/0x160 [ 661.480507] ? __raw_spin_lock_init+0x1c/0x100 [ 661.485106] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 661.490139] ? __lockdep_init_map+0x105/0x590 [ 661.494654] ? lockdep_init_map+0x9/0x10 [ 661.498733] sget_userns+0x73a/0xf00 [ 661.502466] ? get_anon_bdev+0x2f0/0x2f0 [ 661.506562] ? destroy_unused_super.part.11+0x110/0x110 [ 661.511943] ? __alloc_pages_nodemask+0xacf/0xd70 [ 661.516808] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 661.521849] ? kasan_check_read+0x11/0x20 [ 661.526027] ? cap_capable+0x1f9/0x260 [ 661.529944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.535499] ? security_capable+0x99/0xc0 [ 661.539673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.539849] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 661.545219] ? ns_capable_common+0x13f/0x170 [ 661.545242] ? get_anon_bdev+0x2f0/0x2f0 [ 661.545261] sget+0x10b/0x150 [ 661.545286] ? fuse_get_root_inode+0x190/0x190 [ 661.545305] mount_nodev+0x33/0x110 [ 661.575348] fuse_mount+0x2c/0x40 [ 661.578824] mount_fs+0xae/0x328 [ 661.582224] vfs_kern_mount.part.34+0xd4/0x4d0 [ 661.586828] ? may_umount+0xb0/0xb0 [ 661.590472] ? _raw_read_unlock+0x22/0x30 [ 661.594632] ? __get_fs_type+0x97/0xc0 [ 661.598545] do_mount+0x564/0x3070 [ 661.602100] ? do_raw_spin_unlock+0x9e/0x2e0 [ 661.606531] ? copy_mount_string+0x40/0x40 [ 661.610785] ? rcu_pm_notify+0xc0/0xc0 [ 661.614703] ? copy_mount_options+0x5f/0x380 [ 661.619130] ? rcu_read_lock_sched_held+0x108/0x120 [ 661.624161] ? kmem_cache_alloc_trace+0x616/0x780 [ 661.629022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 661.634586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.640138] ? copy_mount_options+0x285/0x380 [ 661.644664] ksys_mount+0x12d/0x140 [ 661.648312] __x64_sys_mount+0xbe/0x150 [ 661.652315] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 661.657357] do_syscall_64+0x1b1/0x800 [ 661.661259] ? finish_task_switch+0x1ca/0x840 [ 661.665774] ? syscall_return_slowpath+0x5c0/0x5c0 [ 661.670721] ? syscall_return_slowpath+0x30f/0x5c0 [ 661.675677] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 661.681066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 661.685934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.691133] RIP: 0033:0x455a09 [ 661.694330] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 661.702060] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 661.709339] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 661.716616] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 661.723894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 661.731174] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000040)) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffffffffffb3, 0x200100) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 2033/05/18 03:37:25 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x400003e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x44ae, &(0x7f0000ffd000/0x3000)=nil, 0x4) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0xffffffffffffffff, 0x6, 0x1, 0x3, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x800, 0x101000) 2033/05/18 03:37:25 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000400)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000440)={@loopback={0x0, 0x1}, r2}, 0x14) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2100, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f00000001c0)={0x1}) r5 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x7, 0x8400) epoll_wait(r5, &(0x7f0000000140)=[{}, {}], 0x2, 0x4) recvmsg(r3, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:25 executing program 1 (fault-call:2 fault-nth:22): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:25 executing program 7: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:25 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r1, 0x1, 0x70bd25, 0x25dfdbfb, {0x7}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x40000) getsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000040)=0x6, &(0x7f00000000c0)=0x4) [ 661.878214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 661.894768] FAT-fs (loop1): bogus number of reserved sectors [ 661.900707] FAT-fs (loop1): Can't find a valid FAT filesystem [ 661.969889] FAULT_INJECTION: forcing a failure. [ 661.969889] name failslab, interval 1, probability 0, space 0, times 0 [ 661.981267] CPU: 1 PID: 11410 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 661.988551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.997914] Call Trace: [ 662.000517] dump_stack+0x1b9/0x294 [ 662.004177] ? dump_stack_print_info.cold.2+0x52/0x52 [ 662.009398] should_fail.cold.4+0xa/0x1a [ 662.013481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 662.018601] ? save_stack+0x43/0xd0 [ 662.022238] ? kmem_cache_alloc_trace+0x152/0x780 [ 662.027092] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 662.032293] ? __list_lru_init+0x456/0x790 [ 662.036541] ? sget_userns+0x73a/0xf00 [ 662.040444] ? graph_lock+0x170/0x170 [ 662.044255] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 662.049016] ? do_mount+0x564/0x3070 [ 662.052739] ? ksys_mount+0x12d/0x140 [ 662.056550] ? __x64_sys_mount+0xbe/0x150 [ 662.060708] ? do_syscall_64+0x1b1/0x800 [ 662.064777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.070158] ? find_held_lock+0x36/0x1c0 [ 662.074241] ? __lock_is_held+0xb5/0x140 [ 662.078353] ? check_same_owner+0x320/0x320 [ 662.082696] ? rcu_note_context_switch+0x710/0x710 [ 662.087647] __should_failslab+0x124/0x180 [ 662.091897] should_failslab+0x9/0x14 [ 662.095708] kmem_cache_alloc_trace+0x2cb/0x780 [ 662.100386] ? __kmalloc_node+0x33/0x70 [ 662.104371] ? __kmalloc_node+0x33/0x70 [ 662.108364] ? rcu_read_lock_sched_held+0x108/0x120 [ 662.113403] __memcg_init_list_lru_node+0x17d/0x2c0 [ 662.118435] ? kvfree_rcu+0x20/0x20 [ 662.122076] ? __kmalloc_node+0x47/0x70 [ 662.126073] __list_lru_init+0x456/0x790 [ 662.130155] ? list_lru_destroy+0x4c0/0x4c0 [ 662.134490] ? mark_held_locks+0xc9/0x160 [ 662.138656] ? __raw_spin_lock_init+0x1c/0x100 [ 662.143251] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 662.148279] ? __lockdep_init_map+0x105/0x590 [ 662.152800] ? lockdep_init_map+0x9/0x10 [ 662.156878] sget_userns+0x73a/0xf00 [ 662.160599] ? get_anon_bdev+0x2f0/0x2f0 [ 662.164685] ? destroy_unused_super.part.11+0x110/0x110 [ 662.170062] ? __alloc_pages_nodemask+0xacf/0xd70 [ 662.174926] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 662.179971] ? kasan_check_read+0x11/0x20 [ 662.184140] ? cap_capable+0x1f9/0x260 [ 662.188054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.193603] ? security_capable+0x99/0xc0 [ 662.197768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.203322] ? ns_capable_common+0x13f/0x170 [ 662.207750] ? get_anon_bdev+0x2f0/0x2f0 [ 662.211821] sget+0x10b/0x150 [ 662.214947] ? fuse_get_root_inode+0x190/0x190 [ 662.219543] mount_nodev+0x33/0x110 [ 662.223183] fuse_mount+0x2c/0x40 [ 662.226649] mount_fs+0xae/0x328 [ 662.230040] vfs_kern_mount.part.34+0xd4/0x4d0 [ 662.234637] ? may_umount+0xb0/0xb0 [ 662.238276] ? _raw_read_unlock+0x22/0x30 [ 662.242435] ? __get_fs_type+0x97/0xc0 [ 662.246345] do_mount+0x564/0x3070 [ 662.249896] ? do_raw_spin_unlock+0x9e/0x2e0 [ 662.254330] ? copy_mount_string+0x40/0x40 [ 662.258573] ? rcu_pm_notify+0xc0/0xc0 [ 662.262485] ? copy_mount_options+0x5f/0x380 [ 662.266905] ? rcu_read_lock_sched_held+0x108/0x120 [ 662.271934] ? kmem_cache_alloc_trace+0x616/0x780 [ 662.276792] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 662.282441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.287989] ? copy_mount_options+0x285/0x380 [ 662.292506] ksys_mount+0x12d/0x140 [ 662.296148] __x64_sys_mount+0xbe/0x150 [ 662.300130] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 662.305163] do_syscall_64+0x1b1/0x800 [ 662.309059] ? finish_task_switch+0x1ca/0x840 [ 662.313566] ? syscall_return_slowpath+0x5c0/0x5c0 [ 662.318507] ? syscall_return_slowpath+0x30f/0x5c0 [ 662.323458] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 662.328843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 662.333707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.338902] RIP: 0033:0x455a09 [ 662.342095] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 662.349815] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 662.357096] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 662.364373] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 2033/05/18 03:37:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x80002, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) socketpair(0x1f, 0x3, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000140)={0x1, 0x5, [@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="63076d9bb03f", @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) 2033/05/18 03:37:26 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x4004004) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x3, 0x400280) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000001c0)={r3, 0x1}, &(0x7f0000000200)=0x8) fallocate(r0, 0x0, 0x4, 0x4) r4 = getpgrp(0xffffffffffffffff) r5 = geteuid() getresgid(&(0x7f0000000240)=0x0, &(0x7f00000002c0), &(0x7f0000000380)) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={r4, r5, r6}, 0xc) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0xb926}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 662.371647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 662.378922] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x86ddffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:26 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) fcntl$setpipe(r0, 0x407, 0x7ff) 2033/05/18 03:37:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 662.486150] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:26 executing program 7 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) uselib(&(0x7f0000000040)='./file0\x00') 2033/05/18 03:37:26 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x20000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x2, 0x1, "7afcea23cba0945d2c2b67c608b3e02244bf5bcd6aa9997c12c70c57eaa1e886e0870bcf7376908ffaac7474e85557e08ff42bcb59f0ab8817bd3bcc0b917264", "5c9cccdd21fe1d03c74c44b9b961c87170431c0a174bacbd49f9a8d7313f6530", [0x8, 0x9]}) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 2033/05/18 03:37:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88caffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x10000, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_init_net_socket$nfc_llcp(0x27, 0x404, 0x1) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0)={0x1ff, 0xd99d, 0x5, 0xffff}, 0x6) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0xffffffffffffffff, 0x400000000000000, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cac39e068dd58cd365aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:26 executing program 1 (fault-call:2 fault-nth:23): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="6b03d2f78c1ced235b1aec5842521a089e73ae2b7ffed9e9326c0a4cbc9b7a1cbe6790a286209f90f9e89bd7d661d4c5c042d6cd1996827c252c28a961be24fefb8c7aefe9b5f5d24d2d93cb9bd117c4fd162167241ccd9dd74bad1b5b2e4c0b0a943ae93a13116431616ed906532e184e876eaeedb235e089d90bdc48012d6f2fabf8fde48e07e507a46d1c8f6d1edb3881d401dc4d6d3c90d803fa650dd7165cabe021b34cd7beeed5465479a2aeaa3ebb93efe34731e34428cc152c00004961a7cebb552a654ef99763db3be045c6f3", 0xd1, 0x1}, {&(0x7f00000000c0)="91f496fb6190b1e823c55a0b205eaab639bb6a12ae7023cf374ad0c1", 0x1c}, {&(0x7f00000002c0)="2417f54516ac59a286be90aea1fa9c3b1071df80d758c9ef19fa2816605682b1d19b8afba28eeca7f8faca805f87837d2a81edc55e21a2f59abe318777c8044165ecca985c15dde3e61d282c397098fee78ce399a07ad889857a801b32b67a0210ba075bfa1700ca6cbed89844126588f7805eb264cac329b05076b1cb306c22802c0d6ad8ebba86a2b96fc3690174f390d4e9418ebed2a929f48136d73e88aa234d17cb89ecb77a3f94", 0xaa, 0x81}, {&(0x7f0000000380)="26c1e74258c0139079a14ee9b47a67fce361f3ff95a07f6f0b44fa63dc32ba8516c22ca75f495c083eed53e905670923b6d3e6cfec1ebd5a9806f362a879f9693741ae1100a102a467b3307c8da9f4a11a016891fd56bb70e331e2fd4a25440b4072a7de6199c6f6153c8b3b4c6f648898a2c5b6f172b9d0", 0x78, 0x6}], 0x410, &(0x7f0000000480)={[{@umask={'umask', 0x3d, [0x31, 0x34, 0x33]}, 0x2c}, {@codepage={'codepage', 0x3d, '862'}, 0x2c}]}) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={r1, 0x1, 0x1, 0x5ae4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x40000000000000d0}, 0x20) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000540)=0x1, 0x1) 2033/05/18 03:37:26 executing program 0: r0 = socket(0xa, 0x1, 0xffffffffeffff800) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000220001020000001b0000005ffabac37bc319323b68c24eaa3dc6272a1f5e6d6f3b8f08c596ab573f637abd73f084596d96d1857bd378f907381cac0f31c16f47b84337416d285ca332e2df"], 0x1}, 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2b, 'io', 0x20}, {0x2d, 'cpu', 0x20}, {0x2b, 'memory', 0x20}, {0x2f, 'io', 0x20}, {0x0, 'cpu', 0x20}, {0x2b, 'memory', 0x20}]}, 0x22) [ 662.639947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 662.665295] FAT-fs (loop1): bogus number of reserved sectors [ 662.671255] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:26 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:26 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) prctl$setptracer(0x59616d61, r2) [ 662.746534] FAULT_INJECTION: forcing a failure. [ 662.746534] name failslab, interval 1, probability 0, space 0, times 0 [ 662.758005] CPU: 0 PID: 11464 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 662.765292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.770917] FAT-fs (loop3): bogus number of reserved sectors [ 662.774652] Call Trace: [ 662.774680] dump_stack+0x1b9/0x294 [ 662.774709] ? dump_stack_print_info.cold.2+0x52/0x52 [ 662.774748] should_fail.cold.4+0xa/0x1a [ 662.774771] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 662.780626] FAT-fs (loop3): Can't find a valid FAT filesystem [ 662.783181] ? save_stack+0x43/0xd0 [ 662.783202] ? kmem_cache_alloc_trace+0x152/0x780 [ 662.783221] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 662.820629] ? __list_lru_init+0x456/0x790 [ 662.824857] ? sget_userns+0x73a/0xf00 [ 662.828741] ? graph_lock+0x170/0x170 [ 662.832534] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 662.837290] ? do_mount+0x564/0x3070 [ 662.840996] ? ksys_mount+0x12d/0x140 [ 662.844797] ? __x64_sys_mount+0xbe/0x150 [ 662.848939] ? do_syscall_64+0x1b1/0x800 [ 662.852993] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.858368] ? find_held_lock+0x36/0x1c0 [ 662.862428] ? __lock_is_held+0xb5/0x140 [ 662.866480] ? ib_unmap_fmr+0x180/0x1a0 [ 662.870462] ? check_same_owner+0x320/0x320 [ 662.874784] ? rcu_note_context_switch+0x710/0x710 [ 662.879711] __should_failslab+0x124/0x180 [ 662.883940] should_failslab+0x9/0x14 [ 662.887733] kmem_cache_alloc_trace+0x2cb/0x780 [ 662.892406] __memcg_init_list_lru_node+0x17d/0x2c0 [ 662.897415] ? kvfree_rcu+0x20/0x20 [ 662.901044] ? __kmalloc_node+0x47/0x70 [ 662.905039] __list_lru_init+0x456/0x790 [ 662.909099] ? list_lru_destroy+0x4c0/0x4c0 [ 662.913411] ? mark_held_locks+0xc9/0x160 [ 662.917555] ? __raw_spin_lock_init+0x1c/0x100 [ 662.922133] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 662.927151] ? __lockdep_init_map+0x105/0x590 [ 662.931640] ? lockdep_init_map+0x9/0x10 [ 662.935698] sget_userns+0x73a/0xf00 [ 662.939400] ? get_anon_bdev+0x2f0/0x2f0 [ 662.943462] ? destroy_unused_super.part.11+0x110/0x110 [ 662.948822] ? __alloc_pages_nodemask+0xacf/0xd70 [ 662.953664] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 662.958676] ? kasan_check_read+0x11/0x20 [ 662.962823] ? cap_capable+0x1f9/0x260 [ 662.966713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.972239] ? security_capable+0x99/0xc0 [ 662.976384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.981922] ? ns_capable_common+0x13f/0x170 [ 662.986325] ? get_anon_bdev+0x2f0/0x2f0 [ 662.990376] sget+0x10b/0x150 [ 662.993480] ? fuse_get_root_inode+0x190/0x190 [ 662.998054] mount_nodev+0x33/0x110 [ 663.001674] fuse_mount+0x2c/0x40 [ 663.005124] mount_fs+0xae/0x328 [ 663.008494] vfs_kern_mount.part.34+0xd4/0x4d0 [ 663.013085] ? may_umount+0xb0/0xb0 [ 663.016708] ? _raw_read_unlock+0x22/0x30 [ 663.020850] ? __get_fs_type+0x97/0xc0 [ 663.024736] do_mount+0x564/0x3070 [ 663.028271] ? do_raw_spin_unlock+0x9e/0x2e0 [ 663.032675] ? copy_mount_string+0x40/0x40 [ 663.036900] ? rcu_pm_notify+0xc0/0xc0 [ 663.040812] ? copy_mount_options+0x5f/0x380 [ 663.045214] ? rcu_read_lock_sched_held+0x108/0x120 [ 663.050225] ? kmem_cache_alloc_trace+0x616/0x780 [ 663.055063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.060599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.066128] ? copy_mount_options+0x285/0x380 [ 663.070621] ksys_mount+0x12d/0x140 [ 663.074245] __x64_sys_mount+0xbe/0x150 [ 663.078211] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 663.083225] do_syscall_64+0x1b1/0x800 [ 663.087113] ? finish_task_switch+0x1ca/0x840 [ 663.091601] ? syscall_return_slowpath+0x5c0/0x5c0 [ 663.096523] ? syscall_return_slowpath+0x30f/0x5c0 [ 663.101448] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 663.106811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 663.111652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.116833] RIP: 0033:0x455a09 [ 663.120018] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 663.127739] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 663.135003] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 2033/05/18 03:37:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xcd0e], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 663.142279] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 663.149535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 663.156796] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:27 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x46000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000240)={0x3c000000, 0xfffffffffffffb34, 0x9}) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x4, 0x300, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x268, 0x268, 0x268, 0xffffffff, 0x4, &(0x7f00000002c0), {[{{@ip={@multicast2=0xe0000002, @multicast1=0xe0000001, 0xffffff00, 0xff, 'veth0_to_team\x00', 'lo\x00', {0xff}, {0xff}, 0xff, 0x3, 0x50}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xd, 0x10400000000, 0x6, 0x1}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ip={@broadcast=0xffffffff, @dev={0xac, 0x14, 0x14, 0xb}, 0x0, 0xff000000, 'gre0\x00', 'ifb0\x00', {}, {0xff}, 0x33, 0x2, 0x20}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x360) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x6, 0x16b00000000, 0x2, 0x0, 0x3, 0xc2002, 0x5, 0x6, 0x9, 0x1f, 0x7, 0x80000001, 0x4, 0x4, 0xffff, 0x2, 0x400, 0xfffffffeffffffff, 0xfffffffffffffe00, 0x7ff, 0x90, 0x9, 0x7, 0xa945, 0x40, 0x800000, 0x89, 0x1, 0x8, 0x7, 0x0, 0x3, 0x401, 0x400, 0x3, 0x0, 0x6, 0x0, @perf_bp, 0x8100, 0xff, 0x5, 0x6, 0x7}, r0, 0xe, r1, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 663.238424] FAT-fs (loop3): bogus number of reserved sectors [ 663.244337] FAT-fs (loop3): Can't find a valid FAT filesystem [ 663.268070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:27 executing program 1 (fault-call:2 fault-nth:24): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:27 executing program 0: r0 = socket(0x10000000009, 0x0, 0x400000000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8000, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x7fffc, 0x1000000000000) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771a000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:27 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x74], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0425fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:27 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000580)='/dev/snd/midiC#D#\x00', 0x3, 0x10000) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000005c0)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x10) setns(r2, 0x28000000) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x40082406, &(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x1, 0x0, "0efdd9df3d13e9d4b03677374e2cfca56772d649673d744df5f65f2d06cd3a27153e16358c74b918412ddec1f20586eaf1f404e6cf85cf4a39c419dfe2e28cb3f74ac5aaf11d120ffdcb79c93a530697"}, 0xd8) accept4$ax25(r2, 0x0, &(0x7f00000004c0), 0x80000) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000014f7ecf13b10a83c4802b7778600000000000000000000000000003e000000163fd9a53310eda6ac9b6f464ae4ffe418568b7440fdf3eb76fc371ed11bfd3c71ae96bc1fd69b43f6abdb224b92f8a3b4b6877186805afbc5a69d3f69d25ed3aa0ebd45b34f28f5ef4e8d3ef8fdf7081c64e7d2399d11a56f9f2aa7413e078813aa47d4aa672738bb3328bcd1175970c6fc6199a61fe8033a563695733d543ce41fef52cc74b6c1fa2e3e9219cb0e06e0962458a48b719fd7000000cf267b5a914dc92ba0cf2845f6d1f36175"], &(0x7f0000000600)=0x62) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000011c0)={@in={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0x0, 0x0, "6ca32c4a9d7116ef67013122f3b7bf6303b13a12e59294c02928b9a341448c6fada9112fad8a7a70a3e3ac470803835fecc7da20e7697c492e334517d1495f47356ad64305085851140dc11b3897eeeb"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x5, 0x0, "1ad2817a5e258f17dcb9fe60393b96025ef74f35659419514698b8d591bfeb96ca2be1ebf2bec434bc77de464eeed865090967b3279404b511aa9a98a91128ec729634c1893c83f5b9f02953986d6673"}, 0xd8) dup2(r3, r1) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x81, &(0x7f00000000c0)=0x4) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r6 = add_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000440)="c54272f25a374072f0400867814b40a2d935e4d23fc478e78baacd9fb53fc613571eef39844d5098041c439cd726ba08c949b221e3b65d5575b845dec94c4148f38602c56def45f70bc57b899a96ac07de506d2fffd85487a061fed6839367f48b08", 0x62, 0xffffffffffffffff) request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)='/dev/vhost-vsock\x00', r6) ioctl$VHOST_SET_LOG_BASE(r5, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:27 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="ff0f8c003faf324b3543670422518f5e45e4c64b7d4a1d6b869e0eeea94aac4079a8cb008967712409a9fda9ba0801f3b46c28764e7e71a3408e4084add0df5f4735bdcd4d24ed1cc8841dc44e49381325b240349c988d0075874f41580fed3ba21e1d94c16f3ad7b5102112c2b83660d0329b04191c3e44531ca3565b6d995ba6ffef7cc6e9fea531a2185e5eda3e2c"], 0x94) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000001c0)={0xfffffffffffff153, 0x81, 0x3, 'queue0\x00', 0x20}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000340)={0x5, 0x9, 0x7, 'queue0\x00', 0x7fff}) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 663.480499] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 663.505333] FAT-fs (loop1): bogus number of reserved sectors [ 663.511311] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:27 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe804, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) accept$alg(r0, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x20000160) 2033/05/18 03:37:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x40000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000003840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) fcntl$addseals(r0, 0x409, 0xa) 2033/05/18 03:37:27 executing program 3: r0 = socket(0x4, 0x2, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x9, 0x4, 0x3, 0x1, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 663.601131] FAT-fs (loop6): Directory bread(block 2563) failed [ 663.614393] FAT-fs (loop6): Directory bread(block 2564) failed [ 663.626124] FAT-fs (loop6): Directory bread(block 2565) failed [ 663.646679] FAT-fs (loop6): Directory bread(block 2566) failed [ 663.667326] FAT-fs (loop6): Directory bread(block 2567) failed [ 663.685227] FAT-fs (loop6): Directory bread(block 2568) failed [ 663.686511] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 663.697132] FAT-fs (loop6): Directory bread(block 2569) failed [ 663.720779] FAT-fs (loop6): Directory bread(block 2570) failed [ 663.740527] FAT-fs (loop6): Directory bread(block 2571) failed [ 663.765391] FAT-fs (loop6): Directory bread(block 2572) failed [ 663.867137] FAULT_INJECTION: forcing a failure. [ 663.867137] name failslab, interval 1, probability 0, space 0, times 0 [ 663.878500] CPU: 1 PID: 11508 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 663.885779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.895131] Call Trace: [ 663.897728] dump_stack+0x1b9/0x294 [ 663.901372] ? dump_stack_print_info.cold.2+0x52/0x52 [ 663.906591] should_fail.cold.4+0xa/0x1a [ 663.910671] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 663.915786] ? save_stack+0x43/0xd0 [ 663.919430] ? kmem_cache_alloc_trace+0x152/0x780 [ 663.924279] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 663.929474] ? __list_lru_init+0x456/0x790 [ 663.933714] ? sget_userns+0x73a/0xf00 [ 663.937615] ? graph_lock+0x170/0x170 [ 663.941422] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 663.946182] ? do_mount+0x564/0x3070 [ 663.949905] ? ksys_mount+0x12d/0x140 [ 663.953711] ? __x64_sys_mount+0xbe/0x150 [ 663.957865] ? do_syscall_64+0x1b1/0x800 [ 663.961934] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.967309] ? find_held_lock+0x36/0x1c0 [ 663.971394] ? __lock_is_held+0xb5/0x140 [ 663.975487] ? check_same_owner+0x320/0x320 [ 663.979826] ? rcu_note_context_switch+0x710/0x710 [ 663.984777] __should_failslab+0x124/0x180 [ 663.989024] should_failslab+0x9/0x14 [ 663.992835] kmem_cache_alloc_trace+0x2cb/0x780 [ 663.997535] __memcg_init_list_lru_node+0x17d/0x2c0 [ 664.002567] ? kvfree_rcu+0x20/0x20 [ 664.006212] ? __kmalloc_node+0x47/0x70 [ 664.010211] __list_lru_init+0x456/0x790 [ 664.014287] ? list_lru_destroy+0x4c0/0x4c0 [ 664.018618] ? mark_held_locks+0xc9/0x160 [ 664.022782] ? __raw_spin_lock_init+0x1c/0x100 [ 664.027378] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 664.032408] ? __lockdep_init_map+0x105/0x590 [ 664.036921] ? lockdep_init_map+0x9/0x10 [ 664.040998] sget_userns+0x73a/0xf00 [ 664.044716] ? get_anon_bdev+0x2f0/0x2f0 [ 664.048800] ? destroy_unused_super.part.11+0x110/0x110 [ 664.054173] ? __alloc_pages_nodemask+0xacf/0xd70 [ 664.059039] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 664.064071] ? kasan_check_read+0x11/0x20 [ 664.068237] ? cap_capable+0x1f9/0x260 [ 664.072146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.077693] ? security_capable+0x99/0xc0 [ 664.081856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.087404] ? ns_capable_common+0x13f/0x170 [ 664.091827] ? get_anon_bdev+0x2f0/0x2f0 [ 664.095900] sget+0x10b/0x150 [ 664.099019] ? fuse_get_root_inode+0x190/0x190 [ 664.103610] mount_nodev+0x33/0x110 [ 664.107249] fuse_mount+0x2c/0x40 [ 664.110713] mount_fs+0xae/0x328 [ 664.114097] vfs_kern_mount.part.34+0xd4/0x4d0 [ 664.118694] ? may_umount+0xb0/0xb0 [ 664.122333] ? _raw_read_unlock+0x22/0x30 [ 664.126489] ? __get_fs_type+0x97/0xc0 [ 664.130396] do_mount+0x564/0x3070 [ 664.133957] ? copy_mount_string+0x40/0x40 [ 664.138204] ? rcu_pm_notify+0xc0/0xc0 [ 664.142115] ? copy_mount_options+0x5f/0x380 [ 664.146530] ? rcu_read_lock_sched_held+0x108/0x120 [ 664.151556] ? kmem_cache_alloc_trace+0x616/0x780 [ 664.156417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.161967] ? _copy_from_user+0xdf/0x150 [ 664.166135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.171678] ? copy_mount_options+0x285/0x380 [ 664.176199] ksys_mount+0x12d/0x140 [ 664.179841] __x64_sys_mount+0xbe/0x150 [ 664.183822] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 664.188856] do_syscall_64+0x1b1/0x800 [ 664.192754] ? finish_task_switch+0x1ca/0x840 [ 664.197261] ? syscall_return_slowpath+0x5c0/0x5c0 [ 664.202207] ? syscall_return_slowpath+0x30f/0x5c0 [ 664.207162] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 664.212548] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 664.217412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.222609] RIP: 0033:0x455a09 [ 664.225805] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 664.233528] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 664.240803] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 664.248078] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 664.255354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 664.262626] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), 0x4) r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x6, 0xffffffffffff9502, 0xfffffffffffffffd}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x7fffffff, 0x8000, 0x3, 0x6, r1}, &(0x7f0000000200)=0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) getpriority(0x0, r2) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:28 executing program 3: socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x8}, 0x10) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f00000000c0)=&(0x7f0000000040)) 2033/05/18 03:37:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xe00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e0601d58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2d}, 0xfffffffffffffe96) 2033/05/18 03:37:28 executing program 1 (fault-call:2 fault-nth:25): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x630b39f2aa596889, r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000440)=0x1, 0x4) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x9, &(0x7f0000000440), 0x1, &(0x7f00000003c0)=""/70, 0x46, 0x510}, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x2, 0x101080) socket$inet6_icmp(0xa, 0x2, 0x3a) getpeername$netlink(r3, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x101}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000002c0)={r4, 0x9}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000500)={r4, 0x36c}, 0x25ce7ff84091a095) 2033/05/18 03:37:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x100) sendmsg$alg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000140)="72b0207dff18f9592110d166bed6ab14b691ea10f4d14b4239092a77caa71ffcf5ac6f6b90eb7ad7b94a3af47304b9a61effbdddf5057f77e150d12ea8ddcf2907ad323a57d3d07f9ebdca7d31eea4716883de0fa717cee92de8d3755c0d40fdd2b5b8815703d2b719ccfe137196e67c11e34b47e46ab19c0c8592a790fd75bdcde37973efe1821ad37f2db66dd706", 0x8f}, {&(0x7f0000000200)="e744cb72fce11fbdfb1017f489", 0xd}, {&(0x7f0000000380)="5b86a05108e3e5778619037825e35eb2549ee337e9cb27a5c0a275634f902171ad9d52ed712914ba9d4d9b3a511f6cabf2c7b50e376b20ab041002ba5c3fedb4ee40b4f9cf0ffd9232ff0de85c14f896660793f594601b0d66d1eebb6f6a48801e9330c8a278a698bad2c7aa7662e8cd6a4229313202a7371d9d9b8518fd230602fe6824c05d8e9bf2a0e24b240f3bc2e95f16cdc4153972d3ce92a48ac8ee419a81952fc80260bd5b894da1ce3c8d408258a79ac0b4046ce2da03318f0ef3dff836f45ca607bc8fe5a0efa3e29b51ecbe8c", 0xd2}, {&(0x7f0000000480)="9d39474de09995a4049eb3b6221093f6375f7c7045b39a952aec139d6682c266502220dff4d91cbb2b08d4c51121a437cebc956dc607ef574e3e7c55451d81d5b916643463d27e42", 0x48}, {&(0x7f0000000240)}, {&(0x7f0000000500)="1d14777e750f471d3dbbbffdefb705245c2b6168169c510cd0977fa7346ebaef55afa156548a4afabdfd01c531eae0baf477d7279b2a8bff4aff66a64d6791643a38c119889afc709fab5ebcca7c6f00c34926eae92fa962b9590ba3b5f24d9c80ddc421239c7a288fe9db874edda1653acb8bb9beb8b8d7083ca93536f2c5f02c0d9d845c9896ec3b2433931f1e12d8e0957ba295dd43ac5bc0f01d1c2ccbfff0a2d6a7b2ba0e257db440c1083a23aa70e347e92ef24af5981017", 0xbb}, {&(0x7f0000000680)="019847992df88033181000971a8d09a9be45d1b5e0ed88fbb6d65ec116e14273f9161b4b98bd193921a1be9dbf564ea9d0793c48ef304b4e9ca6c256997c4c648f3b4f0bfd9fd9d88bce7d", 0x4b}, {&(0x7f0000000700)="e5efd95b7d1f9f685c5be927ab54a3d0634ffb6575d308d59f514999b7248cfd4dec7e3b1cc8d7997b145236aa08f5cd14f54ff3bc3b4094c8e00b81a111194d778b89ac1ae5021d70aae5af40bd12150ead4cebee1d9e16379813fee947b05593", 0x61}, {&(0x7f0000000780)="229d3f6435ebfb8c43477e3992a338c63c928fa5eec55ac8bc4bebd6162505492e882cf8bf0331e578a5fcbe2adfa2fe689f316b105e1d1b3b75fe7e236b668004fa36421ad408aa59f12bc3183959bf2b4125a8d8070846bc8d3c967b5b3cca86c481a6affbbc956c8ae4cf2abf18d197ffe0534b0fb68b5b7431e70eb8b07f003a9874f2327ece3d8d8399a0f1e55c9caf71733d4cd7530a2b8b62463d5fe8b67bf9dcfb463c1220d9ae179505ea8e8c11a02f325e93ba6597f0073d668d3c0e02", 0xc2}], 0x9, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3}], 0x18, 0x4000}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000240)) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) [ 664.353691] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:28 executing program 0: r0 = socket(0x16, 0x3, 0x4) ioctl(r0, 0x890f, &(0x7f0000000000)='F.,o') r1 = socket(0x10, 0x3, 0x0) r2 = add_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)="4e90e0c3361858a34454a73e66f8a5e1d2be770f49659b03cfab4071235bfe3f844f50b5668eb86ef74307", 0x2b, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="34f30b3e6d1eba47c0488cb94b3375a3fa840c29c4959307416c90d48140e9bf0ffb773cdd6aee9b01e2f499ea8ab80fba2804373d75f0648629d3e11652040685dfde6b58a21e64e4d928564baf4ab83835dda98dbdbf5ea813f67ed527efcae7e73aa783dc6e0a438eefc1c9e22e03717d910246ca7c9bc1454b3fc704a93deb2c7e63d5628f97817dc50ad2bbf86ae181af658ab07c6e4783c19732bab7ef65f02ede96ad5dc3188ee7656049b71393787bae", 0xb4, r2) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x2000) shmdt(r0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:28 executing program 7: r0 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x40, 0x1, 0x0, 0x10000, 0x0, 0xb9c, 0x44004, 0x8, 0x0, 0x5, 0xb1b, 0xfffffffffffffffa, 0x34a, 0x9d, 0x5, 0x101, 0x3, 0x7ff, 0xc9c, 0x3, 0x7, 0x101, 0xfffffffffffffffb, 0x100000001, 0x5c91a261, 0x2, 0x4f3277ea, 0x1, 0x9, 0xc8, 0x200, 0x100000001, 0x3, 0x2, 0x80, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f00000000c0), 0x8}, 0x8, 0x4e6c, 0x2, 0x4, 0xd74, 0x6, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)={0x2, 0x0, [0x0, 0x0]}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = syz_open_dev$sndmidi(&(0x7f0000000280)='/dev/snd/midiC#D#\x00', 0x100000000, 0x101000) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f00000002c0)) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x6, 0x200, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x503000, 0x0) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000040)=0x20, 0x4) [ 664.414230] FAT-fs (loop1): bogus number of reserved sectors [ 664.420214] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = memfd_create(&(0x7f0000000000)='selinuxeth0\x00', 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x21, "969f344a024256c727069c21bc519fc38f43164874237cf7c7ccc510ab6c7b963a"}, &(0x7f00000000c0)=0x29) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) [ 664.502832] FAULT_INJECTION: forcing a failure. [ 664.502832] name failslab, interval 1, probability 0, space 0, times 0 [ 664.514218] CPU: 1 PID: 11563 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 664.521505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.530870] Call Trace: [ 664.533479] dump_stack+0x1b9/0x294 [ 664.537140] ? dump_stack_print_info.cold.2+0x52/0x52 [ 664.542396] should_fail.cold.4+0xa/0x1a [ 664.546485] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 664.551616] ? save_stack+0x43/0xd0 [ 664.555264] ? kmem_cache_alloc_trace+0x152/0x780 [ 664.560123] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 664.565331] ? __list_lru_init+0x456/0x790 [ 664.569583] ? sget_userns+0x73a/0xf00 [ 664.573494] ? graph_lock+0x170/0x170 [ 664.577307] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 664.582077] ? do_mount+0x564/0x3070 [ 664.585805] ? ksys_mount+0x12d/0x140 [ 664.589627] ? __x64_sys_mount+0xbe/0x150 [ 664.593798] ? do_syscall_64+0x1b1/0x800 [ 664.597878] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.603267] ? find_held_lock+0x36/0x1c0 [ 664.607362] ? __lock_is_held+0xb5/0x140 [ 664.611472] ? check_same_owner+0x320/0x320 [ 664.615824] ? rcu_note_context_switch+0x710/0x710 [ 664.620786] __should_failslab+0x124/0x180 [ 664.625060] should_failslab+0x9/0x14 [ 664.628881] kmem_cache_alloc_trace+0x2cb/0x780 [ 664.633569] ? __kmalloc_node+0x33/0x70 [ 664.637561] ? __kmalloc_node+0x33/0x70 [ 664.641557] ? rcu_read_lock_sched_held+0x108/0x120 [ 664.646599] __memcg_init_list_lru_node+0x17d/0x2c0 [ 664.651642] ? kvfree_rcu+0x20/0x20 [ 664.655288] ? __kmalloc_node+0x47/0x70 [ 664.659295] __list_lru_init+0x456/0x790 [ 664.663370] ? list_lru_destroy+0x4c0/0x4c0 [ 664.667707] ? mark_held_locks+0xc9/0x160 [ 664.671877] ? __raw_spin_lock_init+0x1c/0x100 [ 664.676477] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 664.681516] ? __lockdep_init_map+0x105/0x590 [ 664.686033] ? lockdep_init_map+0x9/0x10 [ 664.690123] sget_userns+0x73a/0xf00 [ 664.693856] ? get_anon_bdev+0x2f0/0x2f0 [ 664.697945] ? destroy_unused_super.part.11+0x110/0x110 [ 664.703328] ? __alloc_pages_nodemask+0xacf/0xd70 [ 664.708208] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 664.713241] ? kasan_check_read+0x11/0x20 [ 664.717411] ? cap_capable+0x1f9/0x260 [ 664.721330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.726888] ? security_capable+0x99/0xc0 [ 664.731066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.736618] ? ns_capable_common+0x13f/0x170 [ 664.741045] ? get_anon_bdev+0x2f0/0x2f0 [ 664.745123] sget+0x10b/0x150 [ 664.748255] ? fuse_get_root_inode+0x190/0x190 [ 664.752858] mount_nodev+0x33/0x110 [ 664.756509] fuse_mount+0x2c/0x40 [ 664.759978] mount_fs+0xae/0x328 [ 664.763372] vfs_kern_mount.part.34+0xd4/0x4d0 [ 664.767975] ? may_umount+0xb0/0xb0 [ 664.771621] ? _raw_read_unlock+0x22/0x30 [ 664.775786] ? __get_fs_type+0x97/0xc0 [ 664.779703] do_mount+0x564/0x3070 [ 664.783259] ? do_raw_spin_unlock+0x9e/0x2e0 [ 664.787692] ? copy_mount_string+0x40/0x40 [ 664.791947] ? rcu_pm_notify+0xc0/0xc0 [ 664.795872] ? copy_mount_options+0x5f/0x380 [ 664.800291] ? rcu_read_lock_sched_held+0x108/0x120 [ 664.805322] ? kmem_cache_alloc_trace+0x616/0x780 [ 664.810193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.815759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.821313] ? copy_mount_options+0x285/0x380 [ 664.825836] ksys_mount+0x12d/0x140 [ 664.829485] __x64_sys_mount+0xbe/0x150 [ 664.833470] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 664.838508] do_syscall_64+0x1b1/0x800 [ 664.842415] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 664.847272] ? syscall_return_slowpath+0x5c0/0x5c0 [ 664.852219] ? syscall_return_slowpath+0x30f/0x5c0 [ 664.857174] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 664.862558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 664.867423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.872621] RIP: 0033:0x455a09 [ 664.875817] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 664.883540] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 664.890818] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 2033/05/18 03:37:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg(r0, &(0x7f0000000240)={&(0x7f00000001c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000001680)=""/67, 0x43}, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}, [0xffffffffffffffc0, 0x81f, 0x6, 0x200, 0x7f, 0x9, 0xfff, 0x0, 0xe88d, 0x1, 0x4, 0x0, 0x1f, 0x54, 0xc5a1]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000500)={r3, 0x8}, &(0x7f0000000540)=0x8) connect$can_bcm(r0, &(0x7f0000000180)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x7, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x48}, 0x1}, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmmsg(r0, &(0x7f0000003980)=[{{&(0x7f0000000b00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000b80)=""/236, 0xec}, {&(0x7f0000000c80)=""/144, 0x90}, {&(0x7f0000000d40)=""/39, 0x27}, {&(0x7f0000000d80)=""/136, 0x88}, {&(0x7f0000000e40)=""/241, 0xf1}], 0x5}, 0x2}, {{&(0x7f0000000fc0)=@un=@abs, 0x80, &(0x7f0000001300)=[{&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/157, 0x9d}, {&(0x7f0000001240)=""/125, 0x7d}, {&(0x7f00000012c0)=""/24, 0x18}], 0x5, &(0x7f0000001380)=""/194, 0xc2, 0x9}, 0x80000000}, {{&(0x7f0000001480)=@in6={0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x80, &(0x7f0000002840)=[{&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000001500)=""/128, 0x80}, {&(0x7f0000001580)=""/151, 0x97}, {&(0x7f0000002700)=""/132, 0x84}, {&(0x7f00000027c0)=""/106, 0x6a}], 0x5, &(0x7f00000028c0)=""/223, 0xdf, 0x5}, 0xe5af}, {{&(0x7f00000029c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002a40)=""/209, 0xd1}, {&(0x7f0000002b40)=""/181, 0xb5}, {&(0x7f0000001640)=""/10, 0xa}, {&(0x7f0000002c00)=""/196, 0xc4}, {&(0x7f0000002d00)=""/13, 0xd}, {&(0x7f0000002d40)=""/107, 0x6b}, {&(0x7f0000002dc0)=""/36, 0x24}, {&(0x7f0000002e00)=""/174, 0xae}, {&(0x7f0000002ec0)=""/114, 0x72}], 0x9, &(0x7f0000003000)=""/132, 0x84}, 0x2}, {{&(0x7f00000030c0)=@l2, 0x80, &(0x7f0000003680)=[{&(0x7f0000003140)=""/112, 0x70}, {&(0x7f00000031c0)=""/73, 0x49}, {&(0x7f0000003240)=""/155, 0x9b}, {&(0x7f0000003300)=""/44, 0x2c}, {&(0x7f0000003340)=""/205, 0xcd}, {&(0x7f0000003440)=""/166, 0xa6}, {&(0x7f0000003500)=""/156, 0x9c}, {&(0x7f00000035c0)=""/46, 0x2e}, {&(0x7f0000003600)=""/17, 0x11}, {&(0x7f0000003640)=""/2, 0x2}], 0xa, &(0x7f0000003740)=""/154, 0x9a, 0xff}, 0x5}, {{&(0x7f0000003800)=@generic, 0x80, &(0x7f0000003900)=[{&(0x7f0000003880)=""/91, 0x5b}], 0x1, &(0x7f0000003940)=""/25, 0x19, 0x1}, 0x7}], 0x6, 0x2060, &(0x7f0000003b00)) sendmsg$can_bcm(r1, &(0x7f0000003c40)={&(0x7f0000003b40)={0x1d, r5}, 0x10, &(0x7f0000003c00)={&(0x7f0000003b80)={0x6, 0x280, 0x400, {0x77359400}, {0x0, 0x2710}, {0x3, 0x5, 0x6, 0x10000}, 0x1, @canfd={{0x0, 0x5, 0x3ff, 0x8001}, 0x30, 0x3, 0x0, 0x0, "f22597909dfe64de9563c3b9cfc05a0a695ac8d2ac15a983d1602592f6beb6c3a6c580ed0815c985812931457c8e5ceadcd498c9dd79f850afada71112d3df4e"}}, 0x80}, 0x1, 0x0, 0x0, 0x4050}, 0x0) bind$nfc_llcp(r4, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000580)={'nat\x00', 0xa9, "ab0802d613f32d641e506763c7f0b5a64cc38862ee4816d323c40f7c8c90adf2e857865e704bdb2a3f9d4e1ebd8b51be1b0c626b99b4d91eaacfc30065610d0a95c85c180bf4a9c27ac791dd4348a5429d3084dad6681fd7183662de5232dd64627cc6a3e77b102795140611192d4fc2d604d4710074b8e6dada5efb664d2c37191ad73a2176a0759a2ff56f041570192348ab58891db19da6a287f5430bb75755157dbc0a66f99872"}, &(0x7f0000000680)=0xcd) 2033/05/18 03:37:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:28 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8030) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB='usHr.aead\x00']) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = dup(r0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000100)) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x110, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x7400], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:28 executing program 7: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x80, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="640100001e00000325bd7000ffdbdf25ff010000000000000000000000000001000004d60a007f00000000010000000000000000000000000000000000000000240009000600000000000000040000ec00000000d600000000000000ff0100000000000014000e007f000001000000000000000000000000ec00120073657169762867636d2874776f666973682d61736d2929000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000800300007ffecf5f2f97cf6eb0bdff4ee26ef8e339c107f9311b7c935877ed24ad41cf785e306ba2132cd1864f9ecd03afb0e144e79750f1701d0cf6fa1590c4716145f12bc8d51106efb74afa4cd7c0e60e026ad02566a9109ad3ec4985bd532400fa30a39a9113b56606ce338084fcebdbd518ea0c2a197f808bf605a0361fe2959ea533fe3122af24c82e0cc40ce4172992f95003202ef8d22e50f1f1de557124a9c5"], 0x164}, 0x1, 0x0, 0x0, 0x40}, 0x8000) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/175, 0xaf}], 0x1, 0x29) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x101, 0x119002) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000640)=0x2, 0x4) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000005c0)={&(0x7f0000000580)=[0x6, 0x9, 0x77, 0xffffffff80000001, 0x1610e06, 0x80000001], 0x6, 0x100000001, 0x9294, 0x80000000, 0x8000, 0x1d, {0xe53, 0x3f, 0x5, 0x400, 0x5, 0x100000001, 0x696e4185, 0x10000, 0x5, 0x100000000, 0xffffffffffffff70, 0x5b4f, 0x8, 0x6, "6b4a62a90536908af9100417f521c96634de145bbe0af3e99a03a6ee242b4ad9"}}) syz_open_dev$dspn(&(0x7f0000000700)='/dev/dsp#\x00', 0x7fff, 0x40) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/icmp\x00') ioctl$TIOCNXCL(r5, 0x540d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={r5, 0x2, 0x1, 0x800, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 664.898158] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 664.905433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 664.912707] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 664.950242] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:29 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x100, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000200)=r2) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1000, 0x400000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) 2033/05/18 03:37:29 executing program 1 (fault-call:2 fault-nth:26): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:29 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3580], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000200)={0x0, 0x2}, &(0x7f0000000240)=0x8) getpeername$ax25(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0x6b, "656b7f2ae562f5be8aeefb6a576be58a7588cf5652facb175d570d5508e81c45fc5555a1af3f9ad93c05aac961e856b210f72c3cc9cc695e3ec4c88ae05227a34f47a40d24acef9f841638483d8e8370270c6e40cdfe7dc99dbf3fc427024e6a0c4754906dee9594c442a0"}, &(0x7f0000000300)=0x73) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:29 executing program 0: r0 = socket(0xa, 0x23, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x1, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x7, &(0x7f0000000140)=0x2) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101000, 0x0) 2033/05/18 03:37:29 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="15e0f823ba4e", 0xffffffffffffffaf}], 0x1, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 665.794769] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 665.832519] FAT-fs (loop1): bogus number of reserved sectors [ 665.838476] FAT-fs (loop1): Can't find a valid FAT filesystem [ 665.873449] FAULT_INJECTION: forcing a failure. [ 665.873449] name failslab, interval 1, probability 0, space 0, times 0 [ 665.884783] CPU: 1 PID: 11624 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 665.892074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.901441] Call Trace: [ 665.904053] dump_stack+0x1b9/0x294 [ 665.907715] ? dump_stack_print_info.cold.2+0x52/0x52 [ 665.912949] should_fail.cold.4+0xa/0x1a [ 665.917040] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 665.922174] ? zap_class+0x720/0x720 [ 665.925907] ? print_usage_bug+0xc0/0xc0 [ 665.929982] ? graph_lock+0x170/0x170 [ 665.933793] ? lock_downgrade+0x8e0/0x8e0 [ 665.937961] ? find_held_lock+0x36/0x1c0 [ 665.942041] ? __lock_is_held+0xb5/0x140 [ 665.946145] ? check_same_owner+0x320/0x320 [ 665.950482] ? __might_sleep+0x95/0x190 [ 665.954467] ? rcu_note_context_switch+0x710/0x710 [ 665.959420] __should_failslab+0x124/0x180 [ 665.963670] should_failslab+0x9/0x14 [ 665.967483] __kmalloc+0x2c8/0x760 [ 665.971040] ? __kmalloc_node+0x47/0x70 [ 665.975030] ? __list_lru_init+0xdd/0x790 [ 665.979203] __list_lru_init+0xdd/0x790 [ 665.983197] ? list_lru_destroy+0x4c0/0x4c0 [ 665.987527] ? mark_held_locks+0xc9/0x160 [ 665.991692] ? __raw_spin_lock_init+0x1c/0x100 [ 665.996287] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 666.001322] ? lockdep_init_map+0x9/0x10 [ 666.005400] sget_userns+0x767/0xf00 [ 666.009121] ? get_anon_bdev+0x2f0/0x2f0 [ 666.013209] ? destroy_unused_super.part.11+0x110/0x110 [ 666.018586] ? __alloc_pages_nodemask+0xacf/0xd70 [ 666.023454] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 666.028496] ? kasan_check_read+0x11/0x20 [ 666.032672] ? cap_capable+0x1f9/0x260 [ 666.036593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.042145] ? security_capable+0x99/0xc0 [ 666.046318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.051870] ? ns_capable_common+0x13f/0x170 [ 666.056294] ? get_anon_bdev+0x2f0/0x2f0 [ 666.060365] sget+0x10b/0x150 [ 666.063496] ? fuse_get_root_inode+0x190/0x190 [ 666.068089] mount_nodev+0x33/0x110 [ 666.068114] fuse_mount+0x2c/0x40 [ 666.075196] mount_fs+0xae/0x328 [ 666.078587] vfs_kern_mount.part.34+0xd4/0x4d0 [ 666.083188] ? may_umount+0xb0/0xb0 [ 666.086836] ? _raw_read_unlock+0x22/0x30 [ 666.090999] ? __get_fs_type+0x97/0xc0 [ 666.094913] do_mount+0x564/0x3070 [ 666.098484] ? do_raw_spin_unlock+0x9e/0x2e0 [ 666.102914] ? copy_mount_string+0x40/0x40 [ 666.107165] ? rcu_pm_notify+0xc0/0xc0 [ 666.111088] ? copy_mount_options+0x5f/0x380 [ 666.115513] ? rcu_read_lock_sched_held+0x108/0x120 [ 666.120541] ? kmem_cache_alloc_trace+0x616/0x780 [ 666.125405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 666.130973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.136521] ? copy_mount_options+0x285/0x380 [ 666.141036] ksys_mount+0x12d/0x140 [ 666.144681] __x64_sys_mount+0xbe/0x150 [ 666.148666] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 666.153698] do_syscall_64+0x1b1/0x800 [ 666.157598] ? finish_task_switch+0x1ca/0x840 [ 666.162117] ? syscall_return_slowpath+0x5c0/0x5c0 [ 666.167068] ? syscall_return_slowpath+0x30f/0x5c0 2033/05/18 03:37:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) getsockname$llc(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000021fff0020000000085025aaa06386b000000000000000000200004"], 0x1}, 0x1}, 0x0) [ 666.172017] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 666.177405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 666.182269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.187464] RIP: 0033:0x455a09 [ 666.190660] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 666.198382] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 666.205658] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 666.212935] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 2033/05/18 03:37:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3e8], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x4, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x80000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0x9b, 0x8) 2033/05/18 03:37:30 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:30 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f00000000c0)) 2033/05/18 03:37:30 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x170) dup(r1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xd018d5f6b5c61c5f, &(0x7f0000000180)=0x109, 0x4) recvfrom$ipx(r0, &(0x7f0000000180), 0x0, 0x40000000, &(0x7f00000001c0)={0x4, 0x319, 0xc54, "801dba594a91", 0x9}, 0x10) truncate(&(0x7f0000000100)='./file0\x00', 0x9) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000200)=0x6) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46, 0xbd}, 0x0) 2033/05/18 03:37:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="46263fc79b8abb4bb02ea4") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:30 executing program 1 (fault-call:2 fault-nth:27): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) [ 666.220215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 666.227496] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 666.313889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:30 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x8001, 0x9, 0x3fd138ab, 0x0, 0x0, 0x20, 0x140, 0x1, 0x3ff, 0x8, 0x6, 0xc86, 0x3, 0x5, 0x101, 0x5, 0xc3, 0x16, 0x8001, 0x0, 0xa000000, 0x4, 0x9, 0x4, 0x8, 0x1, 0x0, 0x8, 0x6, 0x10001, 0x9, 0x3f, 0x9238, 0x4, 0x7, 0x5, 0x0, 0xd0c2, 0x4, @perf_bp={&(0x7f00000000c0), 0x7}, 0x0, 0xfdf, 0x7fffffff, 0x0, 0x2, 0xb4}, r2, 0xb, r0, 0xa) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x7, 0x3, 0x8, "f9b62873b8370b0e4c72cf960b5540006a48f8c1339d545e79a28caf278b91dc8ffa0ef6ad3d14414155780567503dd943a6e2b60b63af3e63eb944cd95beb", 0x20}, 0x60) 2033/05/18 03:37:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xa], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 666.373110] FAT-fs (loop1): bogus number of reserved sectors [ 666.379147] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x4, 0x5, [0x5, 0x40, 0xff, 0x1f, 0x10000]}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x7f}, 0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000400)={r2, 0x9, 0x5, 0x80}, 0x10) socketpair(0xa, 0x3, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={r2, 0x9, 0x90, 0x80000001}, 0x10) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000140)={0xc4, &(0x7f0000000240)="fd5ee0ab78ee5ee356a9d5de5084957b703df3143ee45da30df838df5b2477cb1bb1a50f9629abe167ba3385f72c034a8afb916bfb05e543dd5cfa757fdf8136eff2c7e859a0fe5157a348ef357e953325478da6721802d1532c74c6e16bf96476535bd83e5f0d6db632a55f210fdcba29fd7f57249a1aa9837f714b7579c7e110044f9ee3ab03a281e0daa98bc240ec4eabced2cb4143def85e177f3c6474e86dff4b1f008092a182ecf0f4f62bc93f47c541f845a7807cdcc938742fc1565b457b2666"}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x0, 0x6, [0xffffffff, 0x0, 0x1f, 0x1f, 0x9, 0x1]}, &(0x7f00000004c0)=0x14) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:30 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xae00, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x74d1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x47a}, &(0x7f0000000200)=0x8) 2033/05/18 03:37:30 executing program 7: r0 = syz_open_dev$adsp(&(0x7f0000000700)='/dev/adsp#\x00', 0x1, 0x80000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x1, 0x0, 0x0, "8811e78754a739d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e01000000000000009d325ebac7627ffe7a54cdbd77b3"}, 0x60) sendmmsg(r1, &(0x7f0000000680)=[{{&(0x7f00000000c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)="b0faf2eae6058bcbfbb1e341793ba4219823ca51977a4e3740cf64", 0x1b}, {&(0x7f0000000200)="9b7588e3", 0x4}, {&(0x7f0000000240)="c5c9b2a2c4bb75a0cc4764ba19c02edd39a58907540ba6d01fb8aa223d9f3cd5b77671e37deaf502d73118e89d4ffc2f6bfaf4d387", 0x35}, {&(0x7f0000000280)="d1d3336890256d9c24da7f3bcfce403fa94c94605709592a69ef8dd34a01025c4bf4235a0891bfac7250829a47ce61487f14f13852db18dee7ea4bbf74d5ab6b260e3356e9150502d225953126e8e7aa44ad714c214779868f0e457041271ce7c78bc90229fd26f4c61b9dcb2abadd5906b5fa72f9017c59db57ff0dea7911e601773dd3262f6a90", 0x88}], 0x4, 0x0, 0x0, 0x804}, 0xb59b206}, {{&(0x7f0000000380)=@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000400)="014696dbce2f9ea855798b4bfd414024681587e6046456161ad23545ddbcf38f432deddaad5008975c8ad458675be1d8612e585c72e1fca6d6c73336fc9621f305a1ee6824b9", 0x46}, {&(0x7f0000000480)="29b6a5069596e9c92e271eff6873b67a1360d054475714e859600747719bd88ae143b10d421b489ef57d6a834efb33a82fdbc8ff612dcdf0ce10d8afb16635aef939b6812d42aee9e1e5f78c2904dd360d10d09db89b7adf0896aae86de6d00790bcca2b4d1b66a90c92eec0ce63ba7b47411d1424741117d08ae5100367e135e8c089cc2a0b737b698640356e31549e0ef237291d260532c410b9404180dea6691a31cda154f00dd198", 0xaa}, {&(0x7f0000000540)="a75647a7e6d90a6733410c2bb74bf04a1ae3c07cb6a04bef66747624323917c82f668ee0df964c31ac8cb6f9e5efa7908768d5aaf99a992c967fae10e078f15bf86b8de1b00ee2df37e20d5ffeee64d6c215692b8eb210442d38a37defddc92fe1a1c49ca5a5eae3ef3f68981149d719f15259bb05de5b813889d14f8d7af92b11c23352d918848071ef1fe3137d617ab814c5e64bf4973ea02e7431aae7d0068deb0cbeb54e455d514dfb580c1f853461e17a4f1a8bfac5a08fcc92c8a6e5a718d8e1c5da18a852fd204ece393100", 0xcf}], 0x3, 0x0, 0x0, 0x10}}], 0x2, 0x0) [ 666.443083] FAULT_INJECTION: forcing a failure. [ 666.443083] name failslab, interval 1, probability 0, space 0, times 0 [ 666.454414] CPU: 1 PID: 11659 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 666.461700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.471063] Call Trace: [ 666.473676] dump_stack+0x1b9/0x294 [ 666.477342] ? dump_stack_print_info.cold.2+0x52/0x52 [ 666.478005] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:30 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)='aead\x00', 0x2) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000140)={0x1, 0x4}) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@assoc={0x18, 0x117, 0x4, 0x4}], 0x18}, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 666.482560] should_fail.cold.4+0xa/0x1a [ 666.482589] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 666.482608] ? zap_class+0x720/0x720 [ 666.505798] ? print_usage_bug+0xc0/0xc0 [ 666.509892] ? graph_lock+0x170/0x170 [ 666.513713] ? lock_downgrade+0x8e0/0x8e0 [ 666.517883] ? avtab_read_item+0x3f0/0x12b0 [ 666.522233] ? find_held_lock+0x36/0x1c0 [ 666.526319] ? __lock_is_held+0xb5/0x140 [ 666.530396] ? avtab_read_item+0x3f0/0x12b0 [ 666.534758] ? check_same_owner+0x320/0x320 [ 666.539097] ? __might_sleep+0x95/0x190 2033/05/18 03:37:30 executing program 0: r0 = socket(0xa, 0x1, 0x5) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x2100, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000140)={&(0x7f0000ffb000/0x2000)=nil, 0xffffffff, 0x5, 0x2, &(0x7f0000ffb000/0x1000)=nil, 0x7}) r2 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001021e8158c400000000008eabe1af85e734e59cd9eb927d00"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:30 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4000000000009, 0x100000000000008) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x401) [ 666.543095] ? rcu_note_context_switch+0x710/0x710 [ 666.548057] __should_failslab+0x124/0x180 [ 666.552312] should_failslab+0x9/0x14 [ 666.556127] __kmalloc+0x2c8/0x760 [ 666.559685] ? __kmalloc_node+0x47/0x70 [ 666.563671] ? __list_lru_init+0xdd/0x790 [ 666.567846] __list_lru_init+0xdd/0x790 [ 666.571844] ? list_lru_destroy+0x4c0/0x4c0 [ 666.576181] ? mark_held_locks+0xc9/0x160 [ 666.580349] ? __raw_spin_lock_init+0x1c/0x100 [ 666.584949] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 666.589994] ? lockdep_init_map+0x9/0x10 [ 666.594084] sget_userns+0x767/0xf00 [ 666.597809] ? get_anon_bdev+0x2f0/0x2f0 [ 666.601909] ? destroy_unused_super.part.11+0x110/0x110 [ 666.607288] ? __alloc_pages_nodemask+0xacf/0xd70 [ 666.612160] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 666.617200] ? kasan_check_read+0x11/0x20 [ 666.621368] ? cap_capable+0x1f9/0x260 [ 666.625284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.630835] ? security_capable+0x99/0xc0 [ 666.635007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2033/05/18 03:37:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) pkey_alloc(0x0, 0x1) 2033/05/18 03:37:30 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000680)={0x26, 'hash\x00', 0x0, 0x0, 'sm4\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000740)="b7f212e23bfa282b98933dc7e56659063a", 0xffffffffffffff43) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)='aead\x00', &(0x7f0000000180)='selinux*#em0:)vboxnet1)\x00'], &(0x7f0000000540)=[&(0x7f0000000200)='!\x00', &(0x7f0000000240)='self$\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000380)='^-md5sum\x00', &(0x7f00000003c0)='ppp0\x00', &(0x7f0000000400)='system$\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='gcm_base(ctr(aes-aesni),ghash-generic)\x00', &(0x7f00000004c0)='procwlan1GPLkeyring\x00', &(0x7f0000000500)="74727573746564706f7369785f61636c5f616363657373d3c300"]) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) [ 666.640565] ? ns_capable_common+0x13f/0x170 [ 666.644993] ? get_anon_bdev+0x2f0/0x2f0 [ 666.649071] sget+0x10b/0x150 [ 666.652195] ? fuse_get_root_inode+0x190/0x190 [ 666.656795] mount_nodev+0x33/0x110 [ 666.660445] fuse_mount+0x2c/0x40 [ 666.663915] mount_fs+0xae/0x328 [ 666.667303] vfs_kern_mount.part.34+0xd4/0x4d0 [ 666.671908] ? may_umount+0xb0/0xb0 [ 666.675553] ? _raw_read_unlock+0x22/0x30 [ 666.679719] ? __get_fs_type+0x97/0xc0 [ 666.683635] do_mount+0x564/0x3070 [ 666.687191] ? do_raw_spin_unlock+0x9e/0x2e0 [ 666.691626] ? copy_mount_string+0x40/0x40 [ 666.695880] ? rcu_pm_notify+0xc0/0xc0 [ 666.699798] ? copy_mount_options+0x5f/0x380 [ 666.704220] ? rcu_read_lock_sched_held+0x108/0x120 [ 666.709253] ? kmem_cache_alloc_trace+0x616/0x780 [ 666.714118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 666.719684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.725239] ? copy_mount_options+0x285/0x380 [ 666.729763] ksys_mount+0x12d/0x140 [ 666.733404] __x64_sys_mount+0xbe/0x150 [ 666.737388] ? trace_hardirqs_on_caller+0x421/0x5c0 2033/05/18 03:37:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x400000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x800, 0x52) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 666.742430] do_syscall_64+0x1b1/0x800 [ 666.746334] ? finish_task_switch+0x1ca/0x840 [ 666.750850] ? syscall_return_slowpath+0x5c0/0x5c0 [ 666.755806] ? syscall_return_slowpath+0x30f/0x5c0 [ 666.760764] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 666.766153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 666.771028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.776229] RIP: 0033:0x455a09 [ 666.779427] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:37:30 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x854, 0xc0201) connect$nfc_llcp(r1, &(0x7f0000000380)={0x27, 0x1, 0x0, 0x4, 0x101, 0x75, "1cd9bac0aa6d6cafe37ea4c386b8975e80491a1531f0e7243063d0ad9830db7d4869748d3b23383e2c19147d7a54a77b195a90ddad71ebdc53c780126cdad3", 0x17}, 0x60) getpeername$packet(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x410010}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@bridge_delneigh={0x24, 0x1d, 0x804, 0x70bd2b, 0x25dfdbfc, {0xf, 0x0, 0x0, r2, 0x21, 0x4, 0x4}, [@NDA_DST_IPV4={0x8, 0x1, @remote={0xac, 0x14, 0x14, 0xbb}}]}, 0x24}, 0x1}, 0x20044004) perf_event_open(&(0x7f0000000140)={0x2, 0x254, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x2, 0x800, 0x3f, "d11416e4898b61d78247899576afa1eeef366cf028c50810b37a876ff285f5c2feb6790c1b231120d42f88967ef8325d59e46912b85a5a94d9e5a86cce5c48", 0x25}, 0x60) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 666.783740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 666.787148] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 666.787161] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 666.787172] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 666.787182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 666.787194] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:30 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x34, 0x1734) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:30 executing program 1 (fault-call:2 fault-nth:28): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:30 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:30 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) socket(0x3, 0x3, 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:30 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x23) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) 2033/05/18 03:37:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf401000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000340)=[{&(0x7f00000004c0)="f89878c71c443408ce9f786be9800f7fb4cfa24d11de825ff097e6885c93c60785bc3669254fad0e5137c4e84216d56662805fbfdac2b633b9674143d2dc19bfa374a611300fd30a4a760b6459786b767fefac2eb69488706f3ac9d5603e9aab4d87ac98ee15000f6f27620045c7bfe472a1b942fe6d155e3fe6f9d9e5b154be1b3ed5e6e0b403abed416140543d627efe74ff8870a8e3055884ed90f7baec4ef8be36c0e2d547da6917ee6bb017a85de9", 0xb1}, {&(0x7f0000000300)="33174fd8c6d059d8", 0x8}, {&(0x7f0000000580)="f1107d5c8fb5d68be1ce62ff87114fb8b4e893df448f064317f2da37d259fc95fde6a061ff3f20f28b1d9cab155bf4ad9db54850c3585b0fba4222a7b91fad18fbab417e45a052be3e14b89e7d151d40e8b5d5916a2057c8021b93486470d877c366e8b87a57e14490c3cea0cd42a992eb148e90ff958bab351e1e7fdd2bf14438d20f8a5ad51feeeb6323fd08a5e6168b9dd3dc461a1f2b873763ec8db3a90d1efab521a0fd40261af3b45bf3b018be0ac9e062d72ac5570a9e4f79b86b277e08e1500eb3e648d4ea9ad52d6ab6059f78df0283c176804298a4a278f2", 0xdd}, {&(0x7f0000000680)="f49818f30a1c4edae7e399c7aa93ca82a72397288517e569afedf6d059be5913a8b4b0a08b6abe89facac0ecf467fcab8d3df4cf16defb816c3782f0c3bf49ae2f4ac2699c3cebf8a2832e7e822049970c1abd30a7608cb92251cece8b32875e604a16ad1f5b0861ae207ebd", 0x6c}], 0x4, 0x8) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000180)) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000140)="2633ef0a20897f5541243d0398f82d80be80c6b270142d97a2d35b6003be") sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x8000, 0x0, 0x5, 0x5, 0x7, 0xd8, 0x8001, {0x0, @in={{0x2, 0x4e20}}, 0x1ff, 0x2, 0x3f, 0x7113, 0xffffffffffff5f05}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e23, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x8c2}}}, 0x84) [ 667.007669] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 667.040636] FAT-fs (loop1): bogus number of reserved sectors [ 667.046723] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:30 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = accept(0xffffffffffffff9c, &(0x7f00000001c0)=@ethernet={0x0, @link_local}, &(0x7f00000000c0)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 2033/05/18 03:37:30 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffff7f00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000040)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0xd6, [], 0x1, &(0x7f0000000140)=[{}], &(0x7f0000000240)=""/214}, &(0x7f0000000340)=0x78) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x20200, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 667.136301] FAULT_INJECTION: forcing a failure. [ 667.136301] name failslab, interval 1, probability 0, space 0, times 0 [ 667.147620] CPU: 0 PID: 11729 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 667.154901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.164255] Call Trace: [ 667.166858] dump_stack+0x1b9/0x294 [ 667.170507] ? dump_stack_print_info.cold.2+0x52/0x52 [ 667.175729] should_fail.cold.4+0xa/0x1a [ 667.179811] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 667.184928] ? save_stack+0x43/0xd0 [ 667.188568] ? kmem_cache_alloc_trace+0x152/0x780 [ 667.193420] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 667.198615] ? __list_lru_init+0x456/0x790 [ 667.202855] ? sget_userns+0x767/0xf00 [ 667.206757] ? graph_lock+0x170/0x170 [ 667.210566] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 667.215329] ? do_mount+0x564/0x3070 [ 667.219052] ? ksys_mount+0x12d/0x140 [ 667.222861] ? __x64_sys_mount+0xbe/0x150 [ 667.227015] ? do_syscall_64+0x1b1/0x800 [ 667.231086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.236464] ? find_held_lock+0x36/0x1c0 [ 667.240552] ? __lock_is_held+0xb5/0x140 [ 667.244648] ? check_same_owner+0x320/0x320 [ 667.248983] ? rcu_note_context_switch+0x710/0x710 [ 667.253931] __should_failslab+0x124/0x180 [ 667.258183] should_failslab+0x9/0x14 [ 667.261991] kmem_cache_alloc_trace+0x2cb/0x780 [ 667.266666] ? __kmalloc_node+0x33/0x70 [ 667.270647] ? __kmalloc_node+0x33/0x70 [ 667.274631] ? rcu_read_lock_sched_held+0x108/0x120 [ 667.279667] __memcg_init_list_lru_node+0x17d/0x2c0 [ 667.284695] ? kvfree_rcu+0x20/0x20 [ 667.288334] ? __kmalloc_node+0x47/0x70 [ 667.292330] __list_lru_init+0x456/0x790 [ 667.296407] ? list_lru_destroy+0x4c0/0x4c0 [ 667.300738] ? mark_held_locks+0xc9/0x160 [ 667.304905] ? __raw_spin_lock_init+0x1c/0x100 [ 667.309504] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 667.314543] ? lockdep_init_map+0x9/0x10 [ 667.318621] sget_userns+0x767/0xf00 [ 667.322340] ? get_anon_bdev+0x2f0/0x2f0 [ 667.326424] ? destroy_unused_super.part.11+0x110/0x110 [ 667.331797] ? __alloc_pages_nodemask+0xacf/0xd70 [ 667.336662] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 667.341696] ? kasan_check_read+0x11/0x20 [ 667.345864] ? cap_capable+0x1f9/0x260 [ 667.349774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.355318] ? security_capable+0x99/0xc0 [ 667.359488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.365036] ? ns_capable_common+0x13f/0x170 [ 667.369461] ? get_anon_bdev+0x2f0/0x2f0 [ 667.373535] sget+0x10b/0x150 [ 667.376659] ? fuse_get_root_inode+0x190/0x190 [ 667.381250] mount_nodev+0x33/0x110 [ 667.384888] fuse_mount+0x2c/0x40 [ 667.388352] mount_fs+0xae/0x328 [ 667.391736] vfs_kern_mount.part.34+0xd4/0x4d0 [ 667.396335] ? may_umount+0xb0/0xb0 [ 667.399976] ? _raw_read_unlock+0x22/0x30 [ 667.404134] ? __get_fs_type+0x97/0xc0 [ 667.408044] do_mount+0x564/0x3070 [ 667.411606] ? copy_mount_string+0x40/0x40 [ 667.415848] ? rcu_pm_notify+0xc0/0xc0 [ 667.419764] ? copy_mount_options+0x5f/0x380 [ 667.424182] ? rcu_read_lock_sched_held+0x108/0x120 [ 667.429209] ? kmem_cache_alloc_trace+0x616/0x780 [ 667.434071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 667.439617] ? _copy_from_user+0xdf/0x150 [ 667.443783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 667.449330] ? copy_mount_options+0x285/0x380 [ 667.453842] ksys_mount+0x12d/0x140 [ 667.457492] __x64_sys_mount+0xbe/0x150 [ 667.461476] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 667.466510] do_syscall_64+0x1b1/0x800 [ 667.470405] ? finish_task_switch+0x1ca/0x840 [ 667.474912] ? syscall_return_slowpath+0x5c0/0x5c0 [ 667.479853] ? syscall_return_slowpath+0x30f/0x5c0 [ 667.484798] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 667.490179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 667.495042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.500239] RIP: 0033:0x455a09 [ 667.503431] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 667.511158] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 667.518438] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 667.525719] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 667.532993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 667.540267] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 667.595819] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:31 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0x3, 0x10000) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000300)={0xfb19, 0x29605a17, 0x7, 0x80}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8801e787543b27a81d6dd6a40fa8c8b9024d86cdc834bc040000800000000021ccf67e1d7b2acabe9e068dd58ce505000000325ebac7627ffe7a54cdbd77b3"}, 0x5d) r2 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x4ec000000000000, 0x200101) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x3fffffffc, 0x3, 0x200, 0x7}, {0x7bc5, 0x0, 0xf05b, 0x9}]}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000001c0)={{0xffffffffffffffff, 0x2, 0x72d, 0x3, 0x62d1}, 0x740f, 0x84e3, 'id0\x00', 'timer0\x00', 0x0, 0x1, 0x400, 0x8, 0x9}) 2033/05/18 03:37:31 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockname(r0, &(0x7f0000000000)=@rc, &(0x7f00000000c0)=0x80) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="0a263792a6dd092e5ec3d61771aad885919a823c3caf015b17f4d8476bad9352abb65d9e90f4eeebe507cd0865ac8aa75aa5af24f1852963ec84da8a08ddd8cdb1935a671937dffb98728dda518954e59db5370d090ead8a14333dcb99e1e3c4a5f3de9add92bcbe909b22aefb2d902b0ac548dfaea9b5fccf9e5ee3c3a5f658e9e5b0402fab0d88f1afd6ba3743311312df3428d82b7fb622828800ed9b59722625aa01e9828911b0c8cd8caa80410da9ff88b8416c99c33ca78cb95e7983f5902412c2344fabeb023cfa7022e034277053bffa550cd2d7a17243cc08baa53187d1d1c02a57ac4fa118753d49d836", 0xef, 0x7}, {&(0x7f00000002c0)="3dbd99ba4055967afb7323839aa09616b6453f855ee023f0752dd7282a1bf2d23008bd741093e503005c87c3954a705bfef91570a62d7380091e07acd179c988ecb3b0c1b1ab1d6a52223ae82529d7d9bc3371585da9ea5ca39a4a0e", 0x5c, 0x10000}, {&(0x7f0000000340)="8868", 0x2, 0x7f}], 0x8, &(0x7f0000000400)=ANY=[]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000480)) 2033/05/18 03:37:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:31 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4305000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:31 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000022000102af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:31 executing program 1 (fault-call:2 fault-nth:29): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) [ 667.705724] f2fs_msg: 6 callbacks suppressed [ 667.705738] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 667.717321] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 667.719503] FAT-fs (loop1): bogus number of reserved sectors [ 667.730790] FAT-fs (loop1): Can't find a valid FAT filesystem [ 667.742889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:31 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 667.753924] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 667.761146] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 667.785703] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 667.792845] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 667.813692] FAULT_INJECTION: forcing a failure. [ 667.813692] name failslab, interval 1, probability 0, space 0, times 0 [ 667.825006] CPU: 1 PID: 11768 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 667.832294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.841660] Call Trace: [ 667.844268] dump_stack+0x1b9/0x294 [ 667.844329] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 667.847910] ? dump_stack_print_info.cold.2+0x52/0x52 [ 667.847955] should_fail.cold.4+0xa/0x1a [ 667.847981] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 667.855065] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 667.860185] ? save_stack+0x43/0xd0 [ 667.860206] ? kmem_cache_alloc_trace+0x152/0x780 [ 667.860223] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 667.860240] ? __list_lru_init+0x456/0x790 [ 667.895034] ? sget_userns+0x767/0xf00 [ 667.898940] ? graph_lock+0x170/0x170 [ 667.902750] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 667.907513] ? do_mount+0x564/0x3070 [ 667.911233] ? ksys_mount+0x12d/0x140 [ 667.915044] ? __x64_sys_mount+0xbe/0x150 [ 667.919207] ? do_syscall_64+0x1b1/0x800 [ 667.923277] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 667.928654] ? find_held_lock+0x36/0x1c0 [ 667.932737] ? __lock_is_held+0xb5/0x140 [ 667.936838] ? check_same_owner+0x320/0x320 [ 667.941179] ? rcu_note_context_switch+0x710/0x710 [ 667.946131] __should_failslab+0x124/0x180 [ 667.950385] should_failslab+0x9/0x14 [ 667.954195] kmem_cache_alloc_trace+0x2cb/0x780 [ 667.958873] ? __kmalloc_node+0x33/0x70 [ 667.962856] ? __kmalloc_node+0x33/0x70 [ 667.966842] ? rcu_read_lock_sched_held+0x108/0x120 [ 667.971883] __memcg_init_list_lru_node+0x17d/0x2c0 [ 667.976925] ? kvfree_rcu+0x20/0x20 [ 667.980572] ? __kmalloc_node+0x47/0x70 [ 667.984574] __list_lru_init+0x456/0x790 [ 667.988655] ? list_lru_destroy+0x4c0/0x4c0 [ 667.992986] ? mark_held_locks+0xc9/0x160 [ 667.997150] ? __raw_spin_lock_init+0x1c/0x100 [ 668.001746] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 668.006787] ? lockdep_init_map+0x9/0x10 [ 668.010869] sget_userns+0x767/0xf00 [ 668.014593] ? get_anon_bdev+0x2f0/0x2f0 [ 668.018681] ? destroy_unused_super.part.11+0x110/0x110 [ 668.024057] ? __alloc_pages_nodemask+0xacf/0xd70 [ 668.028921] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 668.033964] ? kasan_check_read+0x11/0x20 [ 668.038150] ? cap_capable+0x1f9/0x260 [ 668.042072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.047620] ? security_capable+0x99/0xc0 [ 668.051785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.057332] ? ns_capable_common+0x13f/0x170 [ 668.061755] ? get_anon_bdev+0x2f0/0x2f0 [ 668.065825] sget+0x10b/0x150 [ 668.068955] ? fuse_get_root_inode+0x190/0x190 [ 668.073557] mount_nodev+0x33/0x110 [ 668.077201] fuse_mount+0x2c/0x40 [ 668.080669] mount_fs+0xae/0x328 [ 668.084060] vfs_kern_mount.part.34+0xd4/0x4d0 [ 668.088662] ? may_umount+0xb0/0xb0 [ 668.092303] ? _raw_read_unlock+0x22/0x30 [ 668.096458] ? __get_fs_type+0x97/0xc0 [ 668.100370] do_mount+0x564/0x3070 [ 668.103929] ? do_raw_spin_unlock+0x9e/0x2e0 [ 668.108364] ? copy_mount_string+0x40/0x40 [ 668.112611] ? rcu_pm_notify+0xc0/0xc0 [ 668.116522] ? copy_mount_options+0x5f/0x380 [ 668.120947] ? rcu_read_lock_sched_held+0x108/0x120 [ 668.125980] ? kmem_cache_alloc_trace+0x616/0x780 [ 668.130853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.136424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.141975] ? copy_mount_options+0x285/0x380 [ 668.146494] ksys_mount+0x12d/0x140 [ 668.150140] __x64_sys_mount+0xbe/0x150 [ 668.154122] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 668.159154] do_syscall_64+0x1b1/0x800 [ 668.163050] ? finish_task_switch+0x1ca/0x840 [ 668.167563] ? syscall_return_slowpath+0x5c0/0x5c0 [ 668.172506] ? syscall_return_slowpath+0x30f/0x5c0 [ 668.177453] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 668.182842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.187711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.192909] RIP: 0033:0x455a09 [ 668.196111] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 668.203838] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 668.211114] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 668.218387] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 668.225661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 668.232943] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 668.254969] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 668.262063] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 2033/05/18 03:37:32 executing program 0: r0 = socket(0xc, 0x800, 0x0) exit(0x8080) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7df6, 0x40202) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100), 0x8) ioctl$TCSETSF(r1, 0x5100, &(0x7f0000000000)) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000228eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) r3 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000240)={{0x35, 0x7, 0x5, 0xfba, "0173692bc141cfe4af32afd37eaffd66f8bcbf9fda6798224244acbdf70f2900d3ed41e15de1fb100decc4dc"}, 0x0, 0x0, 0x6, r3, 0x100000000, 0x7, "b6efdd206e8f6a2b38e6799e387609a800ac278f20b186e74e17fb6970cf56a6984a834da56df3523204f57ee6f9a49b5f18881cd40f658f57c77cedca79da10", &(0x7f0000000140)='/dev/sequencer2\x00', 0x10, [], [0x5, 0x3, 0xffffffff, 0x5]}) 2033/05/18 03:37:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x211, 0x400000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@loopback, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x25}, 0xfffffffffffffdf3) 2033/05/18 03:37:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x458cfc27) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f00000001c0)={0x1010000, 0x400000000007, 0x3, 0x8, 0x1e, 0xffffffffffffffff}) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x800, 0x0) flistxattr(r2, &(0x7f0000000200)=""/70, 0x46) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x80000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000240)={0x7, 0xff, 0x1}) r3 = getgid() fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0xc00) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:32 executing program 1 (fault-call:2 fault-nth:30): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(xts(cast6),sha1-generic)\x00'}, 0x58) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000380)=""/248) 2033/05/18 03:37:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 668.410362] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 668.429134] FAT-fs (loop1): bogus number of reserved sectors [ 668.435078] FAT-fs (loop1): Can't find a valid FAT filesystem [ 668.450834] QAT: Invalid ioctl 2033/05/18 03:37:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) accept4$inet(r0, &(0x7f0000000040)={0x0, 0x0, @rand_addr}, &(0x7f00000000c0)=0x10, 0x80800) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce5658f9a9d325ebac76274fe7a54cdbd77b3"}, 0x60) [ 668.491745] FAULT_INJECTION: forcing a failure. [ 668.491745] name failslab, interval 1, probability 0, space 0, times 0 [ 668.503133] CPU: 1 PID: 11803 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 668.510417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.519778] Call Trace: [ 668.522385] dump_stack+0x1b9/0x294 [ 668.526045] ? dump_stack_print_info.cold.2+0x52/0x52 [ 668.531278] should_fail.cold.4+0xa/0x1a [ 668.535371] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 668.540499] ? save_stack+0x43/0xd0 [ 668.544152] ? kmem_cache_alloc_trace+0x152/0x780 [ 668.549016] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 668.554799] ? __list_lru_init+0x456/0x790 [ 668.554821] ? sget_userns+0x767/0xf00 [ 668.562980] ? graph_lock+0x170/0x170 [ 668.566819] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 668.566836] ? do_mount+0x564/0x3070 [ 668.566852] ? ksys_mount+0x12d/0x140 [ 668.566869] ? __x64_sys_mount+0xbe/0x150 [ 668.566887] ? do_syscall_64+0x1b1/0x800 2033/05/18 03:37:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @broadcast=0xffffffff}, @in6={0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xfffffffffffffffc}, @in6={0xa, 0x4e22, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0xff}, @in={0x2, 0x4e23, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1ff}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in6={0xa, 0x4e23, 0x460a, @loopback={0x0, 0x1}, 0xff}, @in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}], 0xb0) [ 668.566912] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.566938] ? find_held_lock+0x36/0x1c0 [ 668.566966] ? __lock_is_held+0xb5/0x140 [ 668.567008] ? check_same_owner+0x320/0x320 [ 668.567033] ? rcu_note_context_switch+0x710/0x710 [ 668.567060] __should_failslab+0x124/0x180 [ 668.567084] should_failslab+0x9/0x14 [ 668.567101] kmem_cache_alloc_trace+0x2cb/0x780 [ 668.567118] ? __kmalloc_node+0x33/0x70 [ 668.626883] ? __kmalloc_node+0x33/0x70 [ 668.630885] ? rcu_read_lock_sched_held+0x108/0x120 [ 668.635940] __memcg_init_list_lru_node+0x17d/0x2c0 2033/05/18 03:37:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffffffb6, 0x400142) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x6, 0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 668.640980] ? kvfree_rcu+0x20/0x20 [ 668.644631] ? __kmalloc_node+0x47/0x70 [ 668.648634] __list_lru_init+0x456/0x790 [ 668.652720] ? list_lru_destroy+0x4c0/0x4c0 [ 668.657073] ? mark_held_locks+0xc9/0x160 [ 668.661247] ? __raw_spin_lock_init+0x1c/0x100 [ 668.665848] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 668.670897] ? lockdep_init_map+0x9/0x10 [ 668.674979] sget_userns+0x767/0xf00 [ 668.678708] ? get_anon_bdev+0x2f0/0x2f0 [ 668.682800] ? destroy_unused_super.part.11+0x110/0x110 [ 668.688184] ? __alloc_pages_nodemask+0xacf/0xd70 [ 668.693053] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 668.698093] ? kasan_check_read+0x11/0x20 [ 668.702265] ? cap_capable+0x1f9/0x260 [ 668.706184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.711734] ? security_capable+0x99/0xc0 [ 668.715909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.721462] ? ns_capable_common+0x13f/0x170 [ 668.725896] ? get_anon_bdev+0x2f0/0x2f0 [ 668.729974] sget+0x10b/0x150 [ 668.733106] ? fuse_get_root_inode+0x190/0x190 [ 668.737720] mount_nodev+0x33/0x110 [ 668.741368] fuse_mount+0x2c/0x40 [ 668.744841] mount_fs+0xae/0x328 [ 668.748232] vfs_kern_mount.part.34+0xd4/0x4d0 [ 668.752834] ? may_umount+0xb0/0xb0 [ 668.756475] ? _raw_read_unlock+0x22/0x30 [ 668.760640] ? __get_fs_type+0x97/0xc0 [ 668.764559] do_mount+0x564/0x3070 [ 668.768126] ? copy_mount_string+0x40/0x40 [ 668.772381] ? rcu_pm_notify+0xc0/0xc0 [ 668.776305] ? copy_mount_options+0x5f/0x380 [ 668.780734] ? rcu_read_lock_sched_held+0x108/0x120 [ 668.785858] ? kmem_cache_alloc_trace+0x616/0x780 [ 668.790728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 668.796284] ? _copy_from_user+0xdf/0x150 [ 668.800461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.806019] ? copy_mount_options+0x285/0x380 [ 668.810544] ksys_mount+0x12d/0x140 [ 668.814196] __x64_sys_mount+0xbe/0x150 [ 668.818187] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 668.823232] do_syscall_64+0x1b1/0x800 [ 668.827139] ? finish_task_switch+0x1ca/0x840 [ 668.831655] ? syscall_return_slowpath+0x5c0/0x5c0 [ 668.836603] ? syscall_return_slowpath+0x30f/0x5c0 [ 668.841554] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 668.846947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 668.851806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.857001] RIP: 0033:0x455a09 [ 668.860197] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 668.867925] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 668.875207] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 668.882488] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 2033/05/18 03:37:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x80000) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000040)) [ 668.889768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 668.897048] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0xaf, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x30482, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x4, [0x40, 0x100, 0x6, 0x5]}, 0xc) 2033/05/18 03:37:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x7a000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x202, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000140)=""/231) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0xff34, 0x9, 0x0, 0xffffffffffffffff, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r1 = socket(0x10, 0x2, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b0000005629dca633a0e2781ab18eeb0df8c012a34d3224ec85342498cdb22fe4e61164f99ea78d60ab6eae1b5ce2e43da7bbb8a6d6288d80a791e5576a56c3147f8d"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:33 executing program 1 (fault-call:2 fault-nth:31): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x10000000, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x20}, 0x60) [ 669.513687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 669.518604] FAT-fs (loop1): bogus number of reserved sectors [ 669.530079] FAT-fs (loop1): Can't find a valid FAT filesystem [ 669.530122] Unknown ioctl -1073172987 2033/05/18 03:37:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 669.580198] FAULT_INJECTION: forcing a failure. [ 669.580198] name failslab, interval 1, probability 0, space 0, times 0 [ 669.591551] CPU: 1 PID: 11845 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 669.598956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.599122] Unknown ioctl -1073172987 [ 669.608316] Call Trace: [ 669.608348] dump_stack+0x1b9/0x294 [ 669.608375] ? dump_stack_print_info.cold.2+0x52/0x52 [ 669.608409] should_fail.cold.4+0xa/0x1a 2033/05/18 03:37:33 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x4) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 2033/05/18 03:37:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = gettid() r2 = getpgid(0x0) setpgid(r1, r2) ioctl(r0, 0x8912, &(0x7f0000000000)="4626262c8523bf012cf66f") r3 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220001020000000000000000008eabe1af85025aabf3771b000000"], 0x1}, 0x1}, 0x0) 2033/05/18 03:37:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf401], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 669.627639] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 669.632768] ? save_stack+0x43/0xd0 [ 669.636516] ? kmem_cache_alloc_trace+0x152/0x780 [ 669.641380] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 669.646585] ? __list_lru_init+0x456/0x790 [ 669.650846] ? sget_userns+0x767/0xf00 [ 669.654755] ? graph_lock+0x170/0x170 [ 669.658596] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 669.663370] ? do_mount+0x564/0x3070 [ 669.667103] ? ksys_mount+0x12d/0x140 [ 669.670923] ? __x64_sys_mount+0xbe/0x150 [ 669.675091] ? do_syscall_64+0x1b1/0x800 [ 669.679171] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.684563] ? find_held_lock+0x36/0x1c0 [ 669.688657] ? __lock_is_held+0xb5/0x140 [ 669.692769] ? check_same_owner+0x320/0x320 [ 669.697514] ? rcu_note_context_switch+0x710/0x710 [ 669.702473] __should_failslab+0x124/0x180 [ 669.706730] should_failslab+0x9/0x14 [ 669.710551] kmem_cache_alloc_trace+0x2cb/0x780 [ 669.715237] ? __kmalloc_node+0x33/0x70 [ 669.719226] ? __kmalloc_node+0x33/0x70 [ 669.723223] ? rcu_read_lock_sched_held+0x108/0x120 2033/05/18 03:37:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001800)="b7f2288a933d5e93905e11e601c8846d", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000001c0)=""/148, 0x94}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000400)=""/236, 0xec}, {&(0x7f0000000500)=""/233, 0xe9}, {&(0x7f0000000680)=""/139, 0x8b}, {&(0x7f0000000740)=""/142, 0x8e}], 0x6, 0x0, 0x0, 0xed7}}, {{&(0x7f0000000880)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000900)=""/208, 0xd0}, {&(0x7f0000000a00)=""/154, 0x9a}, {&(0x7f0000000cc0)=""/131, 0x83}, {&(0x7f0000000d80)=""/204, 0xcc}, {&(0x7f0000000e80)=""/192, 0xc0}, {&(0x7f0000000f40)=""/210, 0xd2}, {&(0x7f0000000bc0)=""/87, 0x57}, {&(0x7f0000001040)=""/169, 0xa9}, {&(0x7f00000002c0)=""/26, 0x1a}, {&(0x7f0000001100)=""/235, 0xeb}], 0xa, &(0x7f0000000ac0)=""/42, 0x2a, 0x1}, 0x7}, {{&(0x7f00000012c0)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001340)=""/71, 0x47}], 0x1, &(0x7f0000001400)=""/143, 0x8f}, 0x401}, {{&(0x7f00000014c0)=@vsock, 0x80, &(0x7f0000001640)=[{&(0x7f0000001540)=""/74, 0x4a}, {&(0x7f00000015c0)=""/123, 0x7b}], 0x2, &(0x7f0000001680)=""/113, 0x71, 0x2}, 0x8}], 0x4, 0x40, 0x0) r2 = syz_open_dev$audion(&(0x7f0000001840)='/dev/audio#\x00', 0x8, 0x10040) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000018c0)={{{@in6=@mcast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000001a80)={&(0x7f0000001880)={0x10}, 0xc, &(0x7f0000001a40)={&(0x7f0000001a00)=@gettclass={0x24, 0x2a, 0x300, 0x70bd27, 0x25dfdbfe, {0x0, r3, {0xffff, 0xd}, {0x0, 0xfff3}, {0xffff, 0xa}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/audio\x00', 0x8000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000180)=0x68) 2033/05/18 03:37:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 669.728267] __memcg_init_list_lru_node+0x17d/0x2c0 [ 669.733293] ? kvfree_rcu+0x20/0x20 [ 669.736935] ? __kmalloc_node+0x47/0x70 [ 669.740940] __list_lru_init+0x456/0x790 [ 669.743241] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 669.745017] ? list_lru_destroy+0x4c0/0x4c0 [ 669.745037] ? mark_held_locks+0xc9/0x160 [ 669.745062] ? __raw_spin_lock_init+0x1c/0x100 [ 669.768396] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 669.773440] ? lockdep_init_map+0x9/0x10 [ 669.777527] sget_userns+0x767/0xf00 2033/05/18 03:37:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x200, 0x0) 2033/05/18 03:37:33 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000001600)='/dev/adsp#\x00', 0x5ac, 0x40000) sendto$inet(r0, &(0x7f0000001640)="675e9c4545047fb13929ca1b734e06e3087c794083c9d82b015f01263030dabf768bf97567e8eee5665322982285", 0x2e, 0x40, &(0x7f00000016c0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) r1 = socket(0xa, 0x7, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000001700)='/dev/mixer\x00', 0x100, 0x0) ioctl(r1, 0x8913, &(0x7f00000003c0)="4626262c8523bf012cf66f") recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)=""/239, 0xef}, {&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000500)=""/207, 0xcf}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0x4}, 0x2) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @multicast1}, &(0x7f0000000340)=0xc) r2 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000001680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000000000}, 0xc, &(0x7f0000000380)={&(0x7f0000001640)=ANY=[]}, 0x1}, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) [ 669.781254] ? get_anon_bdev+0x2f0/0x2f0 [ 669.785341] ? destroy_unused_super.part.11+0x110/0x110 [ 669.790722] ? __alloc_pages_nodemask+0xacf/0xd70 [ 669.795591] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 669.800631] ? kasan_check_read+0x11/0x20 [ 669.804807] ? cap_capable+0x1f9/0x260 [ 669.808727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.814284] ? security_capable+0x99/0xc0 [ 669.818459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.824014] ? ns_capable_common+0x13f/0x170 [ 669.828443] ? get_anon_bdev+0x2f0/0x2f0 [ 669.832521] sget+0x10b/0x150 [ 669.835653] ? fuse_get_root_inode+0x190/0x190 [ 669.840253] mount_nodev+0x33/0x110 [ 669.843900] fuse_mount+0x2c/0x40 [ 669.847374] mount_fs+0xae/0x328 [ 669.850765] vfs_kern_mount.part.34+0xd4/0x4d0 [ 669.855369] ? may_umount+0xb0/0xb0 [ 669.859015] ? _raw_read_unlock+0x22/0x30 [ 669.863177] ? __get_fs_type+0x97/0xc0 [ 669.867093] do_mount+0x564/0x3070 [ 669.870659] ? copy_mount_string+0x40/0x40 [ 669.874911] ? rcu_pm_notify+0xc0/0xc0 [ 669.878832] ? copy_mount_options+0x5f/0x380 [ 669.883257] ? rcu_read_lock_sched_held+0x108/0x120 [ 669.888290] ? kmem_cache_alloc_trace+0x616/0x780 [ 669.893159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 669.898719] ? _copy_from_user+0xdf/0x150 [ 669.902893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.908447] ? copy_mount_options+0x285/0x380 [ 669.912972] ksys_mount+0x12d/0x140 [ 669.916619] __x64_sys_mount+0xbe/0x150 [ 669.920613] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 669.925655] do_syscall_64+0x1b1/0x800 [ 669.929558] ? finish_task_switch+0x1ca/0x840 [ 669.934070] ? syscall_return_slowpath+0x5c0/0x5c0 [ 669.939019] ? syscall_return_slowpath+0x30f/0x5c0 [ 669.943985] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 669.949371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 669.951586] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 669.954237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.954253] RIP: 0033:0x455a09 [ 669.954264] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:37:33 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x86) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x3, 0xfffffffffffffffd}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x2800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 669.980656] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 669.987933] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 669.995213] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 670.002493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 670.009773] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:33 executing program 6: r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x80) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{}, {}, {}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x2, 0x0, 0x5a03a251, 0x6}, {0x200, 0x401, 0x1ff, 0x8}, {0x1c, 0x7fff, 0xffff, 0x8}, {0x39, 0xfffffffeffffffff, 0x101, 0x2b3}, {0xf473, 0x6, 0x4, 0x20}, {0x9, 0x4ba0, 0x6, 0x1f}, {0xff, 0x9, 0xfffffffffffffff7, 0x42673ffc}]}, 0x10) 2033/05/18 03:37:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r2, 0x32, "71f478bc52ac31a00fa5b225c4bd8ef5b34c05d417f578421f69508cb654ab693c2707d0bb9df937419270483aa8bff3ebdd"}, &(0x7f0000000280)=0x3a) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x100, 0x0) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000040)=0x4e) 2033/05/18 03:37:33 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40001, 0x0) r1 = accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x80000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x1, [0xc]}, &(0x7f0000000200)=0xa) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r3, 0x6}, &(0x7f0000000280)=0x8) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4800000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:33 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "c0d793dba50b0fd3782d03a0877da164a4e184fdd76d1a608d0dddf3505fafc97acfa0043061c3a4c79449e53d851e236d90728a02d4aff8753029b6565c307252177e3ac77eb58f"}, 0xfdb0) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x80000000000, 0x1, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000003840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) fcntl$addseals(r0, 0x409, 0xa) 2033/05/18 03:37:33 executing program 1 (fault-call:2 fault-nth:32): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) [ 670.117710] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x119100) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/159) 2033/05/18 03:37:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) getpeername$ax25(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x10) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 2033/05/18 03:37:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x400000, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000140)) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) [ 670.171242] FAT-fs (loop1): bogus number of reserved sectors [ 670.177181] FAT-fs (loop1): Can't find a valid FAT filesystem [ 670.236177] FAULT_INJECTION: forcing a failure. [ 670.236177] name failslab, interval 1, probability 0, space 0, times 0 [ 670.247638] CPU: 1 PID: 11924 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 670.254929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.264295] Call Trace: [ 670.266908] dump_stack+0x1b9/0x294 [ 670.270565] ? dump_stack_print_info.cold.2+0x52/0x52 [ 670.275803] should_fail.cold.4+0xa/0x1a [ 670.279890] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 670.285010] ? save_stack+0x43/0xd0 [ 670.288654] ? kmem_cache_alloc_trace+0x152/0x780 [ 670.293513] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 670.298721] ? __list_lru_init+0x456/0x790 [ 670.302975] ? sget_userns+0x767/0xf00 [ 670.306877] ? graph_lock+0x170/0x170 [ 670.310690] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 670.315454] ? do_mount+0x564/0x3070 [ 670.319176] ? ksys_mount+0x12d/0x140 [ 670.322983] ? __x64_sys_mount+0xbe/0x150 [ 670.327140] ? do_syscall_64+0x1b1/0x800 [ 670.331213] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.336593] ? find_held_lock+0x36/0x1c0 [ 670.340684] ? __lock_is_held+0xb5/0x140 [ 670.344785] ? check_same_owner+0x320/0x320 [ 670.349127] ? rcu_note_context_switch+0x710/0x710 [ 670.354076] __should_failslab+0x124/0x180 [ 670.358328] should_failslab+0x9/0x14 [ 670.362151] kmem_cache_alloc_trace+0x2cb/0x780 [ 670.366831] ? __kmalloc_node+0x33/0x70 [ 670.370816] ? __kmalloc_node+0x33/0x70 [ 670.374803] ? rcu_read_lock_sched_held+0x108/0x120 [ 670.379841] __memcg_init_list_lru_node+0x17d/0x2c0 [ 670.384872] ? kvfree_rcu+0x20/0x20 [ 670.388512] ? __kmalloc_node+0x47/0x70 [ 670.392510] __list_lru_init+0x456/0x790 [ 670.396591] ? list_lru_destroy+0x4c0/0x4c0 [ 670.400922] ? mark_held_locks+0xc9/0x160 [ 670.405086] ? __raw_spin_lock_init+0x1c/0x100 [ 670.409681] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 670.414719] ? lockdep_init_map+0x9/0x10 [ 670.418801] sget_userns+0x767/0xf00 [ 670.422525] ? get_anon_bdev+0x2f0/0x2f0 [ 670.426610] ? destroy_unused_super.part.11+0x110/0x110 [ 670.431985] ? __alloc_pages_nodemask+0xacf/0xd70 [ 670.436849] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 670.441885] ? kasan_check_read+0x11/0x20 [ 670.446052] ? cap_capable+0x1f9/0x260 [ 670.449965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.455509] ? security_capable+0x99/0xc0 [ 670.459675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.465226] ? ns_capable_common+0x13f/0x170 [ 670.469646] ? get_anon_bdev+0x2f0/0x2f0 [ 670.473720] sget+0x10b/0x150 [ 670.476844] ? fuse_get_root_inode+0x190/0x190 [ 670.481439] mount_nodev+0x33/0x110 [ 670.485081] fuse_mount+0x2c/0x40 [ 670.488551] mount_fs+0xae/0x328 [ 670.491939] vfs_kern_mount.part.34+0xd4/0x4d0 [ 670.496542] ? may_umount+0xb0/0xb0 [ 670.500184] ? _raw_read_unlock+0x22/0x30 [ 670.504342] ? __get_fs_type+0x97/0xc0 [ 670.508249] do_mount+0x564/0x3070 [ 670.511814] ? copy_mount_string+0x40/0x40 [ 670.516056] ? rcu_pm_notify+0xc0/0xc0 [ 670.519973] ? copy_mount_options+0x5f/0x380 [ 670.524390] ? rcu_read_lock_sched_held+0x108/0x120 [ 670.529417] ? kmem_cache_alloc_trace+0x616/0x780 [ 670.534275] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.539824] ? _copy_from_user+0xdf/0x150 [ 670.543991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.549556] ? copy_mount_options+0x285/0x380 [ 670.554073] ksys_mount+0x12d/0x140 [ 670.557717] __x64_sys_mount+0xbe/0x150 [ 670.561701] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 670.566742] do_syscall_64+0x1b1/0x800 [ 670.570643] ? finish_task_switch+0x1ca/0x840 [ 670.575153] ? syscall_return_slowpath+0x5c0/0x5c0 [ 670.580097] ? syscall_return_slowpath+0x30f/0x5c0 [ 670.585083] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 670.590468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 670.595333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.600532] RIP: 0033:0x455a09 [ 670.603726] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 670.611457] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 670.618732] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 670.626009] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 2033/05/18 03:37:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x486040, 0x100) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000002c0)={@remote={0xfe, 0x80, [], 0xbb}, 0x38, r3}) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:34 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = fcntl$dupfd(r0, 0x406, r0) getsockname$llc(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000000)) 2033/05/18 03:37:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000003840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) fcntl$addseals(r0, 0x409, 0xa) 2033/05/18 03:37:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3b24c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 670.633284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 670.640560] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x181000, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000001c0)) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000040)={0x1000, &(0x7f00000001c0)="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"}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000011c0)={0x2, 0x70, 0x8, 0x6, 0x3, 0x9a, 0x0, 0x6, 0x1000, 0x1, 0x1, 0x5, 0x7f, 0x8, 0x40, 0xabd, 0x6f9, 0x6, 0x2, 0xfffffffffffffff8, 0x80000001, 0x80, 0x7, 0x5, 0x10000, 0x6, 0x8001, 0x4, 0x2, 0x8, 0x0, 0x3, 0x4, 0x100000000, 0x80, 0x9, 0x401, 0x6, 0x0, 0x8fd, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x20000, 0x2, 0x7, 0x7, 0xffffffff, 0x5, 0x6}) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) fcntl$setown(r0, 0x8, r3) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f00000012c0)=&(0x7f0000001340)) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000001240)=0x80000000) [ 670.728108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921e0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xf}, 0x4c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r3 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r2, r3, 0x30, &(0x7f0000000040)={0x26, 0x5, 0x8d4, 0x4}) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0xf32c, {{0x2, 0x4e22}}, 0x1, 0x1, [{{0x2, 0x4e22, @broadcast=0xffffffff}}]}, 0x110) 2033/05/18 03:37:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000003840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) fcntl$addseals(r0, 0x409, 0xa) 2033/05/18 03:37:34 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x800000000400006, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x0, 0x100000000000, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x400000000}, 0xfffffffffffffe97) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f00000001c0)={"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"}) 2033/05/18 03:37:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) faccessat(r1, &(0x7f0000000140)='./file0\x00', 0x26, 0x200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0), 0xfffffffffffffe6d}], 0x1, &(0x7f0000000280), 0x3ca, 0x7fffffffffffe}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x10000, 0x0) 2033/05/18 03:37:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x689], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x9, 0x101000) openat(r2, &(0x7f0000000240)='./file0\x00', 0x0, 0xa3) r3 = dup3(r0, r0, 0x80004) getsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x840, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:34 executing program 1 (fault-call:2 fault-nth:33): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000040)=""/41) [ 670.936351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) recvfrom$packet(r2, &(0x7f0000000cc0)=""/4096, 0x1000, 0x42, &(0x7f0000000240)={0x11, 0x7, r3, 0x1, 0x6, 0x6}, 0x14) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000280)=[@assoc={0x18, 0x117, 0x4, 0x8}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_CONTROL(r4, 0x40086414, &(0x7f00000000c0)={0x3, 0x7fff}) 2033/05/18 03:37:34 executing program 7: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="0200763d52a3000000000000ee00000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000008800000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000923000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000000000000600", 0xc7, 0x80003}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x1, 0x0) close(r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000040)) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:34 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000003840)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = dup2(r0, r0) accept4$bt_l2cap(r2, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80800) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x60], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x3f, 0x8, 0x3, 0xcb6a, 0x100000001, 0xd6f, 0x2, {0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x1, 0x2, 0x4, 0x3de, 0x8}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x31000000000000, 0x4, 0x4, 0x7ff, r2}, 0x10) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f00000004c0)={r1, 0x1}) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x8000, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:34 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x20b, 0x8, 0x1000, 0x78, 0x0, 0x0, 0x0, 0x401, 0x0, 0x400000, 0x100, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x200000000000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000040)=&(0x7f00000000c0)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1e, &(0x7f00000001c0)=""/85, &(0x7f0000000000)=0x55) [ 671.167522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:35 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000240)={0x27, 0x0, 0x3, 0x1, 0x0, 0x0, "8811e78754a539d39c2bd6c5f2cd2f3e467a64cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce501009a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:37:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 671.331725] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 671.426638] FAT-fs (loop1): bogus number of reserved sectors [ 671.432718] FAT-fs (loop1): Can't find a valid FAT filesystem [ 671.445241] FAULT_INJECTION: forcing a failure. [ 671.445241] name failslab, interval 1, probability 0, space 0, times 0 [ 671.456552] CPU: 0 PID: 11973 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 671.463831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.473283] Call Trace: [ 671.475886] dump_stack+0x1b9/0x294 [ 671.479546] ? dump_stack_print_info.cold.2+0x52/0x52 [ 671.484776] should_fail.cold.4+0xa/0x1a [ 671.488855] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 671.493974] ? save_stack+0x43/0xd0 [ 671.497610] ? kmem_cache_alloc_trace+0x152/0x780 [ 671.502460] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 671.507655] ? __list_lru_init+0x456/0x790 [ 671.511896] ? sget_userns+0x767/0xf00 [ 671.515795] ? graph_lock+0x170/0x170 [ 671.519604] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 671.524366] ? do_mount+0x564/0x3070 [ 671.528088] ? ksys_mount+0x12d/0x140 [ 671.531894] ? __x64_sys_mount+0xbe/0x150 [ 671.536053] ? do_syscall_64+0x1b1/0x800 [ 671.540122] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.545504] ? find_held_lock+0x36/0x1c0 [ 671.549585] ? __lock_is_held+0xb5/0x140 [ 671.553681] ? check_same_owner+0x320/0x320 [ 671.558021] ? rcu_note_context_switch+0x710/0x710 [ 671.562972] __should_failslab+0x124/0x180 [ 671.567235] should_failslab+0x9/0x14 [ 671.571051] kmem_cache_alloc_trace+0x2cb/0x780 [ 671.575731] ? __kmalloc_node+0x33/0x70 [ 671.579712] ? __kmalloc_node+0x33/0x70 [ 671.583700] ? rcu_read_lock_sched_held+0x108/0x120 [ 671.588736] __memcg_init_list_lru_node+0x17d/0x2c0 [ 671.593769] ? kvfree_rcu+0x20/0x20 [ 671.597410] ? __kmalloc_node+0x47/0x70 [ 671.601406] __list_lru_init+0x456/0x790 [ 671.605485] ? list_lru_destroy+0x4c0/0x4c0 [ 671.609818] ? mark_held_locks+0xc9/0x160 [ 671.613981] ? __raw_spin_lock_init+0x1c/0x100 [ 671.618579] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 671.623615] ? lockdep_init_map+0x9/0x10 [ 671.627693] sget_userns+0x767/0xf00 [ 671.631414] ? get_anon_bdev+0x2f0/0x2f0 [ 671.635499] ? destroy_unused_super.part.11+0x110/0x110 [ 671.640873] ? __alloc_pages_nodemask+0xacf/0xd70 [ 671.645735] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 671.650767] ? kasan_check_read+0x11/0x20 [ 671.654931] ? cap_capable+0x1f9/0x260 [ 671.658840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.664384] ? security_capable+0x99/0xc0 [ 671.668548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.674096] ? ns_capable_common+0x13f/0x170 [ 671.678516] ? get_anon_bdev+0x2f0/0x2f0 [ 671.682587] sget+0x10b/0x150 [ 671.685707] ? fuse_get_root_inode+0x190/0x190 [ 671.690301] mount_nodev+0x33/0x110 [ 671.693941] fuse_mount+0x2c/0x40 [ 671.697422] mount_fs+0xae/0x328 [ 671.700813] vfs_kern_mount.part.34+0xd4/0x4d0 [ 671.705409] ? may_umount+0xb0/0xb0 [ 671.709047] ? _raw_read_unlock+0x22/0x30 [ 671.713209] ? __get_fs_type+0x97/0xc0 [ 671.717120] do_mount+0x564/0x3070 [ 671.720681] ? copy_mount_string+0x40/0x40 [ 671.724923] ? rcu_pm_notify+0xc0/0xc0 [ 671.728840] ? copy_mount_options+0x5f/0x380 [ 671.733261] ? rcu_read_lock_sched_held+0x108/0x120 [ 671.738293] ? kmem_cache_alloc_trace+0x616/0x780 [ 671.743165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.748713] ? copy_mount_options+0x285/0x380 [ 671.753231] ksys_mount+0x12d/0x140 [ 671.756875] __x64_sys_mount+0xbe/0x150 [ 671.760863] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 671.765898] do_syscall_64+0x1b1/0x800 [ 671.769794] ? finish_task_switch+0x1ca/0x840 [ 671.774304] ? syscall_return_slowpath+0x5c0/0x5c0 [ 671.779253] ? syscall_return_slowpath+0x30f/0x5c0 [ 671.784208] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 671.789594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 671.794463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.799660] RIP: 0033:0x455a09 [ 671.802855] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 671.810579] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 671.817853] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 671.825132] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 671.832410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 671.839686] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:35 executing program 1 (fault-call:2 fault-nth:34): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xc0000, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="15e0f823ba4e", 0x6}], 0x427f534417bd5e22, &(0x7f0000000280), 0xfffffef1, 0x4000000}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) io_setup(0x0, &(0x7f0000000240)=0x0) io_getevents(r3, 0xfffffffffffffffc, 0x5, &(0x7f0000000280)=[{}, {}, {}, {}, {}], &(0x7f0000000380)={0x77359400}) 2033/05/18 03:37:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x23, 0x7, "91e4be59b7c0b9378cc6e6385fd9ee2cbfcc0ab6f4828ba73ce28a"}, &(0x7f00000001c0), 0x1000) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) socket$netlink(0x10, 0x3, 0xf) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) 2033/05/18 03:37:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:35 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) 2033/05/18 03:37:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 671.953977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:35 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x41a300, 0xa6) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000001c0)={0x10002, 0x0, &(0x7f0000ff9000/0x4000)=nil}) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000040)) 2033/05/18 03:37:35 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000040)) 2033/05/18 03:37:35 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c, 0x2, 0x1, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f00000001c0)={[], 0x0, 0x21, 0xf2, 0x0, 0x0, 0x2000, 0x17004, [], 0xffff}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x9, 0x7, 0x4, 0x2, 0x0, 0x7, 0x80, 0x0, 0x4, 0x9, 0x4, 0xde4, 0xbc, 0x22, 0xfffffffffffff58a, 0x8, 0x8, 0x3426, 0xfff, 0x5, 0x100000000, 0x7, 0x1, 0x7, 0x3, 0xcc8, 0x6d83d80a, 0x0, 0x0, 0x3, 0x3, 0x401, 0x4d, 0x6, 0x160f, 0x100, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x10, 0x8501, 0x2, 0x3, 0x7, 0x7fffffff, 0x1ff}, r3, 0x1, r2, 0x2) ioctl$VT_RELDISP(r0, 0x5605) [ 671.996872] FAT-fs (loop1): bogus number of reserved sectors [ 672.002808] FAT-fs (loop1): Can't find a valid FAT filesystem [ 672.049355] FAULT_INJECTION: forcing a failure. [ 672.049355] name failslab, interval 1, probability 0, space 0, times 0 [ 672.060733] CPU: 0 PID: 12038 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 672.068022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.077389] Call Trace: [ 672.080003] dump_stack+0x1b9/0x294 [ 672.083667] ? dump_stack_print_info.cold.2+0x52/0x52 [ 672.088926] should_fail.cold.4+0xa/0x1a [ 672.093015] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 672.098151] ? save_stack+0x43/0xd0 [ 672.101932] ? kmem_cache_alloc_trace+0x152/0x780 [ 672.106798] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 672.112012] ? __list_lru_init+0x456/0x790 [ 672.116265] ? sget_userns+0x767/0xf00 [ 672.120179] ? graph_lock+0x170/0x170 [ 672.124002] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 672.128776] ? do_mount+0x564/0x3070 [ 672.132504] ? ksys_mount+0x12d/0x140 [ 672.136320] ? __x64_sys_mount+0xbe/0x150 [ 672.140489] ? do_syscall_64+0x1b1/0x800 [ 672.144566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.149959] ? find_held_lock+0x36/0x1c0 [ 672.154056] ? __lock_is_held+0xb5/0x140 [ 672.158179] ? check_same_owner+0x320/0x320 [ 672.162535] ? rcu_note_context_switch+0x710/0x710 [ 672.167508] __should_failslab+0x124/0x180 [ 672.171774] should_failslab+0x9/0x14 [ 672.175599] kmem_cache_alloc_trace+0x2cb/0x780 [ 672.180290] ? __kmalloc_node+0x33/0x70 [ 672.184286] ? __kmalloc_node+0x33/0x70 [ 672.188284] ? rcu_read_lock_sched_held+0x108/0x120 [ 672.193337] __memcg_init_list_lru_node+0x17d/0x2c0 [ 672.198383] ? kvfree_rcu+0x20/0x20 [ 672.202052] ? __kmalloc_node+0x47/0x70 [ 672.206062] __list_lru_init+0x456/0x790 [ 672.210159] ? list_lru_destroy+0x4c0/0x4c0 [ 672.214507] ? mark_held_locks+0xc9/0x160 [ 672.218676] ? __raw_spin_lock_init+0x1c/0x100 [ 672.223280] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 672.228330] ? lockdep_init_map+0x9/0x10 [ 672.232417] sget_userns+0x767/0xf00 [ 672.236148] ? get_anon_bdev+0x2f0/0x2f0 [ 672.240245] ? destroy_unused_super.part.11+0x110/0x110 [ 672.245622] ? __alloc_pages_nodemask+0xacf/0xd70 [ 672.250491] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 672.255531] ? kasan_check_read+0x11/0x20 [ 672.259702] ? cap_capable+0x1f9/0x260 [ 672.263616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.269171] ? security_capable+0x99/0xc0 [ 672.273339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.278893] ? ns_capable_common+0x13f/0x170 [ 672.283319] ? get_anon_bdev+0x2f0/0x2f0 [ 672.287394] sget+0x10b/0x150 [ 672.290517] ? fuse_get_root_inode+0x190/0x190 [ 672.295110] mount_nodev+0x33/0x110 [ 672.298751] fuse_mount+0x2c/0x40 [ 672.302220] mount_fs+0xae/0x328 [ 672.305613] vfs_kern_mount.part.34+0xd4/0x4d0 [ 672.310216] ? may_umount+0xb0/0xb0 [ 672.313858] ? _raw_read_unlock+0x22/0x30 [ 672.318016] ? __get_fs_type+0x97/0xc0 [ 672.321932] do_mount+0x564/0x3070 [ 672.325499] ? copy_mount_string+0x40/0x40 [ 672.329744] ? rcu_pm_notify+0xc0/0xc0 [ 672.333659] ? copy_mount_options+0x5f/0x380 [ 672.338080] ? rcu_read_lock_sched_held+0x108/0x120 [ 672.343110] ? kmem_cache_alloc_trace+0x616/0x780 [ 672.347975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 672.353528] ? _copy_from_user+0xdf/0x150 [ 672.357708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.363255] ? copy_mount_options+0x285/0x380 [ 672.367775] ksys_mount+0x12d/0x140 [ 672.371421] __x64_sys_mount+0xbe/0x150 [ 672.375405] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 672.380439] do_syscall_64+0x1b1/0x800 [ 672.384340] ? finish_task_switch+0x1ca/0x840 [ 672.388848] ? syscall_return_slowpath+0x5c0/0x5c0 [ 672.393793] ? syscall_return_slowpath+0x30f/0x5c0 [ 672.398742] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 672.404127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 672.409003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.414203] RIP: 0033:0x455a09 [ 672.417398] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 672.425120] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 672.432400] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 672.439677] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000040)=0xd000) 2033/05/18 03:37:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 672.446951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 672.454234] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 672.495278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:36 executing program 1 (fault-call:2 fault-nth:35): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x20000) ioctl$KDSETLED(r1, 0x4b32, 0x5e) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:36 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000001280)=[{&(0x7f00000001c0)="347e6ee7a6a6c94796b7d864070a13a76e581a5d7ca8bde8032fcc732f3be1f6e131e0778ef9ef9e2108698176384fcc6aa2ab7a4dfeeb77bc7a7f065d852baff052eb4670e6f3a97e5bf6b026c7b7e109453b1e16d9562bd9b81cc091498d541b0cbb812ab0420f09e3fdf851199f1b67090caa24ed68f24bf8858ab3f9bfcb44d8add60835b7156704be9b43e875db", 0x90, 0x5}, {&(0x7f0000000280)="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", 0x1000}], 0x400, &(0x7f00000012c0)={[{@fsync_mode_posix='fsync_mode=posix', 0x2c}, {@noheap='noheap', 0x2c}, {@test_dummy_encryption='test_dummy_encryption', 0x2c}, {@alloc_mode_reuse='alloc_mode=reuse', 0x2c}, {@two_active_logs='active_logs=2', 0x2c}, {@heap='heap', 0x2c}, {@user_xattr='user_xattr', 0x2c}]}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000140)) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x275) r1 = accept(r0, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x5, 0xd422, 0x5, 0x6, 0x81, 0x9d7d, 0x1000, 0x9cbb, 0x8, 0x2, 0x40}, 0xb) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0xd36, 0x80000001, 0x8002, 0x2d1, 0x20, 0x8bd2, 0x9, 0x6, r2}, &(0x7f0000000240)=0x20) signalfd4(r0, &(0x7f0000000000)={0x80000001}, 0x8, 0x80800) 2033/05/18 03:37:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:36 executing program 6: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x80000, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockname$netrom(r0, &(0x7f00000003c0)=@full, &(0x7f0000000440)=0x48) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) sendto(r1, &(0x7f00000001c0)="f8bf03c83859e0d93351861fbd232b545a", 0x11, 0x20000084, &(0x7f0000000200)=@ipx={0x4, 0xbd, 0x9, "673cc7fbbd10", 0xfffffffffffffff8}, 0x80) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000380)=0xc) tkill(r2, 0x10) 2033/05/18 03:37:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 672.629518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 672.644097] FAT-fs (loop1): bogus number of reserved sectors [ 672.650072] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 672.704550] FAULT_INJECTION: forcing a failure. [ 672.704550] name failslab, interval 1, probability 0, space 0, times 0 [ 672.716084] CPU: 1 PID: 12073 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 672.723377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.732742] Call Trace: [ 672.735359] dump_stack+0x1b9/0x294 [ 672.739017] ? dump_stack_print_info.cold.2+0x52/0x52 [ 672.744254] should_fail.cold.4+0xa/0x1a [ 672.748346] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:37:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000840)="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", 0xffffffffffffff0a) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x40006) getsockopt$ax25_buf(r2, 0x101, 0x19, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) [ 672.753472] ? save_stack+0x43/0xd0 [ 672.757123] ? kmem_cache_alloc_trace+0x152/0x780 [ 672.761983] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 672.767189] ? __list_lru_init+0x456/0x790 [ 672.771445] ? sget_userns+0x767/0xf00 [ 672.775357] ? graph_lock+0x170/0x170 [ 672.777529] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 672.779168] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 672.779186] ? do_mount+0x564/0x3070 [ 672.779202] ? ksys_mount+0x12d/0x140 [ 672.779221] ? __x64_sys_mount+0xbe/0x150 [ 672.805963] ? do_syscall_64+0x1b1/0x800 [ 672.810043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.815432] ? find_held_lock+0x36/0x1c0 [ 672.819522] ? __lock_is_held+0xb5/0x140 [ 672.823631] ? check_same_owner+0x320/0x320 [ 672.827974] ? rcu_note_context_switch+0x710/0x710 [ 672.832934] __should_failslab+0x124/0x180 [ 672.837192] should_failslab+0x9/0x14 [ 672.841007] kmem_cache_alloc_trace+0x2cb/0x780 [ 672.845690] ? __kmalloc_node+0x33/0x70 [ 672.849680] ? __kmalloc_node+0x33/0x70 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 672.853673] ? rcu_read_lock_sched_held+0x108/0x120 [ 672.858715] __memcg_init_list_lru_node+0x17d/0x2c0 [ 672.863754] ? kvfree_rcu+0x20/0x20 [ 672.867431] ? __kmalloc_node+0x47/0x70 [ 672.871437] __list_lru_init+0x456/0x790 [ 672.875525] ? list_lru_destroy+0x4c0/0x4c0 [ 672.879867] ? mark_held_locks+0xc9/0x160 [ 672.882920] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 672.884029] ? __raw_spin_lock_init+0x1c/0x100 [ 672.884052] ? trace_hardirqs_on_caller+0x421/0x5c0 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf5ffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 672.884084] ? lockdep_init_map+0x9/0x10 [ 672.908052] sget_userns+0x767/0xf00 [ 672.911785] ? get_anon_bdev+0x2f0/0x2f0 [ 672.915879] ? destroy_unused_super.part.11+0x110/0x110 [ 672.921285] ? __alloc_pages_nodemask+0xacf/0xd70 [ 672.926157] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 672.931229] ? kasan_check_read+0x11/0x20 [ 672.935418] ? cap_capable+0x1f9/0x260 [ 672.939339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.944898] ? security_capable+0x99/0xc0 [ 672.949076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.954637] ? ns_capable_common+0x13f/0x170 [ 672.959070] ? get_anon_bdev+0x2f0/0x2f0 [ 672.960565] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 672.963139] sget+0x10b/0x150 [ 672.963165] ? fuse_get_root_inode+0x190/0x190 [ 672.963184] mount_nodev+0x33/0x110 [ 672.963204] fuse_mount+0x2c/0x40 [ 672.988239] mount_fs+0xae/0x328 [ 672.991645] vfs_kern_mount.part.34+0xd4/0x4d0 [ 672.996253] ? may_umount+0xb0/0xb0 [ 672.999897] ? _raw_read_unlock+0x22/0x30 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x60000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 673.004057] ? __get_fs_type+0x97/0xc0 [ 673.007967] do_mount+0x564/0x3070 [ 673.011540] ? copy_mount_string+0x40/0x40 [ 673.015791] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 673.020829] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 673.025618] ? retint_kernel+0x10/0x10 [ 673.029551] ? copy_mount_options+0x1d9/0x380 [ 673.034065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.039627] ? copy_mount_options+0x285/0x380 [ 673.041478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x543], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 673.044140] ksys_mount+0x12d/0x140 [ 673.044166] __x64_sys_mount+0xbe/0x150 [ 673.044182] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 673.044204] do_syscall_64+0x1b1/0x800 [ 673.070969] ? finish_task_switch+0x1ca/0x840 [ 673.075483] ? syscall_return_slowpath+0x5c0/0x5c0 [ 673.080432] ? syscall_return_slowpath+0x30f/0x5c0 [ 673.085386] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 673.090774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 673.095651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.100853] RIP: 0033:0x455a09 [ 673.104057] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 673.111785] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 673.119066] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 673.122751] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 673.126359] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 673.126371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 673.126382] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:37 executing program 1 (fault-call:2 fault-nth:36): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f00000001c0)={"eaec32448d2fe8239b1191f6ec3f760ad30c4fcee367abb05e12c889c7322ce967ba69792efc96a208bf15f9368ea68807d8474ab8509dab47c5679cd0dfa0e53f74fad07af645d438d1ec63f3c5e6d9a9dcc428a558ee2bca9433bb991fe7351421dd463e77953d245527c61814fb331190df581650508b2beb0be4592ec5cc434f94521423b9bcb988304c5e4a581b019e3f0f36b57e83c672795bb9fcddb76f27212d58c878a03037947d17d7f8de4b62ba31edd9a0efd502feb122bbae9a4059f0b2cca028f37474334ef00ba4b5bdc375c46b90e48a426c59248a93dba2444c2f4d73de8cffc69c366cede49c63a83cd0c9eee4c0440eb185c2b164fbb5310fcf079d571d29f36343036c6daeb2df832d43e54fd4344dae3bb516e302c14f7be4141065e42733e21cd35d728938cf983b7c3ad3ce280479bbb95ce35f4139181f229960fda4724aaadef7c8db6058b7f873c31b06ae294c327dd62ca398f459720b13a6ff51cb2fdc063def9d455e87e9f127181597c33eb36f761317e26350919a252cba1be0319acabb82db1db06ee4a8ce04a980f70ff48985d574fafe8f34ceb44889c24f5c755c48d093143b42918fe9c40c3db66b687c7e912fc2f742559b2d37bd8f434c62045c2c29f04e16e9710efce26a748ff73ef425dd37104d93bedcfee116adb3b70a8b604c112e1cba7d12d499fb23ad0e63b683217de0d15ef08c3ad914034c056f3ef8659569e24522080af0bd6775e675020fcd58aa12ed46acb4f36a29175e35163e46249a407016cf942ac329cf5813097217eadef99a00e163f061acab2774b59156fcf87b0d24569fc864e4c614758fb098c54c8bfc86a3ac3ea2bfbb421fbd4d3676a543285672be575d6493b8a43969d905ffc80118edbdbb1e56d838e9fe1c9b1fbaaa9b4aebc3d702e047ce6ba95c671b92ab3e5f9e13d9e151e472e74e6cae1dd7c2b7da26a273545783180e7c3006a8361989cf077e013093de31819079c54152d79b6beb7dc3e87a4f31bb3322f86d3fe368fe94c7b99bf3a5dc55894c41dfd54f5cc9745b81a789260f70066817bc394f4913458b74ca32b72a253bae616ddf9b034bca2c2aaf1602fd282aec92a6ee5a9511c330fe64319ac3d681a6c58b1c20d758d7913f36d6823ce9c9f2e18a70ca8de4f55c94f060603b46f7a6d5bf26aec388e5a1a8ff13326dd8d8b046870cc783ab7b74c8bbc727c981e33d6377487acee2d577e08c50fb715902c00e86f28a5838bb57e68a4080671616c2a1a89d3b453cebbce6c097129294cd5d5ed538dacd35aae9684a4c8a26c53384bdc0d38a1e027aa5c2032d84614814f105a3774acdcb8025f43e83338955fe1a75652f200ab0e81c16c46f464da895a85c2892e372c197a698a31a1519ed3e0e3fa9db238b36023d48b0aae72e622bfd473f"}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80, 0x101000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x1ff, 0xfffffffffffffff7, 0x4, 'queue1\x00', 0x7}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:37 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x4, 0xcc, [], 0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000380)=""/204}, &(0x7f0000000240)=0x78) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x7, 0x20000) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000480)={0x5, 0x0, [{0xc0000000, 0x3, 0x1, 0xe7, 0x3, 0x5, 0x6}, {0xc0000001, 0x4, 0x3, 0x4, 0x0, 0x5, 0x8}, {0x40000006, 0x81, 0x1, 0x0, 0x1f, 0x7f, 0x4f}, {0xd, 0xfff, 0x2, 0x1, 0x7f4c, 0x1000, 0xfffffffffffffffe}, {0xb, 0x9, 0x7, 0x856e, 0x4, 0x8000, 0x3ff}]}) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2033/05/18 03:37:37 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={r1, 0x0, 0x0, 0xd, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getpeername(r3, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, &(0x7f00000000c0)=0x80) bind$nfc_llcp(r2, &(0x7f0000000240)={0x27, 0x0, 0x0, 0x0, 0x400, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x1f1) 2033/05/18 03:37:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffff80], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:37 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x220040, 0x0) bind$rds(r0, &(0x7f0000000140)={0x2, 0x4e20, @rand_addr=0xd67}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:37 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x7) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000001c0)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0xb8, 0x8000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r2}, 0x10) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f00000000c0)=&(0x7f0000000040)) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x8201, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000100)={0x2, r3}) 2033/05/18 03:37:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x80006, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 673.304505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0xffffffffffffffff, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) clock_gettime(0x0, &(0x7f0000003300)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/79, 0x4f}, {&(0x7f0000000240)=""/122, 0x7a}, {&(0x7f00000002c0)=""/233, 0xe9}], 0x3, &(0x7f00000003c0)=""/48, 0x30, 0x1}, 0x10000}, {{&(0x7f0000000400)=@nfc, 0x80, &(0x7f0000001480)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, &(0x7f00000014c0)=""/134, 0x86, 0x4}}, {{&(0x7f0000001580)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001600)=""/232, 0xe8}], 0x1, &(0x7f0000001740)=""/224, 0xe0, 0x3}}, {{&(0x7f0000001840)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/75, 0x4b}, {&(0x7f0000001940)=""/91, 0x5b}], 0x2, &(0x7f0000001a00)=""/247, 0xf7, 0x7}, 0x40}, {{&(0x7f0000001b00)=@ipx, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b80)=""/23, 0x17}, {&(0x7f0000001bc0)=""/99, 0x63}], 0x2, &(0x7f0000001c80)=""/15, 0xf, 0xd98}, 0x400}, {{&(0x7f0000001cc0)=@can, 0x80, &(0x7f0000002f00)=[{&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/3, 0x3}, {&(0x7f0000002d80)=""/210, 0xd2}, {&(0x7f0000002e80)=""/127, 0x7f}], 0x4, &(0x7f0000002f40)=""/46, 0x2e, 0xb5}, 0x101}, {{&(0x7f0000002f80), 0x80, &(0x7f0000003080)=[{&(0x7f0000003000)=""/93, 0x5d}], 0x1, &(0x7f00000030c0)=""/89, 0x59, 0x2}, 0x5}], 0x7, 0x40000020, &(0x7f0000003340)={r1, r2+10000000}) getsockname$unix(r3, &(0x7f0000003380), &(0x7f0000003400)=0x6e) 2033/05/18 03:37:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 673.345728] FAT-fs (loop1): bogus number of reserved sectors [ 673.351712] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:37 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000000)='cpuset\x00') sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000100)=@ipx, 0x80, &(0x7f0000000180)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46, 0x7f}, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0xec3, 0x8000) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000200)={0xfff, 0x5, 0x2b84, 0xfff}, 0x10) [ 673.448540] FAULT_INJECTION: forcing a failure. [ 673.448540] name failslab, interval 1, probability 0, space 0, times 0 [ 673.460155] CPU: 1 PID: 12129 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 673.467448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.476818] Call Trace: [ 673.479434] dump_stack+0x1b9/0x294 [ 673.483090] ? dump_stack_print_info.cold.2+0x52/0x52 [ 673.488323] should_fail.cold.4+0xa/0x1a [ 673.492411] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:37:37 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100)={0x1, 0x400, 0x42, 0x20}, 0x8) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) [ 673.497532] ? save_stack+0x43/0xd0 [ 673.501188] ? kmem_cache_alloc_trace+0x152/0x780 [ 673.506048] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 673.511252] ? __list_lru_init+0x456/0x790 [ 673.515507] ? sget_userns+0x767/0xf00 [ 673.519414] ? graph_lock+0x170/0x170 [ 673.523232] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 673.528019] ? do_mount+0x564/0x3070 [ 673.531754] ? ksys_mount+0x12d/0x140 [ 673.535592] ? __x64_sys_mount+0xbe/0x150 [ 673.539754] ? do_syscall_64+0x1b1/0x800 [ 673.543830] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.549221] ? find_held_lock+0x36/0x1c0 [ 673.553314] ? __lock_is_held+0xb5/0x140 [ 673.557414] ? check_same_owner+0x320/0x320 [ 673.561762] ? rcu_note_context_switch+0x710/0x710 [ 673.566723] __should_failslab+0x124/0x180 [ 673.570976] should_failslab+0x9/0x14 [ 673.574787] kmem_cache_alloc_trace+0x2cb/0x780 [ 673.579475] ? __kmalloc_node+0x33/0x70 [ 673.583463] ? __kmalloc_node+0x33/0x70 [ 673.587452] ? rcu_read_lock_sched_held+0x108/0x120 [ 673.592488] __memcg_init_list_lru_node+0x17d/0x2c0 [ 673.597521] ? kvfree_rcu+0x20/0x20 [ 673.601160] ? __kmalloc_node+0x47/0x70 [ 673.605156] __list_lru_init+0x456/0x790 [ 673.609240] ? list_lru_destroy+0x4c0/0x4c0 [ 673.613578] ? mark_held_locks+0xc9/0x160 [ 673.617746] ? __raw_spin_lock_init+0x1c/0x100 [ 673.622346] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 673.627384] ? lockdep_init_map+0x9/0x10 [ 673.631459] sget_userns+0x767/0xf00 [ 673.635181] ? get_anon_bdev+0x2f0/0x2f0 [ 673.639269] ? destroy_unused_super.part.11+0x110/0x110 [ 673.644642] ? __alloc_pages_nodemask+0xacf/0xd70 [ 673.649515] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 673.654549] ? kasan_check_read+0x11/0x20 [ 673.658719] ? cap_capable+0x1f9/0x260 [ 673.662632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.668180] ? security_capable+0x99/0xc0 [ 673.672343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.677889] ? ns_capable_common+0x13f/0x170 [ 673.682312] ? get_anon_bdev+0x2f0/0x2f0 [ 673.686386] sget+0x10b/0x150 [ 673.689508] ? fuse_get_root_inode+0x190/0x190 [ 673.694103] mount_nodev+0x33/0x110 [ 673.698299] fuse_mount+0x2c/0x40 [ 673.701768] mount_fs+0xae/0x328 [ 673.705158] vfs_kern_mount.part.34+0xd4/0x4d0 [ 673.709755] ? may_umount+0xb0/0xb0 [ 673.713396] ? _raw_read_unlock+0x22/0x30 [ 673.717562] ? __get_fs_type+0x97/0xc0 [ 673.721469] do_mount+0x564/0x3070 [ 673.725019] ? do_raw_spin_unlock+0x9e/0x2e0 [ 673.729450] ? copy_mount_string+0x40/0x40 [ 673.733693] ? rcu_pm_notify+0xc0/0xc0 [ 673.737609] ? copy_mount_options+0x5f/0x380 [ 673.742027] ? rcu_read_lock_sched_held+0x108/0x120 [ 673.747151] ? kmem_cache_alloc_trace+0x616/0x780 [ 673.752010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 673.757572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.763118] ? copy_mount_options+0x285/0x380 [ 673.767634] ksys_mount+0x12d/0x140 [ 673.771279] __x64_sys_mount+0xbe/0x150 [ 673.775264] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 673.780300] do_syscall_64+0x1b1/0x800 [ 673.784195] ? finish_task_switch+0x1ca/0x840 [ 673.788701] ? syscall_return_slowpath+0x5c0/0x5c0 [ 673.793652] ? syscall_return_slowpath+0x30f/0x5c0 [ 673.798615] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 673.804001] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 673.808866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.814065] RIP: 0033:0x455a09 [ 673.817260] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 673.824983] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 673.832256] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 673.839531] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 673.846811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 673.854085] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:37 executing program 1 (fault-call:2 fault-nth:37): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:37 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ppoll(&(0x7f0000000000)=[{r0, 0x2000}], 0x1, &(0x7f0000000040), &(0x7f00000000c0)={0x18e}, 0x8) 2033/05/18 03:37:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x100000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) fcntl$setstatus(r0, 0x4, 0x40c0000) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x50201, 0x0) 2033/05/18 03:37:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 674.053973] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:37 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x210000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0x5000, 0x10000}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:37 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) recvmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000100)=@sco, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/95, 0x5f}], 0x1, &(0x7f0000000380)=""/186, 0xba, 0x9}, 0x2}, {{&(0x7f0000000440)=@sco, 0x80, &(0x7f0000000840)=[{&(0x7f00000004c0)=""/240, 0xf0}, {&(0x7f0000000680)=""/151, 0x97}, {&(0x7f0000000740)=""/220, 0xdc}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f00000002c0)=""/50, 0x32}], 0x5, &(0x7f00000008c0)=""/182, 0xb6, 0x20}, 0xaa2}, {{&(0x7f0000000980)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000cc0)=""/4096, 0x1000, 0x76}}, {{&(0x7f0000000a00)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000001cc0)=""/154, 0x9a}], 0x1, &(0x7f0000001d80)=""/223, 0xdf, 0xffffffff}}], 0x4, 0x10020, &(0x7f0000000ac0)={0x77359400}) sendto$inet(r1, &(0x7f0000000bc0)="085ef5b5d0b524eed79b0129878b179189c8e04e40bfa4f8f5e93c3d488c92f462e376c58aa037341854fd2e09c263df4543122523594ff53625a69c04d36ff9f8efef7b6f05bb44b5f21fd38677d06dbf31ed875e87d890e746fc037cf1a9bb526f50b0cdb20dc72be103b8", 0x6c, 0x80, &(0x7f0000001f80)={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000b00)=""/121, 0xffffffffffffffb1}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:37 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x5, 0x40) semop(r0, &(0x7f0000000000)=[{0x0, 0x2, 0x1000}, {0x4, 0xff, 0x800}, {0x5, 0x80000000, 0x800}, {0x1, 0x4, 0x800}, {0x4, 0x6, 0x800}, {0x0, 0x5, 0x800}, {0x5, 0x80000000, 0x800}], 0x7) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 674.102423] FAT-fs (loop1): bogus number of reserved sectors [ 674.108488] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x36a5) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 674.190785] FAULT_INJECTION: forcing a failure. [ 674.190785] name failslab, interval 1, probability 0, space 0, times 0 [ 674.202239] CPU: 1 PID: 12176 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 674.209544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.218907] Call Trace: [ 674.221526] dump_stack+0x1b9/0x294 [ 674.225183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 674.230411] should_fail.cold.4+0xa/0x1a [ 674.234501] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 674.239633] ? save_stack+0x43/0xd0 [ 674.243282] ? kmem_cache_alloc_trace+0x152/0x780 [ 674.248145] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 674.253350] ? __list_lru_init+0x456/0x790 [ 674.257603] ? sget_userns+0x767/0xf00 [ 674.261525] ? graph_lock+0x170/0x170 [ 674.265343] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 674.270112] ? do_mount+0x564/0x3070 [ 674.273842] ? ksys_mount+0x12d/0x140 [ 674.277652] ? __x64_sys_mount+0xbe/0x150 [ 674.281814] ? do_syscall_64+0x1b1/0x800 [ 674.285886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.291278] ? find_held_lock+0x36/0x1c0 [ 674.295363] ? __lock_is_held+0xb5/0x140 [ 674.299474] ? check_same_owner+0x320/0x320 [ 674.303828] ? rcu_note_context_switch+0x710/0x710 [ 674.308784] __should_failslab+0x124/0x180 [ 674.313035] should_failslab+0x9/0x14 [ 674.316853] kmem_cache_alloc_trace+0x2cb/0x780 [ 674.321536] ? __kmalloc_node+0x33/0x70 [ 674.325526] ? __kmalloc_node+0x33/0x70 [ 674.329511] ? rcu_read_lock_sched_held+0x108/0x120 [ 674.334558] __memcg_init_list_lru_node+0x17d/0x2c0 [ 674.339590] ? kvfree_rcu+0x20/0x20 [ 674.343229] ? __kmalloc_node+0x47/0x70 [ 674.347224] __list_lru_init+0x456/0x790 [ 674.351307] ? list_lru_destroy+0x4c0/0x4c0 [ 674.355639] ? mark_held_locks+0xc9/0x160 [ 674.359802] ? __raw_spin_lock_init+0x1c/0x100 [ 674.364398] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 674.369435] ? lockdep_init_map+0x9/0x10 [ 674.373517] sget_userns+0x767/0xf00 [ 674.377242] ? get_anon_bdev+0x2f0/0x2f0 [ 674.381333] ? destroy_unused_super.part.11+0x110/0x110 [ 674.386707] ? __alloc_pages_nodemask+0xacf/0xd70 [ 674.391570] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 674.396606] ? kasan_check_read+0x11/0x20 [ 674.400772] ? cap_capable+0x1f9/0x260 [ 674.404680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.410226] ? security_capable+0x99/0xc0 [ 674.414391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.419937] ? ns_capable_common+0x13f/0x170 [ 674.424360] ? get_anon_bdev+0x2f0/0x2f0 [ 674.428433] sget+0x10b/0x150 [ 674.431557] ? fuse_get_root_inode+0x190/0x190 [ 674.436151] mount_nodev+0x33/0x110 [ 674.439791] fuse_mount+0x2c/0x40 [ 674.443256] mount_fs+0xae/0x328 [ 674.446641] vfs_kern_mount.part.34+0xd4/0x4d0 [ 674.451240] ? may_umount+0xb0/0xb0 [ 674.454877] ? _raw_read_unlock+0x22/0x30 [ 674.459048] ? __get_fs_type+0x97/0xc0 [ 674.462956] do_mount+0x564/0x3070 [ 674.466509] ? do_raw_spin_unlock+0x9e/0x2e0 [ 674.470935] ? copy_mount_string+0x40/0x40 [ 674.475179] ? rcu_pm_notify+0xc0/0xc0 [ 674.479092] ? copy_mount_options+0x5f/0x380 [ 674.483516] ? rcu_read_lock_sched_held+0x108/0x120 [ 674.488550] ? kmem_cache_alloc_trace+0x616/0x780 [ 674.493411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 674.498974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.504528] ? copy_mount_options+0x285/0x380 [ 674.509050] ksys_mount+0x12d/0x140 [ 674.512697] __x64_sys_mount+0xbe/0x150 [ 674.516677] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 674.521708] do_syscall_64+0x1b1/0x800 [ 674.525603] ? finish_task_switch+0x1ca/0x840 [ 674.530111] ? syscall_return_slowpath+0x5c0/0x5c0 [ 674.535053] ? syscall_return_slowpath+0x30f/0x5c0 [ 674.540000] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 674.545383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 674.550248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.555443] RIP: 0033:0x455a09 [ 674.558640] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 674.566366] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 674.573641] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 674.580915] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 674.588190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 674.595463] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 674.625105] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:38 executing program 1 (fault-call:2 fault-nth:38): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000000)=""/53, 0x35) getrandom(&(0x7f00000001c0)=""/218, 0xda, 0x3) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) clock_nanosleep(0x7, 0x1, &(0x7f0000000000), 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000200)={0x2f, &(0x7f00000001c0)="30ae9dcc91b1960d8a35c17b97c9e109a3af31879748e5a9c663a127cde51a105a989370892eac80a2373c26a0dc1e"}) 2033/05/18 03:37:38 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x111a00, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000140)) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = dup2(r0, r0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000000)=0x8000) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x6, 0x4) [ 674.780686] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:38 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="64d12e3b45e851c9b7", 0x9) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getpeername$ipx(r2, &(0x7f0000000140), &(0x7f0000000180)=0x10) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c3cac751", @ANYRES16=r1, @ANYBLOB="fc824530e670e7ff49080e7df262bcdbdf0000"], 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x40080) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000380)={0x81, @time={0x77359400}, 0x6, {0x8, 0x5}, 0x9, 0x0, 0xa1}) sendto$unix(r0, &(0x7f0000000400)="eeb28f82557f9ba13f943c4007702c6ab5b3474b354307195f1cc51db9c1f29543aeeae40f9ae879c1ccec2cf8aaa49c2860b868d091880eb3957fd8845e0189e2c7efabd92c4595bfc2c10f1a7c8b0f7e6a401c7b1d4fd0a0bc3b2b6e897a0c4f9b", 0x62, 0x44840, &(0x7f0000000480)=@abs={0x0, 0x0, 0x4e22}, 0x6e) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x0) accept4$nfc_llcp(r2, &(0x7f00000001c0), &(0x7f0000000040)=0x60, 0x800) 2033/05/18 03:37:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x8001) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 2033/05/18 03:37:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x7, 0x1}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={r1, 0xfffffffffffffffd}, &(0x7f0000000200)=0x8) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) personality(0x8000010) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 674.854768] FAT-fs (loop1): bogus number of reserved sectors [ 674.860744] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 674.941555] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 674.954618] FAULT_INJECTION: forcing a failure. [ 674.954618] name failslab, interval 1, probability 0, space 0, times 0 [ 674.965948] CPU: 1 PID: 12225 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 674.973261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.982623] Call Trace: [ 674.985232] dump_stack+0x1b9/0x294 2033/05/18 03:37:38 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/rt_acct\x00') sendmmsg$nfc_llcp(r0, &(0x7f00000004c0)=[{&(0x7f0000000240)={0x27, 0x0, 0x0, 0x7, 0x401, 0x200, "9a5542cc1437a0970d718f0579db0d7c435673416cbdfc65677676437022631f375bfd4bb0cbf7352c2a355e5525648fd338461cd6d5944d2e3f165c648737", 0x3d}, 0x60, &(0x7f0000000440)=[{&(0x7f0000000300)="d4bcaa7a96a59d2f3daf5ae36c40ed08b2e901e0c3aea770cd2a1fe476dbbb553787c2d3ee16892eb8adc44ad1ba7f8267abe0c38cdb0549ed5bebd25178ae52e3fd90c3079d29bcda0d058e2194b64ab5c73c7d5fe589e96365", 0x5a}, {&(0x7f0000000380)="6d57ecc819baf38674479a47a5edaf50d0e2bae4ab4dd475e519ec0f97f30b0b2ac3438b108bce7ebf0395b550599b12de509f3c3f7608051d506ae4cfb434392297f8b9de7ac5dcd178e9bf6737d7a88581ab276586b49bcf0c264c19210e1e161e49b071a772093e3850369f5d4832a4c8d833c5fd48e5e7d8e6c0ba2b585dfb7e992f84c7b93bf60badbfd01696fc10587e7fd97743da358c99e4b1eb1c2bfd034aa0c25b8d4bf71f0b", 0xab}], 0x2, &(0x7f0000000480)={0x10, 0x113, 0x6}, 0x10, 0x20008004}], 0x1, 0x20000000) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f00000001c0)={0x7fff, 0x0, 0x3, 0x2, 0x5}) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x2, 0x5, 0xf3, 0x5, "0713b5f46cc69733b1ba4347d0b54a4be579e611080ca7e293fca4e29ec66fa1a552edbbffa40c4edc24d1ac6cb67fe235e720cba6189e364ba8090ff9f160", 0x2c}, 0x60) [ 674.988889] ? dump_stack_print_info.cold.2+0x52/0x52 [ 674.994127] should_fail.cold.4+0xa/0x1a [ 674.998217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 675.003349] ? save_stack+0x43/0xd0 [ 675.006996] ? kmem_cache_alloc_trace+0x152/0x780 [ 675.011857] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 675.017065] ? __list_lru_init+0x456/0x790 [ 675.021317] ? sget_userns+0x767/0xf00 [ 675.025226] ? graph_lock+0x170/0x170 [ 675.029045] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 675.033822] ? do_mount+0x564/0x3070 [ 675.037556] ? ksys_mount+0x12d/0x140 [ 675.041374] ? __x64_sys_mount+0xbe/0x150 [ 675.045540] ? do_syscall_64+0x1b1/0x800 [ 675.049622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.055013] ? find_held_lock+0x36/0x1c0 [ 675.059111] ? __lock_is_held+0xb5/0x140 [ 675.063212] ? check_same_owner+0x320/0x320 [ 675.067563] ? rcu_note_context_switch+0x710/0x710 [ 675.072523] __should_failslab+0x124/0x180 [ 675.076781] should_failslab+0x9/0x14 [ 675.080599] kmem_cache_alloc_trace+0x2cb/0x780 [ 675.085284] ? __kmalloc_node+0x33/0x70 [ 675.089280] ? __kmalloc_node+0x33/0x70 [ 675.093269] ? rcu_read_lock_sched_held+0x108/0x120 [ 675.098308] __memcg_init_list_lru_node+0x17d/0x2c0 [ 675.103339] ? kvfree_rcu+0x20/0x20 [ 675.106976] ? __kmalloc_node+0x47/0x70 [ 675.110973] __list_lru_init+0x456/0x790 [ 675.115054] ? list_lru_destroy+0x4c0/0x4c0 [ 675.119386] ? mark_held_locks+0xc9/0x160 [ 675.123552] ? __raw_spin_lock_init+0x1c/0x100 [ 675.128149] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 675.133187] ? lockdep_init_map+0x9/0x10 [ 675.137269] sget_userns+0x767/0xf00 [ 675.140990] ? get_anon_bdev+0x2f0/0x2f0 [ 675.145075] ? destroy_unused_super.part.11+0x110/0x110 [ 675.150450] ? __alloc_pages_nodemask+0xacf/0xd70 [ 675.155316] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 675.160349] ? kasan_check_read+0x11/0x20 [ 675.164517] ? cap_capable+0x1f9/0x260 [ 675.168431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.173978] ? security_capable+0x99/0xc0 [ 675.178146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.183693] ? ns_capable_common+0x13f/0x170 [ 675.188115] ? get_anon_bdev+0x2f0/0x2f0 [ 675.192185] sget+0x10b/0x150 [ 675.195309] ? fuse_get_root_inode+0x190/0x190 [ 675.199907] mount_nodev+0x33/0x110 [ 675.203551] fuse_mount+0x2c/0x40 [ 675.207020] mount_fs+0xae/0x328 [ 675.210408] vfs_kern_mount.part.34+0xd4/0x4d0 [ 675.215005] ? may_umount+0xb0/0xb0 [ 675.218646] ? _raw_read_unlock+0x22/0x30 [ 675.222804] ? __get_fs_type+0x97/0xc0 [ 675.226716] do_mount+0x564/0x3070 [ 675.230267] ? do_raw_spin_unlock+0x9e/0x2e0 [ 675.234687] ? interrupt_entry+0xb1/0xf0 [ 675.238767] ? copy_mount_string+0x40/0x40 [ 675.243016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 675.247791] ? retint_kernel+0x10/0x10 [ 675.251700] ? copy_mount_options+0x213/0x380 [ 675.256223] ? write_comp_data+0x1/0x70 [ 675.260215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.265764] ? copy_mount_options+0x285/0x380 [ 675.270279] ksys_mount+0x12d/0x140 [ 675.273923] __x64_sys_mount+0xbe/0x150 [ 675.277906] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 675.282940] do_syscall_64+0x1b1/0x800 [ 675.286840] ? finish_task_switch+0x1ca/0x840 [ 675.291348] ? syscall_return_slowpath+0x5c0/0x5c0 [ 675.296294] ? syscall_return_slowpath+0x30f/0x5c0 [ 675.301241] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 675.306624] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 675.311495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.316694] RIP: 0033:0x455a09 [ 675.319889] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 675.327611] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 675.334884] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 675.342161] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 675.349439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 675.356716] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:39 executing program 1 (fault-call:2 fault-nth:39): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x100000001, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001440)={@dev={0xfe, 0x80, [], 0x20}, 0x15, r2}) 2033/05/18 03:37:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x700], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:39 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0xf, 0x4, 0x4, 0xdc00, 0x0, 0xffffffffffffffff, 0x0, [0x8]}, 0x2c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40000, 0x0) r4 = fcntl$getown(r0, 0x9) fstat(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f00000001c0)={0x3, 0x7, r4, 0x3ee, r5, 0x95ea, 0x200, 0x2}) 2033/05/18 03:37:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000), &(0x7f00000001c0)=""/4096, &(0x7f0000000040)=""/63, 0x2000}) 2033/05/18 03:37:39 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x80000) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) bind$nfc_llcp(r1, &(0x7f0000000300)={0x27, 0x1, 0x1, 0x3, 0xd123, 0xfff, "69b6c52e74e05c449ec4c117521e10131a22432076fc276bef322461c5e1a21fdd3b700297a943ee8339bd4c5782e875fcf519f8ba418217659e78b1b26ad4", 0x19}, 0x60) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x101}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x9, 0x101, 0x204, 0x7, 0x5, 0x8000, 0x200, 0xf100, r3}, &(0x7f0000000240)=0x20) 2033/05/18 03:37:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1e}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 675.547607] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xffffff82}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:39 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4$llc(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x10, 0x800) accept4$llc(r1, 0x0, &(0x7f0000000240), 0x80800) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) tkill(r3, 0x40) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 2033/05/18 03:37:39 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) [ 675.548766] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 675.598122] FAT-fs (loop1): bogus number of reserved sectors [ 675.610965] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:39 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x8, 0x2000) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 2033/05/18 03:37:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:39 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x20, 0x4) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000180)={0x8000, 0x8, 0x10001}) r4 = socket(0xa, 0x1, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r5 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047"}], 0x0, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4004ae99, &(0x7f00000001c0)={0x4}) getsockname$packet(r3, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000b40)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000b80)={r7, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xa}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:39 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x82041, 0x0) getsockopt$ax25_buf(r1, 0x101, 0x19, &(0x7f00000001c0)=""/224, &(0x7f0000000040)=0xe0) [ 675.742862] FAULT_INJECTION: forcing a failure. [ 675.742862] name failslab, interval 1, probability 0, space 0, times 0 [ 675.754606] CPU: 1 PID: 12270 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 675.761895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.771260] Call Trace: [ 675.773868] dump_stack+0x1b9/0x294 [ 675.777525] ? dump_stack_print_info.cold.2+0x52/0x52 [ 675.782754] should_fail.cold.4+0xa/0x1a [ 675.786840] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 675.791959] ? graph_lock+0x170/0x170 [ 675.795780] ? graph_lock+0x170/0x170 [ 675.799589] ? graph_lock+0x170/0x170 [ 675.803408] ? find_held_lock+0x36/0x1c0 [ 675.807497] ? __lock_is_held+0xb5/0x140 [ 675.811595] ? check_same_owner+0x320/0x320 [ 675.815938] ? rcu_note_context_switch+0x710/0x710 [ 675.820885] __should_failslab+0x124/0x180 [ 675.825138] should_failslab+0x9/0x14 [ 675.828958] __kmalloc+0x2c8/0x760 [ 675.832506] ? up_read+0x110/0x110 [ 675.836055] ? down_read+0x1b0/0x1b0 [ 675.839793] ? match_number.isra.0+0xb6/0x260 [ 675.844311] match_number.isra.0+0xb6/0x260 [ 675.848650] ? match_strdup+0xa0/0xa0 [ 675.852464] ? match_wildcard+0x3c0/0x3c0 [ 675.856636] match_int+0x23/0x30 [ 675.860019] fuse_fill_super+0x812/0x1e20 [ 675.864263] ? fuse_get_root_inode+0x190/0x190 [ 675.869042] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 675.874077] ? kasan_check_read+0x11/0x20 [ 675.878242] ? cap_capable+0x1f9/0x260 [ 675.882152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.887699] ? security_capable+0x99/0xc0 [ 675.891867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.897417] ? ns_capable_common+0x13f/0x170 [ 675.901843] ? get_anon_bdev+0x2f0/0x2f0 [ 675.905914] ? sget+0x113/0x150 [ 675.909210] ? fuse_get_root_inode+0x190/0x190 [ 675.913803] mount_nodev+0x6b/0x110 [ 675.917446] fuse_mount+0x2c/0x40 [ 675.920916] mount_fs+0xae/0x328 [ 675.924304] vfs_kern_mount.part.34+0xd4/0x4d0 [ 675.928904] ? may_umount+0xb0/0xb0 [ 675.932540] ? _raw_read_unlock+0x22/0x30 [ 675.936696] ? __get_fs_type+0x97/0xc0 [ 675.940607] do_mount+0x564/0x3070 [ 675.944172] ? copy_mount_string+0x40/0x40 [ 675.948419] ? rcu_pm_notify+0xc0/0xc0 [ 675.952336] ? copy_mount_options+0x5f/0x380 [ 675.956755] ? rcu_read_lock_sched_held+0x108/0x120 [ 675.961780] ? kmem_cache_alloc_trace+0x616/0x780 [ 675.966643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 675.972194] ? _copy_from_user+0xdf/0x150 [ 675.976360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.981904] ? copy_mount_options+0x285/0x380 [ 675.986423] ksys_mount+0x12d/0x140 [ 675.990068] __x64_sys_mount+0xbe/0x150 [ 675.994052] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 675.999088] do_syscall_64+0x1b1/0x800 [ 676.002986] ? finish_task_switch+0x1ca/0x840 [ 676.007495] ? syscall_return_slowpath+0x5c0/0x5c0 [ 676.012448] ? syscall_return_slowpath+0x30f/0x5c0 [ 676.017398] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 676.022789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 676.027654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.032850] RIP: 0033:0x455a09 [ 676.036046] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 676.043768] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 676.051048] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 676.058324] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 676.065602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 676.072875] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 676.105956] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:40 executing program 1 (fault-call:2 fault-nth:40): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-vsock\x00', 0x2, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'os2.', 'selinuxposix_acl_accessselinux!posix_acl_access*-wlan1\x00'}, &(0x7f00000002c0)=""/255, 0xff) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)) socket$nl_crypto(0x10, 0x3, 0x15) 2033/05/18 03:37:40 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80000000, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000280)={@dev, @rand_addr}, &(0x7f00000002c0)=0xc) accept4$packet(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x14, 0x80800) recvmsg(r0, &(0x7f0000001a40)={&(0x7f00000004c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000000540)=""/17, 0x11}, {&(0x7f0000000580)=""/205, 0xcd}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=""/181, 0xb5}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/188, 0xbc}, {&(0x7f0000001840)=""/22, 0x16}, {&(0x7f0000001880)=""/46, 0x2e}, {&(0x7f00000018c0)=""/127, 0x7f}], 0x9, &(0x7f0000001a00)=""/10, 0xa, 0x7}, 0x100) getpeername$packet(r1, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001b40)={"657a7370616e30dfff00", r2}) bind$can_raw(r1, &(0x7f0000000180)={0x1d, r3}, 0x10) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) 2033/05/18 03:37:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88a8ffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:40 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x40100) sendmsg$alg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="7f3f5aa397bec32c5cda9e363275d921ff4a9854c43b22c2b056da96ef02e995", 0x20}, {&(0x7f0000000180)="92158004e335ff08033ba2ada4315e5d8c953e4436add74c0c08e4850aeb2785d9e2f107052e1c02f24c1dd2411acba21ee0a6022775780218a10d430374fffd57ef2751ccbfad938f78067c23e3f5e30e442b7ac02090b9e5cab5b0b5d726e4e43877fed2f7edc85c627d9eeb51e4c45a4fe4139ff94ad70b84e9b81af73c1db1dab57b21112ae330afea444833c99dbeb524e63acc871e0b1f5351b39389b4f90b6ea169c70dc96d84ae0c98df150cb75f0dc872366b2d25b4c82787a6088a54b6c580d4f89a60bfc16776ca854397577bb4080ea5973ff9660d4136fb2f", 0xdf}, {&(0x7f00000002c0)}], 0x3, &(0x7f00000003c0)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4, 0x200}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7b}, @op={0x18, 0x117, 0x3, 0x1}], 0xa8, 0x8000}, 0x8080) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="b7010000003d559166593ae164c990a0", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:40 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1ff, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x30}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:40 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$inet6(0xa, 0x807, 0x4, &(0x7f0000000040)) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000000)={0x2, 0x7}) [ 676.248348] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:40 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x34000}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:40 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x42, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x8, 0x7fffffff, 0x4, 0x9, 0x6, 0x10000, 0xfffffffffffffbff, 0x7fff, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000002c0)={0x3, 0x4}) 2033/05/18 03:37:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:40 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x1aa) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x4e21}}) r2 = dup3(r1, r0, 0x80000) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f00000001c0)=[0x81, 0x7]) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) [ 676.392343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 676.416702] Unknown ioctl 1076932219 2033/05/18 03:37:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x23}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 676.659110] FAT-fs (loop1): bogus number of reserved sectors [ 676.665087] FAT-fs (loop1): Can't find a valid FAT filesystem [ 676.715004] FAULT_INJECTION: forcing a failure. [ 676.715004] name failslab, interval 1, probability 0, space 0, times 0 [ 676.726404] CPU: 1 PID: 12345 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 676.733689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.743046] Call Trace: [ 676.745649] dump_stack+0x1b9/0x294 [ 676.749292] ? dump_stack_print_info.cold.2+0x52/0x52 [ 676.754509] should_fail.cold.4+0xa/0x1a [ 676.758588] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 676.763715] ? graph_lock+0x170/0x170 [ 676.767523] ? get_random_bytes+0x34/0x40 [ 676.771685] ? crng_backtrack_protect+0x80/0x80 [ 676.776379] ? find_held_lock+0x36/0x1c0 [ 676.780464] ? __lock_is_held+0xb5/0x140 [ 676.784560] ? check_same_owner+0x320/0x320 [ 676.788891] ? fuse_conn_init+0x744/0x900 [ 676.793051] ? rcu_note_context_switch+0x710/0x710 [ 676.797999] __should_failslab+0x124/0x180 [ 676.802247] should_failslab+0x9/0x14 [ 676.806060] kmem_cache_alloc_trace+0x2cb/0x780 [ 676.810762] fuse_dev_alloc+0xb5/0x4e0 [ 676.814660] ? __lock_is_held+0xb5/0x140 [ 676.818730] ? process_init_reply+0x1460/0x1460 [ 676.823421] ? rcu_read_lock_sched_held+0x108/0x120 [ 676.828447] ? kmem_cache_alloc_trace+0x616/0x780 [ 676.833300] ? match_wildcard+0x3c0/0x3c0 [ 676.837459] ? trace_hardirqs_on+0xd/0x10 [ 676.841630] fuse_fill_super+0xce0/0x1e20 [ 676.845803] ? fuse_get_root_inode+0x190/0x190 [ 676.850402] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 676.855439] ? kasan_check_read+0x11/0x20 [ 676.859605] ? cap_capable+0x1f9/0x260 [ 676.863521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.869068] ? security_capable+0x99/0xc0 [ 676.873239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.878786] ? ns_capable_common+0x13f/0x170 [ 676.883212] ? get_anon_bdev+0x2f0/0x2f0 [ 676.887297] ? sget+0x113/0x150 [ 676.890593] ? fuse_get_root_inode+0x190/0x190 [ 676.895198] mount_nodev+0x6b/0x110 [ 676.898843] fuse_mount+0x2c/0x40 [ 676.902310] mount_fs+0xae/0x328 [ 676.905706] vfs_kern_mount.part.34+0xd4/0x4d0 [ 676.910305] ? may_umount+0xb0/0xb0 [ 676.913947] ? _raw_read_unlock+0x22/0x30 [ 676.918106] ? __get_fs_type+0x97/0xc0 [ 676.922014] do_mount+0x564/0x3070 [ 676.925578] ? copy_mount_string+0x40/0x40 [ 676.929824] ? rcu_pm_notify+0xc0/0xc0 [ 676.933738] ? copy_mount_options+0x5f/0x380 [ 676.938156] ? rcu_read_lock_sched_held+0x108/0x120 [ 676.943186] ? kmem_cache_alloc_trace+0x616/0x780 [ 676.948052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.953601] ? _copy_from_user+0xdf/0x150 [ 676.957769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.963317] ? copy_mount_options+0x285/0x380 [ 676.967840] ksys_mount+0x12d/0x140 [ 676.971494] __x64_sys_mount+0xbe/0x150 [ 676.975480] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 676.980517] do_syscall_64+0x1b1/0x800 [ 676.984417] ? finish_task_switch+0x1ca/0x840 [ 676.988929] ? syscall_return_slowpath+0x5c0/0x5c0 [ 676.993875] ? syscall_return_slowpath+0x30f/0x5c0 [ 676.998823] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 677.004211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 677.009081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.014277] RIP: 0033:0x455a09 [ 677.017475] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 677.025198] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 677.032473] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 677.039747] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 677.047028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 677.054306] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:41 executing program 1 (fault-call:2 fault-nth:41): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:41 executing program 7: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0xe8200) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e20, 0x5, @empty, 0x80000000}, {0xa, 0x4e20, 0xc19, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, 0x0, [0x4, 0x101, 0x54, 0x8, 0x8, 0x2, 0x5, 0xe6]}, 0x5c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811a78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:41 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001740)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl(r0, 0x2c, &(0x7f0000001700)="322db5e90aaf4f97d8dbad96b984d37c9b8fe6740838be3959ddda99") ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000280)=&(0x7f0000001600)) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)="636c6561725f726566730042a4d1e606c8872b833842edadd4a86e53cd669a6b8903a7ad3c72dda964575d47b47ece54d0f5b39cdf94ef5e2e26b8f5a06124cd86928ef8d4b55b854afa1dcb027d307d56eef28d8c0bb16afe32aa328d3d448cee25eb919b5775d7bcbb84988184f240dc753a2bb33300bf5cd6") ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f00000015c0)={0xa, &(0x7f00000000c0)=[0x7ff, 0x100000001, 0x8, 0x4, 0x9075, 0x1000, 0xd5be, 0x81, 0x2, 0xffffffffffffff9f]}) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000100)={0x3, 0x0, &(0x7f0000000340)=""/4096, &(0x7f0000001800)=""/236, &(0x7f0000000000)=""/28, 0xf000}) getpeername$packet(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001480)=0x14) munlock(&(0x7f0000fef000/0x11000)=nil, 0x11000) getpeername$packet(r2, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000017c0)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000001580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)=@newtfilter={0x48, 0x2c, 0x610, 0x70bd25, 0x25dfdbfe, {0x0, r3, {0xa, 0xf}, {0x1, 0x8}, {0x4, 0xf}}, [@TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_CHAIN={0x8, 0xb, 0x8001}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0xc, 0x2, @TCA_BPF_OPS_LEN={0x8, 0x4, 0x7}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000001c0)={0x400, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e24, @multicast2=0xe0000002}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x4, 0x4, 0x6, 0xffff, 0x4, &(0x7f0000000040)='veth1_to_team\x00', 0x1, 0x9, 0x82}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000001640)={[0x27274460, 0x0, 0x6, 0x8000, 0x3, 0x3, 0x1, 0xb9b, 0x3f, 0x1, 0x3, 0x5, 0xffffffff, 0x22db, 0x2], 0x1f001, 0x100}) 2033/05/18 03:37:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8060000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2b}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:41 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x1d}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x4}, &(0x7f0000000200)=0x8) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x210101) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) arch_prctl(0x1004, &(0x7f0000000480)="ead96ea25663cca794152e9db29d0fd7a49499bf1fa7f905de0630d49475cb108edcb0fce121afc0e2a708e6b986eef6241ecd42ed05654e51672ada0df80c84cd8e2f11101555d7032e1ec200e2b683839cf56aef1c043939f1d9f4cb76dc7591e7f2ddbc3e121b51b37c12f9ffdfe1417613917555bbea5a9b675cd8e0db78c49f3b0b96f9baf279fa9f105b4e6c077921b3fe733eec5c7a7e57e3aec57ad55e2e7dc51fb280a9b070d02439962c7a3efe") recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000400)=@ipx, 0x80, &(0x7f0000000100)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x10000034, &(0x7f0000000c40)=""/70, 0x46}, 0x0) 2033/05/18 03:37:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:41 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x40) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @multicast1=0xe0000001}, {0x307, @random="5e24bcb2e4d5"}, 0x40, {0x2, 0x4e22, @multicast2=0xe0000002}, 'bcsf0\x00\x00\v\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x258, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast=0xffffffff, @remote={0xac, 0x14, 0x14, 0xbb}, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x7, 0x5, 0x3}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}, @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @multicast2=0xe0000002, 0xf, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) [ 677.322382] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 2033/05/18 03:37:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x31}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x80) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 677.322759] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 [ 677.383619] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 677.407329] FAT-fs (loop1): bogus number of reserved sectors [ 677.413311] FAT-fs (loop1): Can't find a valid FAT filesystem [ 677.466683] FAULT_INJECTION: forcing a failure. [ 677.466683] name failslab, interval 1, probability 0, space 0, times 0 [ 677.478250] CPU: 0 PID: 12369 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 677.485541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.494908] Call Trace: [ 677.497516] dump_stack+0x1b9/0x294 [ 677.501182] ? dump_stack_print_info.cold.2+0x52/0x52 [ 677.506410] should_fail.cold.4+0xa/0x1a [ 677.510500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 677.515641] ? graph_lock+0x170/0x170 [ 677.519481] ? save_stack+0xa9/0xd0 [ 677.523134] ? find_held_lock+0x36/0x1c0 [ 677.527227] ? __lock_is_held+0xb5/0x140 [ 677.531342] ? check_same_owner+0x320/0x320 [ 677.535686] ? trace_hardirqs_off+0xd/0x10 [ 677.539942] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 677.545069] ? rcu_note_context_switch+0x710/0x710 [ 677.550017] ? debug_check_no_obj_freed+0x2ff/0x584 [ 677.555149] __should_failslab+0x124/0x180 [ 677.559409] should_failslab+0x9/0x14 [ 677.563230] __kmalloc+0x2c8/0x760 [ 677.566798] ? match_strdup+0x5e/0xa0 [ 677.570633] match_strdup+0x5e/0xa0 [ 677.574280] fuse_match_uint+0x1a/0x60 [ 677.578190] fuse_fill_super+0x455/0x1e20 [ 677.582375] ? fuse_get_root_inode+0x190/0x190 [ 677.586984] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 677.592028] ? kasan_check_read+0x11/0x20 [ 677.596211] ? cap_capable+0x1f9/0x260 [ 677.600145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.605706] ? security_capable+0x99/0xc0 [ 677.609882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.615445] ? ns_capable_common+0x13f/0x170 [ 677.619879] ? get_anon_bdev+0x2f0/0x2f0 [ 677.623956] ? sget+0x113/0x150 [ 677.627257] ? fuse_get_root_inode+0x190/0x190 [ 677.631858] mount_nodev+0x6b/0x110 [ 677.635511] fuse_mount+0x2c/0x40 [ 677.638983] mount_fs+0xae/0x328 [ 677.642373] vfs_kern_mount.part.34+0xd4/0x4d0 [ 677.646979] ? may_umount+0xb0/0xb0 [ 677.650620] ? _raw_read_unlock+0x22/0x30 [ 677.654782] ? __get_fs_type+0x97/0xc0 [ 677.658702] do_mount+0x564/0x3070 [ 677.662272] ? copy_mount_string+0x40/0x40 2033/05/18 03:37:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000000)={0x3, 0x80000001}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:41 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) sendto(r0, &(0x7f0000000100)="db9da75c855fe4b6cae27b279825fb0904975222903e8f1984f12b36484f5ac6229baac7cc3c8bb71b50d42c6ffe5cabc7ec23ba742d2567d637c542f5d4f0042867951a3ceb157328b69e9d1dff97e1d5abc740359a97d054b1852446c1e1c906be47", 0x63, 0x4000000, &(0x7f0000000180)=@ax25={0x3, {"bb6de6c10529aa"}, 0x3}, 0x80) 2033/05/18 03:37:41 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100000001, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) connect$llc(r0, &(0x7f00000002c0)={0x1a, 0x31b, 0x1, 0x7, 0x4ed6, 0x3, @random="a17d08a89bae"}, 0x10) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0x7f, 0xf002}) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) sendfile(r1, r2, &(0x7f0000000280), 0x3) bind(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @broadcast=0xffffffff}, 0x80) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000240)={0x10}) 2033/05/18 03:37:41 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, &(0x7f0000000700)=[{&(0x7f0000000180)="c5b3330d929249d26693ca1dabc3b4786cea72c4382dbbcdcfcfa4bd54e0cd5b33974a4877fe75eb8f3baf1f0f81eb163eab4b9236a50a7fdd4994296acf8fca1f7878d53233a7201bf1f8043ba6ad77a18c2de61aba854af82fb11db4ed82bfc8e24827ea8704", 0x67, 0x3}, {&(0x7f0000000200)="ddf5a6fe6e9d0f5df115ce4a4353238d7b37cae9b86ca977e126de955644e716de7897a340ea9866801c0b71ac1bb0defd3e4a4b960e72254e80be3f9ef0dcffe3d9c50394533f", 0x47, 0xfff}, {&(0x7f0000000380)="51a8da52c20522d32bd16e6c4478bb4f364acecfbd22c82fb878d4b37ba06d870cc4e07d1f357d3067fa5ed6e495b87dcccad9c9970e0ee6516450862683db95fd5cfcc22095605b5254f16eca811b8761bb43fe0fbeb91214c367dd4831a458fa5bc096991bab546b40147454bec6c8dc2122ba6199e69bb0a2d882e39cc07dae3f93fb2b94834ec155670a6293cc18c560397ee723b2b2c70c277396f76789eb2d846ab6b3a87e9a96cc7e4ad811f293c77ff71483cca2c2", 0xb9, 0x8001}, {&(0x7f0000000440)="82e88b9fb8611709fd01711cb74bcd444179ab09d515e728cfc5d5a30f2ca31693a4974a24ea9b0837a455a29d275aaf50106455da0c85bc7bc836cc0fc9a3e1ae4fcb621b6ad6074f6be6f7401863a42f71f6f180b49951c10fd248e12018d4962e849a9f9eefc8dd74deb8", 0x6c, 0x7}, {&(0x7f00000004c0)="f9011160b378b75524f8803f8049085590e4e7e33b564fc0fb4d13a7950a2a816398585aa2512744f597321635c44cd1b727c65c5630145a48b2f4f9e48e94f391eb4aa0cf9a2c22dd7b120566f752da92080511", 0x54, 0x5}, {&(0x7f0000000540)="8ebfafd71afb5bb4f3d1a8a37e82d94e4460ef9ca4c7fe321b31444510de8d076115124da0a6f0542877e0ab56649c4eef9665d36122b38f5ecc43a0383d7218f4109b4b57992737ea4b97bc137ddfbab1e0b59cd30c982381ab471ad0efe0c79b146749c30b4524770b04558e829d8553bbdc47310fd8469e01f60cc1e0dd4ad1db1080d7544d3a002bc8c81d1eb6294a64a6dfdbfa5aae5e2a2c7a789fa4288cc936f64d2dd2c4843805", 0xab, 0x182}, {&(0x7f0000000680)="969f900f848602f97694c3e85d3f6323ce5924382770c58d6e02e244cdf83ee57d4369bb2b8573c093886e52814c7f921c8edaeff515cf04c7d5e9207c05a96e1112c6687a07c9f8030772338fd230d11b71a016ec62", 0x56, 0x1ff}], 0x40, &(0x7f00000007c0)={[{@nosuiddir='nosuiddir', 0x2c}, {@data_ordered='data=ordered', 0x2c}, {@quota_off='quota=off', 0x2c}, {@localcaching='localcaching', 0x2c}, {@nodiscard='nodiscard', 0x2c}, {@suiddir='suiddir', 0x2c}, {@rgrplvb='rgrplvb', 0x2c}, {@noquota='noquota', 0x2c}]}) 2033/05/18 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x401, 0x4000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000000c0)=0x4) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r3 = dup2(r0, r0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 677.666528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 677.671310] ? retint_kernel+0x10/0x10 [ 677.675229] ? copy_mount_options+0x1f0/0x380 [ 677.679749] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 677.684615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.690167] ? copy_mount_options+0x285/0x380 [ 677.694688] ksys_mount+0x12d/0x140 [ 677.698338] __x64_sys_mount+0xbe/0x150 [ 677.702326] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 677.707366] do_syscall_64+0x1b1/0x800 [ 677.711270] ? finish_task_switch+0x1ca/0x840 [ 677.715784] ? syscall_return_slowpath+0x5c0/0x5c0 [ 677.720738] ? syscall_return_slowpath+0x30f/0x5c0 [ 677.725692] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 677.731082] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 677.735954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.741159] RIP: 0033:0x455a09 [ 677.744359] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 677.752090] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 677.759371] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 677.766650] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 677.773931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 677.781213] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 677.801650] attempt to access beyond end of device [ 677.806693] loop6: rw=4096, want=136, limit=128 [ 677.811402] gfs2: error 10 reading superblock 2033/05/18 03:37:41 executing program 1 (fault-call:2 fault-nth:42): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:41 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x82000, 0x11) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000880)) getpeername$netrom(r2, &(0x7f00000007c0)=@full, &(0x7f0000000840)=0x48) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000fc0)=0x0) r4 = geteuid() getgroups(0x1, &(0x7f0000001000)=[0x0]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001280)={0x0}, &(0x7f00000012c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001300)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast1}}, &(0x7f0000001400)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001440)={0x0, 0x0, 0x0}, &(0x7f0000001480)=0xc) r9 = gettid() getresuid(&(0x7f0000001780)=0x0, &(0x7f00000017c0), &(0x7f0000001800)) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() lstat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getpgrp(0xffffffffffffffff) r16 = geteuid() fstat(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000001c00)=[{&(0x7f00000008c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000940)="8ec1f2b1bbfba1af761024387ae32cf35161a12eb067a84b4a6e5f00ead2af5517d714518a14fcb17cf90d52c12fafecd28e9ec88c3a93f3171e13b4", 0x3c}, {&(0x7f0000000b40)="8bdca6c52d6b33b88f1525fd4ab5288659b2d5a2d72a82b8d79aad5cbd8ff6d9c2265b617603a6aa4861f8bac577c1d732dfc5068e41b27d346b7b04e24b1727a0157f6f85194e175fe4b84ea25a94429b16bb99abb92dce9d6406002d6fabc8c407060da110cb447b265d979e231392a843348657c6e93b36f14a974a271636fb8982137e48c29c6acefd7725945b8252f0d38fdc812c8c3382ce043502e32732372e370cd756395fe16f83de5f38c7d74dc91c9336432aa46d69118ec1d858565f0bccd0eed2d1cb4e13ae7074b8f21c55de8dbd6bc9be", 0xd8}, {&(0x7f0000000980)="f81afc261555ad7f20540b5896951428cb405a9689e2e3cbecbcc08b5fce0be60541a763b0378e0f5c9acca920be6ec10e3797a391389db57372ff3696", 0x3d}, {&(0x7f0000000c40)="06b90d29cead26d2c9a76da8ebae0cf836f696e9bee180f533929f049ec3b757369d2580d739d401c7a0d9d6defe65115493f9ad323e5a72e1258efddc6c13f7824ce035c679eec540d24f472763f636f84841f37521df477b7a9e8a8d987a29275afc59c98285939a14ae9ae70ffa0fbc7c847049b3cb18c51c0caa69c47389842f86ce9a5603c996a730bf7c80666e9d9c81b9fbc2bb89f59c69a5610274c1a555319bae40c0e487aa4325fc020375c26ffeef2b8051cd3cd19352dc6371ea9f44cf841261abcfb1e6d3d2433d", 0xce}, {&(0x7f0000000d40)="da343f1f6bd832a6ed9ed4ea43f57d4cd488dd9ebd8f67e83cdd0f4384b14808e7620099b0b99c8e6d84284eeb697af1c36f62f0f47392742c766624ba31376b4417de45a4b1d91a242a489c5852565743a55696d49191d50c0b", 0x5a}, {&(0x7f0000000dc0)="8eb3c069d32fab784206e9c1d3553fa1621892592972a7ad000ac93618a652f93195fb291d8097955e4cd3a19ae3a979c9e03a90e35506d1ea4fe306a3dcf0a13137e1db22e220731ba1b56559a1a3ef4c6444658ac05fcf887154e19835a125f881245841d2d2e163ddf11a843052eaec4b1eca759dcaf164c386c290033e7a71a67d9b1f3cf454af40e904180d01090f3839f4bf5aba2505617bda4f5050dc1478ce3fe8166964e095b39ba340c354fecf714528de6a4202920a69d524abab407d555fbc57663dd68467b4b259704587af55b571f9f1c2710910fc9a39551720bd34c80472e0d7a8e68fe752b934d1", 0xf0}, {&(0x7f0000000ec0)="a575645f13055bfa5f583b7835a132ee667e238300ec20b6745dc2c8cb334f5dbfa66f15d70f297994f91d6d22e8c220875468600a4a3f39a87eaa8aa58890ec6302e32aaa6543851f9c48088b9427d5d87186793fc5b26a44169942e08f65e98e17784863f7adefa27c05327781eeb27699f9846e910de2e3", 0x79}], 0x7, &(0x7f0000001040)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r2, r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x50, 0x8040}, {&(0x7f00000010c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000001140)="40f75bfab9a18801536f6ee504bae35e4a42d4ff40d5643e0ee1aa976605be1c00053fc90caeb53ffab5eef3147e9769ee5ff57f6d488a25172570e81d42c3d64dce2d8b327b91a8d40dd4f7f23854b641ce268c770fb0d37fa9a47e7fdd8da04cf710627996b03b3b060121bd7c879fb13ad10c50e49865a6", 0x79}, {&(0x7f00000011c0)="af88c8c508017d46bc0d513c124ac4ca50febed1aed4f510af60bac758a71ac1704e171ca043c790a4e4e77e2d1b17dc1013564440512240336f422553624723c1a5fd97b176d244d3da9a800b9f0ca0316e9cd718fcdb582064138d3595273cb866e62df23d15964d405a8772656c19", 0x70}], 0x2, &(0x7f00000014c0)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x20, 0x80}, {&(0x7f0000001500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001740)=[{&(0x7f0000001580)}, {&(0x7f00000015c0)="298b81ac0443b93ab22c505e37aa42a254689b82fc60fe8ea5817ee572e096ed7ebd9e269e1e09a0aa4ad191ea7739d787ebf05981917a8a4680f5fb5d14e68111e7f67570a3bba3f6eb0ff7926d3ef842e33c510aab1793ff3a4ed79ffb322192d9c2a23bd35edccb860517bda4a2f9e44db9008d29e29dd95f3cbc062ec6cb487675dbbbfd31d6d34efc519f17c930c9caa1021aed7383cc02ccc2771e33ea1f9290cfe3f42d96fb21d573ff16ea71a84456c28781e1b051768f18c0d2a2fbec05ca3a45a12a751632f9f9deabde3ae6d30ce3f1bfbc35a8910b3f3aeb0d3da10209a05f9d3ea5a7c3f76857246321355963b837a91612ffb36d86", 0xfc}, {&(0x7f00000016c0)="dcaa9a84deeab7f1100bce0c0a426a3debae40358dbedb930fcc2682d1467acd681ad728ecb449a4491897ed77f0", 0x2e}, {&(0x7f0000001700)="e470bef8fe958299d7aa28ac9d4100d07bf3bae635332d81d24fef848ed7a6f57aec3f2ee8fcb43ab0695836e5c5e58581bd8fabd29b4689185f1d25", 0x3c}], 0x4, &(0x7f0000001b00)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r1, r1, r2, r0, r1, r2, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x18, 0x1, 0x1, [r1]}], 0xe0, 0x24040041}], 0x3, 0x81) r18 = getpid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000006c0)=[@in6={0xa, 0x4e20, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8000}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e20, @rand_addr=0xf8}, @in={0x2, 0x4e22}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in6={0xa, 0x4e21, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x8000}, @in={0x2, 0x4e24, @loopback=0x7f000001}], 0x88) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) r20 = getegid() sendmsg$unix(r2, &(0x7f0000000680)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000240)="58f2dd3941e766b10b2f4a35641e31838625224351818b8b6a1e37fcb60ad13b595bbeeadb336f9a3fbdcba982cf005c0aacb3f6a28438794172961f442ea3744856db9d79a5a63b3b91fd70b5ebcce3b33b53a250a06bbce9339b4509f7edb502318aa28c28fc858b607967f82454e7ee2e8a19b780ea137cc0534eb991f415a633ced72bf7e202222dae70e965c30cb33f345cb2e24b1cb5cc4c1f58864dcb3abeba165b35f43d7db243f331aeb351f45c2dc96ffffe763e2915623e95fd30011b593b5fb6fa7c488e837c68debc745c24", 0xd2}, {&(0x7f0000000340)="b347ea2265deb96635567352db079080178703f9a9424a5c7667075e86827909555193acb8d2eeb746e8b703e49f7e65a789f8f925e4fdd499b0538065c702dd7bdfcbf347493e53458958e197ee5afd6084af407575cd86938fe57fd213df926777c2560e48f68ae2dcaddaf5e493a7925aff8ee17f155cebe0b3010220803899e4402457c9975ae580f17626609980514e5f34f505f2ad95a95324c10b0f03185dd1", 0xa3}, {&(0x7f0000000400)="fb65a70de7ec3ca0ce0bd125fb1dedd9a8faddb5bdebd74082ffea36a98998995b841d5da4613c5045dae28c41623b5852fc1c96d43c2dd14500d955049010f2dcaa036b2abebfb2130e91d8ffacd36dc415bdc79eedeb5aa77e57103f2813609da4f28fb82ce333cb3441d23dcdd96e7455f55cfd2d9d2a249713bcf602052fa44a3dd55df04f07d5522b61fbc2c7bb17d5fa4ce0d26a32ff794891399a3c0f0d2d0cc03c90f52fe5a32ed785e065fdf6fa4a8ce7066189339d3ebcdeb8811adef7ec23bf01c3fab8c37e", 0xcb}, {&(0x7f00000000c0)}], 0x4, &(0x7f0000000600)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x18, 0x1, 0x1, [r1]}], 0x80, 0x20040010}, 0x40000) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000780)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000ac0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000b00)={'vcan0\x00', r21}) 2033/05/18 03:37:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x40000000000, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x7}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:41 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d559166593ae164c990a0", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x101, 0x4041) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)={r3, 0xf3, "bcd6347253424486d82e250095cd2dc2f8ccf6a59b220ccd7596464fa3c729245c1240c448ef9d26cdd59b47936962f4069b1734c5c98e3a6d7518a8e759870330c34552fb3f4d42b4542fdfca9ae578f6af1f413d153a8b83b22e73219dbaec7a9d954001ca2f42a38c8b3feeb3ef30758f0e2ec031736643fba77128afdb6fc41d547d478392db6a8e6b56e3ae17b62d78debdf243e27fe8dbb09451fd681224271cf3be1f1dfc87b2b3d9db86610058835243b2c7546a9e081d2de88e3775744bb69f4b418a837f709f900e7b98cb9d19425d5962f5a11bb89148a3629f228aaccf1710439d46ca607bafc4618824895e17"}, &(0x7f00000001c0)=0xfb) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="15e0f823ba4e", 0x6}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/121, 0x79}], 0x1, &(0x7f0000000c40)=""/70, 0x46}, 0x0) [ 677.877399] attempt to access beyond end of device [ 677.882495] loop6: rw=4096, want=136, limit=128 [ 677.887199] gfs2: error 10 reading superblock [ 677.952626] FAT-fs (loop1): bogus number of reserved sectors [ 677.956818] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 677.958570] FAT-fs (loop1): Can't find a valid FAT filesystem [ 677.992585] FAULT_INJECTION: forcing a failure. 2033/05/18 03:37:41 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x7a, "fbb3e0467d376e776f8cec8d5e8fb05e7de14af68f3aa7a72867ee0be7345a20a52046df66cdb081c723dcad19b2f44e91ccbb3066b4aa798661043fd14df2d367dae1f8a9a291628a2bfe445166467f31e66b488fbdc66166811ab2f2abda450c054895f94c4efbd0b8e4be8b7087d2f9967c68363a82f94b98"}, &(0x7f0000000040)=0x82) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x5}, 0xc) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) 2033/05/18 03:37:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x503000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 677.992585] name failslab, interval 1, probability 0, space 0, times 0 [ 678.003917] CPU: 0 PID: 12412 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 678.011198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.020559] Call Trace: [ 678.023171] dump_stack+0x1b9/0x294 [ 678.026827] ? dump_stack_print_info.cold.2+0x52/0x52 [ 678.032060] should_fail.cold.4+0xa/0x1a [ 678.036151] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 678.041278] ? kernel_text_address+0x79/0xf0 [ 678.045709] ? __kernel_text_address+0xd/0x40 [ 678.050232] ? graph_lock+0x170/0x170 [ 678.054056] ? __save_stack_trace+0x7e/0xd0 [ 678.058409] ? find_held_lock+0x36/0x1c0 [ 678.062530] ? __lock_is_held+0xb5/0x140 [ 678.066642] ? check_same_owner+0x320/0x320 [ 678.070993] ? rcu_note_context_switch+0x710/0x710 [ 678.075959] __should_failslab+0x124/0x180 [ 678.080219] should_failslab+0x9/0x14 [ 678.084039] __kmalloc+0x2c8/0x760 [ 678.087611] ? match_number.isra.0+0xb6/0x260 [ 678.092140] match_number.isra.0+0xb6/0x260 [ 678.096486] ? match_strdup+0xa0/0xa0 2033/05/18 03:37:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xffffffc0}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 678.100308] ? match_wildcard+0x3c0/0x3c0 [ 678.104479] ? trace_hardirqs_on+0xd/0x10 [ 678.108657] match_octal+0x26/0x30 [ 678.112217] fuse_fill_super+0x615/0x1e20 [ 678.116400] ? fuse_get_root_inode+0x190/0x190 [ 678.121011] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 678.126059] ? kasan_check_read+0x11/0x20 [ 678.130234] ? cap_capable+0x1f9/0x260 [ 678.134156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.139717] ? security_capable+0x99/0xc0 [ 678.143895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2033/05/18 03:37:41 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x1, 0x400000) write$vnet(r0, &(0x7f0000000400)={0x1, {&(0x7f0000000300)=""/76, 0x4c, &(0x7f0000000380)=""/68, 0x2, 0x4}}, 0x68) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10840) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000480)={0x7, 0xee4}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000001c0)={{0xb7, @multicast2=0xe0000002, 0x4e21, 0x3, 'rr\x00', 0x6, 0x9, 0x1d}, {@multicast1=0xe0000001, 0x4e24, 0x0, 0x2a1c47b5, 0x7c1, 0x7}}, 0x44) r2 = syz_init_net_socket$nfc_llcp(0x27, 0xffffffffffffffff, 0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[{0x3, 0xfffffffffffffffc}, {0x4, 0xa45}, {0x6, 0x6}, {0x8, 0xe1f}, {0x7, 0x8}, {0x8, 0xe3}, {0x4, 0x1}, {0x7, 0x2}], 0x8) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) keyctl$set_reqkey_keyring(0xe, 0x0) setitimer(0x1, &(0x7f0000000240)={{}, {0x0, 0x7530}}, &(0x7f0000000280)) 2033/05/18 03:37:41 executing program 7: syz_emit_ethernet(0x11d, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) [ 678.149441] ? ns_capable_common+0x13f/0x170 [ 678.153874] ? get_anon_bdev+0x2f0/0x2f0 [ 678.157952] ? sget+0x113/0x150 [ 678.161257] ? fuse_get_root_inode+0x190/0x190 [ 678.165857] mount_nodev+0x6b/0x110 [ 678.169494] fuse_mount+0x2c/0x40 [ 678.172959] mount_fs+0xae/0x328 [ 678.176353] vfs_kern_mount.part.34+0xd4/0x4d0 [ 678.180955] ? may_umount+0xb0/0xb0 [ 678.184593] ? _raw_read_unlock+0x22/0x30 [ 678.188754] ? __get_fs_type+0x97/0xc0 [ 678.192677] do_mount+0x564/0x3070 [ 678.196235] ? do_raw_spin_unlock+0x9e/0x2e0 [ 678.200671] ? copy_mount_string+0x40/0x40 [ 678.204925] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 678.209959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 678.214741] ? retint_kernel+0x10/0x10 [ 678.218666] ? copy_mount_options+0x1f0/0x380 [ 678.223178] ? copy_mount_options+0x202/0x380 [ 678.227693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.233250] ? copy_mount_options+0x285/0x380 [ 678.235132] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 678.237801] ksys_mount+0x12d/0x140 2033/05/18 03:37:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1c}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x2, 0x6a15ce6cc640adc6, 0xa08) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 678.237858] __x64_sys_mount+0xbe/0x150 [ 678.237882] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 678.237914] do_syscall_64+0x1b1/0x800 [ 678.264719] ? finish_task_switch+0x1ca/0x840 [ 678.269243] ? syscall_return_slowpath+0x5c0/0x5c0 [ 678.274194] ? syscall_return_slowpath+0x30f/0x5c0 [ 678.279154] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 678.284575] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 678.289451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.294658] RIP: 0033:0x455a09 [ 678.297853] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 678.305577] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 678.312858] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 678.320135] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 678.327409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 678.334688] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:42 executing program 1 (fault-call:2 fault-nth:43): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x11}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:42 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/194) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'bpq0\x00'}) write$cgroup_int(r0, &(0x7f00000000c0)={[0x3f, 0x34, 0x2b, 0x37, 0x3f, 0x32, 0x3a]}, 0x7) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:42 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x100000001, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001440)={@dev={0xfe, 0x80, [], 0x20}, 0x15, r2}) 2033/05/18 03:37:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x7, 0x10001, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:42 executing program 7: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x3) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000001c0)=""/142) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000000c0)) r2 = gettid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x400, 0x4, 0x1, 0x4, 0xaa4}, 0x0) ioprio_set$pid(0x2, r2, 0x0) 2033/05/18 03:37:42 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:42 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x201) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, 0xb9a}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={r1, 0xffffffffffffffff}, &(0x7f0000000340)=0x8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000002c0)={0x0}, &(0x7f00000000c0)=0xfffffe83) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e22, 0x2, @loopback={0x0, 0x1}, 0x20}}}, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xfffffdef}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:42 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='&#-procselinuxposix_acl_access\x00', 0x3) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x9, 0x80000001, 0x4, 0x2, 0x200, 0x80000001, 0x1dae, 0x5, 0x2, 0x7}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000002c0)={0x303, 0x33}, 0x4) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r2, r3/1000+30000}, {r4, r5/1000+10000}}) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x3, 0x0, 0x1000000000000000, 0x1, 0x6, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x1}, 0xfffffffffffffe35) [ 678.506008] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 678.509862] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 678.518693] FAT-fs (loop1): bogus number of reserved sectors [ 678.531585] FAT-fs (loop1): Can't find a valid FAT filesystem [ 678.624540] FAULT_INJECTION: forcing a failure. [ 678.624540] name failslab, interval 1, probability 0, space 0, times 0 [ 678.635945] CPU: 1 PID: 12466 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 678.643235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.652597] Call Trace: [ 678.655212] dump_stack+0x1b9/0x294 [ 678.658873] ? dump_stack_print_info.cold.2+0x52/0x52 [ 678.664107] should_fail.cold.4+0xa/0x1a [ 678.668195] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 678.673324] ? fuse_mount+0x2c/0x40 [ 678.676968] ? mount_fs+0xae/0x328 [ 678.680522] ? do_mount+0x564/0x3070 [ 678.684257] ? ksys_mount+0x12d/0x140 [ 678.688075] ? do_syscall_64+0x1b1/0x800 [ 678.692154] ? graph_lock+0x170/0x170 [ 678.695985] ? find_held_lock+0x36/0x1c0 [ 678.698694] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 678.700063] ? find_held_lock+0x36/0x1c0 [ 678.700095] ? __lock_is_held+0xb5/0x140 [ 678.700135] ? check_same_owner+0x320/0x320 [ 678.719334] ? rcu_note_context_switch+0x710/0x710 [ 678.724293] ? kasan_check_read+0x11/0x20 [ 678.728472] __should_failslab+0x124/0x180 [ 678.732733] should_failslab+0x9/0x14 [ 678.736555] kmem_cache_alloc_node_trace+0x26f/0x770 [ 678.741689] ? _raw_spin_unlock+0x22/0x30 [ 678.745861] bdi_alloc_node+0x67/0xe0 [ 678.749685] super_setup_bdi_name+0x8b/0x220 [ 678.754119] ? kill_block_super+0x100/0x100 [ 678.758456] ? rcu_read_lock_sched_held+0x108/0x120 [ 678.763490] ? kmem_cache_alloc_trace+0x616/0x780 [ 678.768352] ? match_wildcard+0x3c0/0x3c0 [ 678.772516] ? trace_hardirqs_on+0xd/0x10 [ 678.776694] fuse_fill_super+0xe6e/0x1e20 [ 678.780872] ? fuse_get_root_inode+0x190/0x190 [ 678.785477] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 678.790515] ? kasan_check_read+0x11/0x20 [ 678.794685] ? cap_capable+0x1f9/0x260 [ 678.798599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.804149] ? security_capable+0x99/0xc0 [ 678.808315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.810769] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 678.813871] ? ns_capable_common+0x13f/0x170 2033/05/18 03:37:42 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x100000001, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001440)={@dev={0xfe, 0x80, [], 0x20}, 0x15, r2}) 2033/05/18 03:37:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x3}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:42 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0xff7fffffffffffff, 0x0, 0x81, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x12}, 0x60) 2033/05/18 03:37:42 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10041, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x3}, 0x10) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10000) 2033/05/18 03:37:42 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x100000001, 0x2) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001440)={@dev={0xfe, 0x80, [], 0x20}, 0x15, r2}) [ 678.813898] ? get_anon_bdev+0x2f0/0x2f0 [ 678.813915] ? sget+0x113/0x150 [ 678.813938] ? fuse_get_root_inode+0x190/0x190 [ 678.836986] mount_nodev+0x6b/0x110 [ 678.840625] fuse_mount+0x2c/0x40 [ 678.844098] mount_fs+0xae/0x328 [ 678.847488] vfs_kern_mount.part.34+0xd4/0x4d0 [ 678.852352] ? may_umount+0xb0/0xb0 [ 678.855992] ? _raw_read_unlock+0x22/0x30 [ 678.860154] ? __get_fs_type+0x97/0xc0 [ 678.864064] do_mount+0x564/0x3070 [ 678.867623] ? copy_mount_string+0x40/0x40 [ 678.871871] ? rcu_pm_notify+0xc0/0xc0 [ 678.875794] ? copy_mount_options+0x5f/0x380 [ 678.880224] ? rcu_read_lock_sched_held+0x108/0x120 [ 678.885267] ? kmem_cache_alloc_trace+0x616/0x780 [ 678.890198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.895761] ? _copy_from_user+0xdf/0x150 [ 678.899931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.905479] ? copy_mount_options+0x285/0x380 [ 678.909993] ksys_mount+0x12d/0x140 [ 678.913641] __x64_sys_mount+0xbe/0x150 [ 678.917629] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 678.922665] do_syscall_64+0x1b1/0x800 [ 678.926565] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 678.931424] ? syscall_return_slowpath+0x5c0/0x5c0 [ 678.936367] ? syscall_return_slowpath+0x30f/0x5c0 [ 678.941317] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 678.946702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 678.951570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.956768] RIP: 0033:0x455a09 [ 678.959966] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 678.967688] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 678.974964] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 678.982244] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 678.989521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 678.996796] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:42 executing program 1 (fault-call:2 fault-nth:44): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x36}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:42 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0xa3, @mcast1={0xff, 0x1, [], 0x1}, 0x4f2}}, [0x5, 0x1, 0x5, 0x9, 0x81, 0xffffffff86ce2015, 0x2, 0x9, 0x7, 0xffffffffffffff46, 0x1, 0x7, 0x80000000, 0x7f, 0x3]}, &(0x7f0000000300)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000340)={r2, 0x5}, 0x8) r3 = memfd_create(&(0x7f0000000000)='+\x00', 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f00000000c0)={0xffffffff, r4}) 2033/05/18 03:37:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x28801) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8040, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7a], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:42 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:42 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0x100000001, 0x2) 2033/05/18 03:37:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 679.118755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x201, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x9, 0x3, 0x5, 0x5, 0x6}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{}]}) 2033/05/18 03:37:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x16}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 679.134791] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 679.175361] FAT-fs (loop1): bogus number of reserved sectors [ 679.188090] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:43 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000300)) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000001, 0x4000) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000001c0)={{0xfeb8, 0x6, 0x0, 0x3, "ed289f2089ff20293f1c97a7fb0227be697196e6b09e65215cd013c972fafb266219f3fa3b444e11dcc0f208", 0x80000000}, 0x0, 0x0, 0xfffffffffffffffa, r3, 0x4, 0x6, "a8e0fba4cb2bb0446a4820cbb012b5afb0a540596d6e1751255fc5b30228411d43168cc5dd8f56f25ffab3e17ea380a1d9f73c694c61a2786ef031d9057eb680", &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x11, [], [0x1, 0x32d, 0x0, 0xf1]}) 2033/05/18 03:37:43 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = socket$inet6(0xa, 0x800, 0x9) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x200, @mcast1={0xff, 0x1, [], 0x1}, 0xffff}}, [0x10001, 0x7, 0x6, 0x5, 0x2, 0x800, 0x3ff8000000000, 0x10000, 0x7, 0x0, 0xb3913b8000000000, 0x8, 0x0, 0x101, 0x70]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)={r2, 0x63, "fa8bbdd84d9f82882fdc35cf1cb8614fd90b2ac1114ca4346024fef4a0daaafa8c34657e45f92423a42dad295d84ed6588aeecf152070b8532eccef7ef2c9717fcec639440a7c0b733c2f82819c88144b89f261931213e0ff88bf74001b5aae196f282"}, &(0x7f0000000040)=0x6b) 2033/05/18 03:37:43 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf401000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 679.308804] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 679.319790] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 679.334514] FAULT_INJECTION: forcing a failure. [ 679.334514] name failslab, interval 1, probability 0, space 0, times 0 2033/05/18 03:37:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'system.', '/dev/vhost-vsock\x00'}, &(0x7f00000001c0)=""/251, 0xfb) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 679.352681] CPU: 1 PID: 12515 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 679.359970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.369338] Call Trace: [ 679.371957] dump_stack+0x1b9/0x294 [ 679.375624] ? dump_stack_print_info.cold.2+0x52/0x52 [ 679.380857] should_fail.cold.4+0xa/0x1a [ 679.384947] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 679.390074] ? zap_class+0x720/0x720 [ 679.393821] ? graph_lock+0x170/0x170 [ 679.397641] ? graph_lock+0x170/0x170 [ 679.401465] ? find_held_lock+0x36/0x1c0 [ 679.405553] ? __lock_is_held+0xb5/0x140 [ 679.409653] ? check_same_owner+0x320/0x320 [ 679.414002] ? rcu_note_context_switch+0x710/0x710 [ 679.418962] __should_failslab+0x124/0x180 [ 679.423228] should_failslab+0x9/0x14 [ 679.427062] kmem_cache_alloc_trace+0x2cb/0x780 [ 679.431753] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 679.436882] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 679.441932] wb_congested_get_create+0x1ca/0x450 [ 679.446722] ? wb_wakeup_delayed+0xf0/0xf0 [ 679.450989] ? __lockdep_init_map+0x105/0x590 [ 679.455513] wb_init+0x62e/0x9e0 [ 679.458910] ? bdi_put+0x180/0x180 [ 679.462478] ? mark_held_locks+0xc9/0x160 [ 679.466644] ? do_mount+0x564/0x3070 [ 679.470384] ? __raw_spin_lock_init+0x1c/0x100 [ 679.474998] ? mark_held_locks+0xc9/0x160 [ 679.479164] ? __raw_spin_lock_init+0x1c/0x100 [ 679.483766] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 679.488809] ? lockdep_init_map+0x9/0x10 [ 679.492906] bdi_init+0x353/0x510 [ 679.496374] ? wb_init+0x9e0/0x9e0 [ 679.499935] ? bdi_alloc_node+0x67/0xe0 [ 679.503920] ? bdi_alloc_node+0x67/0xe0 [ 679.507905] ? rcu_read_lock_sched_held+0x108/0x120 [ 679.512934] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 679.518233] ? _raw_spin_unlock+0x22/0x30 [ 679.522403] bdi_alloc_node+0x81/0xe0 [ 679.526230] super_setup_bdi_name+0x8b/0x220 [ 679.530651] ? kill_block_super+0x100/0x100 [ 679.534985] ? rcu_read_lock_sched_held+0x108/0x120 [ 679.540011] ? kmem_cache_alloc_trace+0x616/0x780 [ 679.544868] ? match_wildcard+0x3c0/0x3c0 [ 679.549026] ? trace_hardirqs_on+0xd/0x10 [ 679.553207] fuse_fill_super+0xe6e/0x1e20 [ 679.557379] ? fuse_get_root_inode+0x190/0x190 [ 679.561982] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 679.567019] ? kasan_check_read+0x11/0x20 [ 679.571188] ? cap_capable+0x1f9/0x260 [ 679.575102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.580648] ? security_capable+0x99/0xc0 [ 679.584817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.590366] ? ns_capable_common+0x13f/0x170 [ 679.594795] ? get_anon_bdev+0x2f0/0x2f0 [ 679.598980] ? sget+0x113/0x150 [ 679.602279] ? fuse_get_root_inode+0x190/0x190 [ 679.606876] mount_nodev+0x6b/0x110 [ 679.610518] fuse_mount+0x2c/0x40 [ 679.613992] mount_fs+0xae/0x328 [ 679.617379] vfs_kern_mount.part.34+0xd4/0x4d0 [ 679.621979] ? may_umount+0xb0/0xb0 [ 679.625618] ? _raw_read_unlock+0x22/0x30 [ 679.629777] ? __get_fs_type+0x97/0xc0 [ 679.633687] do_mount+0x564/0x3070 [ 679.637251] ? copy_mount_string+0x40/0x40 [ 679.641499] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 679.646527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 679.651304] ? retint_kernel+0x10/0x10 [ 679.655224] ? copy_mount_options+0x1f0/0x380 [ 679.659731] ? copy_mount_options+0x206/0x380 [ 679.664238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.669784] ? copy_mount_options+0x285/0x380 [ 679.674298] ksys_mount+0x12d/0x140 [ 679.677942] __x64_sys_mount+0xbe/0x150 [ 679.681926] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 679.686970] do_syscall_64+0x1b1/0x800 [ 679.690867] ? finish_task_switch+0x1ca/0x840 [ 679.695841] ? syscall_return_slowpath+0x5c0/0x5c0 [ 679.700789] ? syscall_return_slowpath+0x30f/0x5c0 [ 679.705741] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 679.711125] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 679.715995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.721195] RIP: 0033:0x455a09 [ 679.724389] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 679.732114] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 679.739388] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 679.746662] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 679.753938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 679.761213] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:43 executing program 1 (fault-call:2 fault-nth:45): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1d}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:43 executing program 7: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setrlimit(0x2, &(0x7f0000000000)={0x4}) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x100000000000, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:43 executing program 3: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)) 2033/05/18 03:37:43 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:43 executing program 5: alarm(0x1f) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100000000, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:43 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) bind$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10) [ 679.922091] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 679.929207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000000)=@can={0x0, 0x0}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f00000002c0)=""/171, 0xab}, {&(0x7f0000000380)=""/241, 0xf1}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f0000000480)=""/151, 0x97}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)}], 0x7, &(0x7f0000000640)=""/146, 0x92, 0x6}, 0x2000) socketpair(0x7, 0x800, 0x7, &(0x7f0000000780)={0xffffffffffffffff}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000740)={@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, r2}, 0x14) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af60, &(0x7f00000007c0)=&(0x7f0000000800)) 2033/05/18 03:37:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x80200) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 2033/05/18 03:37:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x18}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:43 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 680.009108] FAT-fs (loop1): bogus number of reserved sectors [ 680.015064] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 680.111947] FAULT_INJECTION: forcing a failure. [ 680.111947] name failslab, interval 1, probability 0, space 0, times 0 [ 680.123316] CPU: 0 PID: 12571 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 680.130608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.136525] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 680.139972] Call Trace: [ 680.140002] dump_stack+0x1b9/0x294 [ 680.140031] ? dump_stack_print_info.cold.2+0x52/0x52 [ 680.140068] should_fail.cold.4+0xa/0x1a [ 680.165834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 680.170976] ? graph_lock+0x170/0x170 [ 680.174796] ? save_stack+0xa9/0xd0 [ 680.178443] ? save_stack+0x43/0xd0 [ 680.182086] ? kasan_kmalloc+0xc4/0xe0 [ 680.185994] ? find_held_lock+0x36/0x1c0 [ 680.190085] ? __lock_is_held+0xb5/0x140 [ 680.194191] ? check_same_owner+0x320/0x320 [ 680.198534] ? rcu_note_context_switch+0x710/0x710 [ 680.203488] __should_failslab+0x124/0x180 [ 680.207752] should_failslab+0x9/0x14 [ 680.211568] kmem_cache_alloc_trace+0x2cb/0x780 [ 680.216257] ? refcount_add_not_zero+0x320/0x320 [ 680.221043] device_private_init+0x98/0x230 [ 680.225381] ? virtual_device_parent+0x60/0x60 [ 680.229993] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 680.235550] ? refcount_inc+0x29/0x70 [ 680.239377] device_add+0xe98/0x16d0 [ 680.243125] ? device_private_init+0x230/0x230 [ 680.247724] ? kfree+0x1e9/0x260 [ 680.251114] ? kfree_const+0x5e/0x70 [ 680.254855] device_create_groups_vargs+0x1ff/0x270 2033/05/18 03:37:43 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x22}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 680.259893] device_create_vargs+0x46/0x60 [ 680.264154] bdi_register_va.part.10+0xbb/0x9b0 [ 680.268846] ? cgwb_kill+0x630/0x630 [ 680.272585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.278138] ? bdi_init+0x416/0x510 [ 680.281786] ? wb_init+0x9e0/0x9e0 [ 680.285342] ? bdi_alloc_node+0x67/0xe0 [ 680.289328] ? bdi_alloc_node+0x67/0xe0 [ 680.293320] ? rcu_read_lock_sched_held+0x108/0x120 [ 680.298357] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 680.303677] ? _raw_spin_unlock+0x22/0x30 [ 680.307848] bdi_register_va+0x68/0x80 [ 680.311755] super_setup_bdi_name+0x123/0x220 [ 680.316262] ? kill_block_super+0x100/0x100 [ 680.320600] ? kmem_cache_alloc_trace+0x616/0x780 [ 680.325460] ? match_wildcard+0x3c0/0x3c0 [ 680.329627] ? trace_hardirqs_on+0xd/0x10 [ 680.333799] fuse_fill_super+0xe6e/0x1e20 [ 680.337975] ? fuse_get_root_inode+0x190/0x190 [ 680.342576] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 680.347622] ? kasan_check_read+0x11/0x20 [ 680.351793] ? cap_capable+0x1f9/0x260 [ 680.355704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.361255] ? security_capable+0x99/0xc0 [ 680.365429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.370985] ? ns_capable_common+0x13f/0x170 [ 680.375432] ? get_anon_bdev+0x2f0/0x2f0 [ 680.379517] ? sget+0x113/0x150 [ 680.382830] ? fuse_get_root_inode+0x190/0x190 [ 680.387429] mount_nodev+0x6b/0x110 [ 680.391088] fuse_mount+0x2c/0x40 [ 680.394567] mount_fs+0xae/0x328 [ 680.397980] vfs_kern_mount.part.34+0xd4/0x4d0 [ 680.402594] ? may_umount+0xb0/0xb0 [ 680.406247] ? _raw_read_unlock+0x22/0x30 [ 680.410416] ? __get_fs_type+0x97/0xc0 [ 680.414334] do_mount+0x564/0x3070 [ 680.417925] ? copy_mount_string+0x40/0x40 [ 680.422184] ? rcu_pm_notify+0xc0/0xc0 [ 680.426119] ? copy_mount_options+0x5f/0x380 [ 680.430560] ? rcu_read_lock_sched_held+0x108/0x120 [ 680.435602] ? kmem_cache_alloc_trace+0x616/0x780 [ 680.440473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 680.446026] ? _copy_from_user+0xdf/0x150 [ 680.450207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.455764] ? copy_mount_options+0x285/0x380 [ 680.460323] ksys_mount+0x12d/0x140 [ 680.463997] __x64_sys_mount+0xbe/0x150 [ 680.467996] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 680.473042] do_syscall_64+0x1b1/0x800 [ 680.476946] ? finish_task_switch+0x1ca/0x840 [ 680.481465] ? syscall_return_slowpath+0x5c0/0x5c0 [ 680.486437] ? syscall_return_slowpath+0x30f/0x5c0 [ 680.491400] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 680.496803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 680.501695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.506914] RIP: 0033:0x455a09 [ 680.510111] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 680.517841] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 680.525127] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 680.532406] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 680.539785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 680.547064] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:44 executing program 1 (fault-call:2 fault-nth:46): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:44 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1000000001, 0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc000, 0x0) clock_gettime(0x0, &(0x7f0000004e00)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000004c40)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000240)=""/225, 0xe1}, {&(0x7f0000000340)=""/173, 0xad}, {&(0x7f0000000400)=""/60, 0x3c}, {&(0x7f0000000440)=""/113, 0x71}], 0x5, &(0x7f0000000540)=""/164, 0xa4, 0x9}, 0x100}, {{&(0x7f0000000600)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000680)=""/130, 0x82}, {&(0x7f0000000740)=""/48, 0x30}, {&(0x7f0000000780)}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001800)=""/128, 0x80, 0x1}, 0x20b}, {{&(0x7f0000001880)=@can={0x0, 0x0}, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001900)=""/58, 0x3a}, {&(0x7f0000001940)=""/166, 0xa6}, {&(0x7f0000001a00)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x401}, 0x2}, {{&(0x7f0000002a40)=@in={0x0, 0x0, @local}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002ac0)=""/60, 0x3c}, {&(0x7f0000002b00)=""/211, 0xd3}, {&(0x7f0000002c00)=""/111, 0x6f}], 0x3, &(0x7f0000002cc0)=""/159, 0x9f, 0x9}, 0x7fff}, {{&(0x7f0000002d80)=@alg, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002e00)=""/251, 0xfb}, {&(0x7f0000002f00)=""/200, 0xc8}, {&(0x7f0000003000)=""/129, 0x81}], 0x3, 0x0, 0x0, 0x8}, 0x101}, {{&(0x7f0000003100)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000003640)=[{&(0x7f0000003180)=""/171, 0xab}, {&(0x7f0000003240)=""/222, 0xde}, {&(0x7f0000003340)=""/65, 0x41}, {&(0x7f00000033c0)=""/19, 0x13}, {&(0x7f0000003400)=""/33, 0x21}, {&(0x7f0000003440)=""/250, 0xfa}, {&(0x7f0000003540)=""/23, 0x17}, {&(0x7f0000003580)=""/164, 0xa4}], 0x8, &(0x7f00000036c0)=""/219, 0xdb, 0x6}, 0xfffffffffffffffe}, {{&(0x7f00000037c0)=@sco, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000003840)=""/56, 0x38}, {&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/181, 0xb5}, {&(0x7f0000004940)=""/76, 0x4c}, {&(0x7f00000049c0)=""/240, 0xf0}, {&(0x7f0000004ac0)=""/232, 0xe8}], 0x6, 0x0, 0x0, 0x7409}, 0x101}], 0x7, 0x0, &(0x7f0000004e40)={r3, r4+10000000}) setsockopt$inet6_buf(r5, 0x29, 0x2a, &(0x7f00000050c0)="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", 0xfd) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004e80)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000004f80)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004fc0)={{{@in=@multicast2=0xe0000002, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e24, 0x0, 0x1, 0x7, 0x2, 0x20, 0x20, 0x7f, r6, r7}, {0x4, 0x3, 0x2, 0x3f, 0x676, 0x8, 0x29, 0x5}, {0x4, 0x3, 0x13f}, 0x638e9ff2, 0x6e6bb3, 0x1, 0x1, 0x1}, {{@in=@loopback=0x7f000001, 0x4d5, 0x33}, 0x2, @in, 0x0, 0x1, 0x3, 0x5, 0x9, 0x0, 0x6}}, 0xe8) sched_yield() bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x321) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) 2033/05/18 03:37:44 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:44 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400042, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x6, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1a}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x80350000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:44 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001700)='/dev/sequencer2\x00', 0x280000, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000001740)) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000017c0)={0x0, 0x5}, &(0x7f0000001800)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000001840)={r3, @in={{0x2, 0x4e23}}, [0x2, 0x1, 0x7, 0x12b5, 0x0, 0x1, 0x100, 0x6, 0x8, 0x3, 0x0, 0x10001, 0x2, 0x7, 0x5]}, &(0x7f0000001940)=0x100) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000001780)={0x80000000, 0x4, 0x4d, 0x1f, "46a6763669f383d688969f1f65fe1a631118940fb144d0a3b0280dfbe37278de6d05647867140eceac0384e9", 0x7443}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0)={0x2}, 0x4) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) readv(r4, &(0x7f0000001640)=[{&(0x7f00000001c0)=""/70, 0x46}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/245, 0xf5}, {&(0x7f0000001340)=""/78, 0x4e}, {&(0x7f00000013c0)=""/4, 0x4}, {&(0x7f0000001400)=""/47, 0x2f}, {&(0x7f0000001440)=""/185, 0xb9}, {&(0x7f0000001500)=""/206, 0xce}, {&(0x7f0000001600)=""/58, 0x3a}], 0x9) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000040)=@int=0x4, 0x4) 2033/05/18 03:37:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x6}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 680.675017] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 680.681909] FAT-fs (loop1): bogus number of reserved sectors [ 680.691361] FAT-fs (loop1): Can't find a valid FAT filesystem [ 680.758125] FAULT_INJECTION: forcing a failure. [ 680.758125] name failslab, interval 1, probability 0, space 0, times 0 [ 680.769478] CPU: 1 PID: 12613 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 680.776764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.786124] Call Trace: [ 680.788739] dump_stack+0x1b9/0x294 [ 680.792398] ? dump_stack_print_info.cold.2+0x52/0x52 [ 680.797627] should_fail.cold.4+0xa/0x1a [ 680.801719] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 680.806859] ? graph_lock+0x170/0x170 [ 680.810684] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 680.815836] ? find_held_lock+0x36/0x1c0 [ 680.819932] ? __lock_is_held+0xb5/0x140 [ 680.824037] ? check_same_owner+0x320/0x320 [ 680.828386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.833945] ? rcu_note_context_switch+0x710/0x710 [ 680.838906] __should_failslab+0x124/0x180 [ 680.843167] should_failslab+0x9/0x14 [ 680.846990] kmem_cache_alloc_trace+0x2cb/0x780 [ 680.851682] ? __raw_spin_lock_init+0x1c/0x100 [ 680.856301] device_create_groups_vargs+0xa7/0x270 [ 680.861259] device_create_vargs+0x46/0x60 [ 680.865525] bdi_register_va.part.10+0xbb/0x9b0 [ 680.870219] ? cgwb_kill+0x630/0x630 [ 680.873956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.879507] ? bdi_init+0x416/0x510 [ 680.883154] ? wb_init+0x9e0/0x9e0 [ 680.886717] ? bdi_alloc_node+0x67/0xe0 [ 680.890708] ? bdi_alloc_node+0x67/0xe0 [ 680.894706] ? rcu_read_lock_sched_held+0x108/0x120 [ 680.899746] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 680.905052] ? _raw_spin_unlock+0x22/0x30 [ 680.909237] bdi_register_va+0x68/0x80 [ 680.913150] super_setup_bdi_name+0x123/0x220 [ 680.917664] ? kill_block_super+0x100/0x100 [ 680.922005] ? kmem_cache_alloc_trace+0x616/0x780 [ 680.926865] ? match_wildcard+0x3c0/0x3c0 [ 680.931038] ? trace_hardirqs_on+0xd/0x10 [ 680.935218] fuse_fill_super+0xe6e/0x1e20 [ 680.939388] ? fuse_get_root_inode+0x190/0x190 [ 680.943987] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 680.949033] ? kasan_check_read+0x11/0x20 [ 680.953208] ? cap_capable+0x1f9/0x260 [ 680.957130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.962687] ? security_capable+0x99/0xc0 [ 680.966864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.972423] ? ns_capable_common+0x13f/0x170 [ 680.976855] ? get_anon_bdev+0x2f0/0x2f0 [ 680.980934] ? sget+0x113/0x150 [ 680.984235] ? fuse_get_root_inode+0x190/0x190 [ 680.988837] mount_nodev+0x6b/0x110 [ 680.992488] fuse_mount+0x2c/0x40 [ 680.995963] mount_fs+0xae/0x328 [ 680.999361] vfs_kern_mount.part.34+0xd4/0x4d0 [ 681.003966] ? may_umount+0xb0/0xb0 2033/05/18 03:37:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x80000) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:44 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:44 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r2 = gettid() perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xffff, 0x4, 0x0, 0x5, 0x0, 0x84, 0x0, 0x8, 0xfffffffffffffff9, 0x80000001, 0x9, 0x7, 0x0, 0x6, 0x8, 0x10000, 0x0, 0x3f, 0x3, 0x3, 0x5, 0x33, 0x80000001, 0x80, 0x8, 0x6, 0x7e98e747, 0x1000, 0x8, 0x3, 0x6, 0xffffffffffffff81, 0x1ff, 0xfffffffffffffffe, 0x2, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x81, 0x3}, 0x1, 0x17d, 0x10001, 0x5, 0x1000, 0xcc89, 0x6dad}, r2, 0x3, r0, 0x2) r3 = epoll_create(0x665) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x2) semget(0x2, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f00000001c0)={0x1, 0x2, 0x200, 0x0, 0x1}) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0x4}) 2033/05/18 03:37:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xffffffe0}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:44 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:44 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind(r0, &(0x7f0000000000)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512-generic\x00'}, 0x80) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0xfffffffffffffffe, @empty, 0x100}}, 0x5, 0x13f9, 0x1f, 0xf81, 0x88}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={r2}, &(0x7f0000000300)=0x8) [ 681.007614] ? _raw_read_unlock+0x22/0x30 [ 681.011778] ? __get_fs_type+0x97/0xc0 [ 681.015695] do_mount+0x564/0x3070 [ 681.019265] ? copy_mount_string+0x40/0x40 [ 681.023518] ? rcu_pm_notify+0xc0/0xc0 [ 681.027436] ? copy_mount_options+0x5f/0x380 [ 681.031860] ? rcu_read_lock_sched_held+0x108/0x120 [ 681.036896] ? kmem_cache_alloc_trace+0x616/0x780 [ 681.041781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.047334] ? copy_mount_options+0x285/0x380 [ 681.051960] ksys_mount+0x12d/0x140 [ 681.055605] __x64_sys_mount+0xbe/0x150 [ 681.059595] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 681.064635] do_syscall_64+0x1b1/0x800 [ 681.068538] ? finish_task_switch+0x1ca/0x840 [ 681.073056] ? syscall_return_slowpath+0x5c0/0x5c0 [ 681.078010] ? syscall_return_slowpath+0x30f/0x5c0 [ 681.082966] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 681.088353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 681.093222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.098420] RIP: 0033:0x455a09 [ 681.101615] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 681.109339] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 681.116618] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 681.123892] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 681.131169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 681.138444] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:45 executing program 1 (fault-call:2 fault-nth:47): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = semget(0x0, 0x3, 0x100) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x190) 2033/05/18 03:37:45 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x100000001, 0x580) write$tun(r1, &(0x7f0000000280)={@void, @hdr={0x2, 0x3, 0x5, 0xfe8e, 0x894, 0x10000}, @ipv4={{0xe, 0x4, 0x1, 0x401, 0x154, 0x64, 0x100000000, 0xffffffffffffff01, 0x77, 0x0, @multicast1=0xe0000001, @rand_addr=0xfff, {[@timestamp={0x44, 0x20, 0x12, 0x1, 0x89ed, [{[@multicast1=0xe0000001], 0xfff}, {[], 0x5}, {[@remote={0xac, 0x14, 0x14, 0xbb}], 0x7}, {[@multicast1=0xe0000001], 0x1}]}, @noop={0x1}, @noop={0x1}]}}, @udp={0x4e21, 0x4e21, 0x11c, 0x0, [@guehdr={0x1, 0x7222, 0x8, 0x1, 0x100}, @guehdr={0x2, 0x3ff, 0x401, 0x8, 0x0, [0x80]}, @guehdr={0x1, 0x7ff, 0xff, 0x7, 0x100}, @guehdr={0x2, 0x7, 0xffffffffffffffff, 0xfd, 0x100, [0x80]}, @guehdr={0x2, 0x80, 0x4, 0xffffffff00000001, 0x100, [0x80]}], "461935feadf0f3452dc2179a0d325c467b3b48bcaf70eafda1557d82517aaeb5497e97f5ffa920e16cde8f9819e49d7a248c684b43afa572616a166e66e7aa70082b2fb88ae347d1170e386249e693fe1faf383fb35df645e3892393c4af5b2219b5837d888ce4f56c5cbba185a9fa2f094a4952075782cede64b3ae1c89dec658b221163fec402d9d2d620b9b7877f5ebbb21e938643e8464a07db2e1014ddb59b3729c9115ced6a2cdc2432de9d8c38883488ef14d1967db6af8503355af006d5c3d1fa1ac39b8ef74c4fa4ba8ccc11b3dc91833620d1dd8f2440321d5e0599544146509f035d097a405413adba9f1c809c297"}}}, 0x15e) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x400000009, 0x4100) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000001c0)=""/158) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x80a40, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000300)={0x2, {{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x0, 0x2, [{{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e21, @multicast1=0xe0000001}}]}, 0x190) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x10000, 0x3, 0x3, 0x401, 0x0, 0x38, 0x100, 0x2, 0x5, 0x200, 0x9, 0x5, 0x401, 0x5, 0x9, 0x496, 0x7, 0x6, 0x2, 0x1000, 0xb3, 0x6, 0xffffffff, 0x0, 0x8, 0x5, 0x7, 0xfff, 0x1, 0x9, 0x80000000, 0x80, 0x71, 0x4, 0x3, 0x7f, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x8080, 0x9f, 0x152, 0x7, 0x800000000000000, 0x9, 0x8}, r3, 0x0, r0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x84) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000004c0)='bcsf0\x00', 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) 2033/05/18 03:37:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x3a}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x600], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 681.231503] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x42}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sysfs$2(0x2, 0x101, &(0x7f0000000000)=""/58) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 681.293801] FAT-fs (loop1): bogus number of reserved sectors [ 681.299860] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:45 executing program 7: syz_open_dev$sndmidi(&(0x7f0000000340)='/dev/snd/midiC#D#\x00', 0x2, 0xc485e6dcb0771be8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x43a1e869473a2b63, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x5) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) accept4$packet(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x14, 0x80800) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x22}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getaddr={0x54, 0x16, 0x200, 0x70bd2a, 0x25dfdbff, {0xa, 0x18, 0x80, 0xff, r2}, [@IFA_ADDRESS={0x14, 0x1}, @IFA_LOCAL={0x14, 0x2, @mcast2={0xff, 0x2, [], 0x1}}, @IFA_ADDRESS={0x14, 0x1, @remote={0xfe, 0x80, [], 0xbb}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) 2033/05/18 03:37:45 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x6) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 681.384896] FAULT_INJECTION: forcing a failure. [ 681.384896] name failslab, interval 1, probability 0, space 0, times 0 [ 681.396265] CPU: 1 PID: 12659 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 681.403555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.412925] Call Trace: [ 681.415541] dump_stack+0x1b9/0x294 [ 681.419201] ? dump_stack_print_info.cold.2+0x52/0x52 [ 681.424439] should_fail.cold.4+0xa/0x1a [ 681.428521] ? __kmalloc_track_caller+0x14a/0x760 [ 681.433389] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 681.438509] ? device_add+0x3a5/0x16d0 [ 681.442410] ? device_create_groups_vargs+0x1ff/0x270 [ 681.447618] ? bdi_register_va.part.10+0xbb/0x9b0 [ 681.452471] ? bdi_register_va+0x68/0x80 [ 681.456551] ? super_setup_bdi_name+0x123/0x220 [ 681.461238] ? fuse_fill_super+0xe6e/0x1e20 [ 681.465583] ? graph_lock+0x170/0x170 [ 681.469395] ? do_mount+0x564/0x3070 [ 681.473125] ? ksys_mount+0x12d/0x140 [ 681.476950] ? __x64_sys_mount+0xbe/0x150 [ 681.481121] ? do_syscall_64+0x1b1/0x800 [ 681.485206] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.490600] ? find_held_lock+0x36/0x1c0 [ 681.494693] ? __lock_is_held+0xb5/0x140 [ 681.498805] ? check_same_owner+0x320/0x320 [ 681.503153] ? rcu_note_context_switch+0x710/0x710 [ 681.506155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 681.508113] ? rcu_read_lock_sched_held+0x108/0x120 [ 681.508143] __should_failslab+0x124/0x180 [ 681.508167] should_failslab+0x9/0x14 [ 681.508190] kmem_cache_alloc+0x2af/0x760 [ 681.535844] ? memcpy+0x45/0x50 [ 681.539140] ? kstrdup+0x59/0x70 [ 681.542539] __kernfs_new_node+0xe7/0x580 [ 681.546712] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 681.551503] ? lock_downgrade+0x8e0/0x8e0 [ 681.555684] kernfs_new_node+0x80/0xf0 [ 681.559594] kernfs_create_dir_ns+0x3d/0x140 [ 681.564022] sysfs_create_dir_ns+0xbe/0x1d0 [ 681.568370] kobject_add_internal+0x354/0xac0 [ 681.572892] ? kobj_ns_type_registered+0x60/0x60 [ 681.577670] ? lock_downgrade+0x8e0/0x8e0 [ 681.581842] ? refcount_add_not_zero+0x320/0x320 [ 681.586619] ? kasan_check_read+0x11/0x20 [ 681.590787] kobject_add+0x13a/0x190 [ 681.596337] ? kset_create_and_add+0x190/0x190 [ 681.600940] ? mutex_unlock+0xd/0x10 [ 681.604676] device_add+0x3a5/0x16d0 [ 681.608412] ? device_private_init+0x230/0x230 [ 681.613004] ? kfree+0x1e9/0x260 [ 681.616394] ? kfree_const+0x5e/0x70 [ 681.620128] device_create_groups_vargs+0x1ff/0x270 [ 681.625167] device_create_vargs+0x46/0x60 [ 681.629424] bdi_register_va.part.10+0xbb/0x9b0 [ 681.634106] ? cgwb_kill+0x630/0x630 [ 681.637841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.643386] ? bdi_init+0x416/0x510 [ 681.647021] ? wb_init+0x9e0/0x9e0 [ 681.650583] ? bdi_alloc_node+0x67/0xe0 [ 681.654565] ? bdi_alloc_node+0x67/0xe0 [ 681.658550] ? rcu_read_lock_sched_held+0x108/0x120 [ 681.663579] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 681.668872] ? _raw_spin_unlock+0x22/0x30 [ 681.673048] bdi_register_va+0x68/0x80 [ 681.676954] super_setup_bdi_name+0x123/0x220 [ 681.681459] ? kill_block_super+0x100/0x100 [ 681.685801] ? kmem_cache_alloc_trace+0x616/0x780 [ 681.690654] ? match_wildcard+0x3c0/0x3c0 [ 681.694813] ? trace_hardirqs_on+0xd/0x10 [ 681.699773] fuse_fill_super+0xe6e/0x1e20 [ 681.703950] ? fuse_get_root_inode+0x190/0x190 [ 681.708554] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 681.713592] ? kasan_check_read+0x11/0x20 [ 681.717756] ? cap_capable+0x1f9/0x260 [ 681.721668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.727215] ? security_capable+0x99/0xc0 [ 681.731380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.736925] ? ns_capable_common+0x13f/0x170 [ 681.741347] ? get_anon_bdev+0x2f0/0x2f0 [ 681.745418] ? sget+0x113/0x150 [ 681.748716] ? fuse_get_root_inode+0x190/0x190 [ 681.753311] mount_nodev+0x6b/0x110 [ 681.756952] fuse_mount+0x2c/0x40 [ 681.760417] mount_fs+0xae/0x328 [ 681.763808] vfs_kern_mount.part.34+0xd4/0x4d0 [ 681.768406] ? may_umount+0xb0/0xb0 [ 681.772051] ? _raw_read_unlock+0x22/0x30 [ 681.776210] ? __get_fs_type+0x97/0xc0 [ 681.780117] do_mount+0x564/0x3070 [ 681.783680] ? copy_mount_string+0x40/0x40 [ 681.787928] ? rcu_pm_notify+0xc0/0xc0 [ 681.791843] ? copy_mount_options+0x5f/0x380 [ 681.796261] ? rcu_read_lock_sched_held+0x108/0x120 [ 681.801287] ? kmem_cache_alloc_trace+0x616/0x780 [ 681.806148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.811695] ? _copy_from_user+0xdf/0x150 [ 681.815863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 681.821410] ? copy_mount_options+0x285/0x380 [ 681.825924] ksys_mount+0x12d/0x140 [ 681.829569] __x64_sys_mount+0xbe/0x150 [ 681.833551] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 681.838585] do_syscall_64+0x1b1/0x800 [ 681.842486] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 681.847346] ? syscall_return_slowpath+0x5c0/0x5c0 [ 681.852296] ? syscall_return_slowpath+0x30f/0x5c0 [ 681.857257] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 681.862644] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 681.867521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.872720] RIP: 0033:0x455a09 [ 681.875914] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:37:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800e000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x24}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 681.883638] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 681.890917] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 681.898194] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 681.905475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 681.912752] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 681.920676] kobject_add_internal failed for 0:42 (error: -12 parent: bdi) [ 681.955238] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:45 executing program 1 (fault-call:2 fault-nth:48): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x200000) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r2 = semget$private(0x0, 0x6, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f0000000000)=""/46) 2033/05/18 03:37:45 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x14, 0x8800) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:45 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fffffff, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0xffff, 0x8}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x20c000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0xa7, 0x30}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={r2, 0xfffffffffffffff8}, 0x8) 2033/05/18 03:37:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x33}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x500000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:45 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x5}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fdatasync(r0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x1, 0x0, 0x100000000, 0x8, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r1}) 2033/05/18 03:37:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) setsockopt$ax25_int(r1, 0x101, 0x6, &(0x7f0000000040)=0x4, 0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000080)=""/88, &(0x7f00000001c0)=0x58) [ 682.049235] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 682.087121] FAT-fs (loop1): bogus number of reserved sectors [ 682.099922] FAT-fs (loop1): Can't find a valid FAT filesystem [ 682.115361] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 682.178351] FAULT_INJECTION: forcing a failure. [ 682.178351] name failslab, interval 1, probability 0, space 0, times 0 [ 682.190201] CPU: 1 PID: 12706 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 682.197492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.206852] Call Trace: [ 682.209462] dump_stack+0x1b9/0x294 [ 682.213120] ? dump_stack_print_info.cold.2+0x52/0x52 [ 682.218340] should_fail.cold.4+0xa/0x1a [ 682.222424] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 682.227573] ? perf_trace_lock+0x495/0x900 [ 682.231843] ? zap_class+0x720/0x720 [ 682.235576] ? graph_lock+0x170/0x170 [ 682.239407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.244964] ? graph_lock+0x170/0x170 [ 682.248808] ? print_usage_bug+0xc0/0xc0 [ 682.252893] __should_failslab+0x124/0x180 [ 682.257150] should_failslab+0x9/0x14 [ 682.260969] kmem_cache_alloc+0x47/0x760 [ 682.265060] ? lock_downgrade+0x8e0/0x8e0 [ 682.269236] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 682.274974] idr_get_free+0x891/0x10a0 [ 682.278912] ? radix_tree_clear_tags+0xc0/0xc0 [ 682.283520] ? unwind_get_return_address+0x61/0xa0 [ 682.288470] ? __save_stack_trace+0x7e/0xd0 [ 682.292836] ? save_stack+0xa9/0xd0 [ 682.296490] ? save_stack+0x43/0xd0 [ 682.300135] ? kasan_kmalloc+0xc4/0xe0 [ 682.304039] ? kasan_slab_alloc+0x12/0x20 [ 682.308203] ? kmem_cache_alloc+0x12e/0x760 [ 682.312536] ? __kernfs_new_node+0xe7/0x580 [ 682.316868] ? kernfs_new_node+0x80/0xf0 [ 682.320940] ? kernfs_create_dir_ns+0x3d/0x140 [ 682.325535] ? sysfs_create_dir_ns+0xbe/0x1d0 [ 682.330042] ? kobject_add_internal+0x354/0xac0 [ 682.334724] ? kobject_add+0x13a/0x190 [ 682.338623] ? device_create_groups_vargs+0x1ff/0x270 [ 682.343820] ? device_create_vargs+0x46/0x60 [ 682.348235] ? bdi_register_va.part.10+0xbb/0x9b0 [ 682.353084] ? bdi_register_va+0x68/0x80 [ 682.357153] ? super_setup_bdi_name+0x123/0x220 [ 682.361830] ? fuse_fill_super+0xe6e/0x1e20 [ 682.366159] ? mount_nodev+0x6b/0x110 [ 682.369969] ? mount_fs+0xae/0x328 [ 682.373518] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 682.378279] ? do_mount+0x564/0x3070 [ 682.382002] ? ksys_mount+0x12d/0x140 [ 682.385807] ? __x64_sys_mount+0xbe/0x150 [ 682.389966] ? do_syscall_64+0x1b1/0x800 [ 682.394037] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.399414] ? print_usage_bug+0xc0/0xc0 [ 682.403503] idr_alloc_u32+0x1f9/0x3d0 [ 682.407413] ? __fprop_inc_percpu_max+0x2c0/0x2c0 [ 682.412269] ? lock_acquire+0x1dc/0x520 [ 682.416257] ? __kernfs_new_node+0x10e/0x580 [ 682.420678] ? __lock_is_held+0xb5/0x140 [ 682.424762] idr_alloc_cyclic+0x167/0x340 [ 682.428930] ? idr_alloc+0x1a0/0x1a0 [ 682.432656] ? kasan_check_write+0x14/0x20 [ 682.436901] ? do_raw_spin_lock+0xc1/0x200 [ 682.441159] __kernfs_new_node+0x1a3/0x580 [ 682.445411] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 682.450197] ? lock_downgrade+0x8e0/0x8e0 [ 682.454373] kernfs_new_node+0x80/0xf0 [ 682.458277] kernfs_create_dir_ns+0x3d/0x140 [ 682.462706] sysfs_create_dir_ns+0xbe/0x1d0 [ 682.467044] kobject_add_internal+0x354/0xac0 [ 682.471557] ? kobj_ns_type_registered+0x60/0x60 [ 682.476329] ? lock_downgrade+0x8e0/0x8e0 [ 682.480494] ? refcount_add_not_zero+0x320/0x320 [ 682.485267] ? kasan_check_read+0x11/0x20 [ 682.489431] kobject_add+0x13a/0x190 [ 682.493157] ? kset_create_and_add+0x190/0x190 [ 682.497765] ? mutex_unlock+0xd/0x10 [ 682.501504] device_add+0x3a5/0x16d0 [ 682.505243] ? device_private_init+0x230/0x230 [ 682.509831] ? kfree+0x1e9/0x260 [ 682.513216] ? kfree_const+0x5e/0x70 [ 682.516950] device_create_groups_vargs+0x1ff/0x270 [ 682.521996] device_create_vargs+0x46/0x60 [ 682.526249] bdi_register_va.part.10+0xbb/0x9b0 [ 682.530932] ? cgwb_kill+0x630/0x630 [ 682.534663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.540207] ? bdi_init+0x416/0x510 [ 682.543845] ? wb_init+0x9e0/0x9e0 [ 682.547397] ? bdi_alloc_node+0x67/0xe0 [ 682.551379] ? bdi_alloc_node+0x67/0xe0 [ 682.555453] ? rcu_read_lock_sched_held+0x108/0x120 [ 682.560481] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 682.565776] ? _raw_spin_unlock+0x22/0x30 [ 682.569943] bdi_register_va+0x68/0x80 [ 682.573854] super_setup_bdi_name+0x123/0x220 [ 682.578368] ? kill_block_super+0x100/0x100 [ 682.582703] ? kmem_cache_alloc_trace+0x616/0x780 [ 682.587557] ? match_wildcard+0x3c0/0x3c0 [ 682.591715] ? trace_hardirqs_on+0xd/0x10 [ 682.595889] fuse_fill_super+0xe6e/0x1e20 [ 682.600066] ? fuse_get_root_inode+0x190/0x190 [ 682.604670] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 682.609704] ? kasan_check_read+0x11/0x20 [ 682.613869] ? cap_capable+0x1f9/0x260 [ 682.617786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.623336] ? security_capable+0x99/0xc0 [ 682.627504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.633048] ? ns_capable_common+0x13f/0x170 [ 682.637473] ? get_anon_bdev+0x2f0/0x2f0 [ 682.641546] ? sget+0x113/0x150 [ 682.644845] ? fuse_get_root_inode+0x190/0x190 [ 682.649442] mount_nodev+0x6b/0x110 [ 682.653086] fuse_mount+0x2c/0x40 [ 682.656557] mount_fs+0xae/0x328 [ 682.659948] vfs_kern_mount.part.34+0xd4/0x4d0 [ 682.664553] ? may_umount+0xb0/0xb0 [ 682.668189] ? _raw_read_unlock+0x22/0x30 [ 682.672350] ? __get_fs_type+0x97/0xc0 [ 682.676263] do_mount+0x564/0x3070 [ 682.679829] ? copy_mount_string+0x40/0x40 [ 682.684079] ? rcu_pm_notify+0xc0/0xc0 [ 682.687999] ? copy_mount_options+0x5f/0x380 [ 682.692415] ? rcu_read_lock_sched_held+0x108/0x120 [ 682.697443] ? kmem_cache_alloc_trace+0x616/0x780 [ 682.702303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.707855] ? _copy_from_user+0xdf/0x150 [ 682.712023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.717572] ? copy_mount_options+0x285/0x380 [ 682.722087] ksys_mount+0x12d/0x140 [ 682.725741] __x64_sys_mount+0xbe/0x150 [ 682.729728] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 682.734762] do_syscall_64+0x1b1/0x800 [ 682.738661] ? finish_task_switch+0x1ca/0x840 [ 682.743173] ? syscall_return_slowpath+0x5c0/0x5c0 [ 682.748117] ? syscall_return_slowpath+0x30f/0x5c0 [ 682.753065] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 682.758450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 682.763316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.768510] RIP: 0033:0x455a09 [ 682.771703] RSP: 002b:00007f1690d56808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:37:46 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x200000005, 0x1) times(&(0x7f0000000380)) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f00000001c0)=""/110, 0x6e}, {&(0x7f0000000240)=""/167, 0xa7}, {&(0x7f0000000300)=""/86, 0x56}], 0x4, 0x0) exit(0x5c) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) prctl$intptr(0x0, 0x7fffffff) 2033/05/18 03:37:46 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffffd, 0x125000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x3c, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e23, 0x164, @ipv4={[], [0xff, 0xff], @rand_addr=0x8}, 0x1}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r3, 0x8, 0x400, 0x599, 0x433757c4, 0x1f}, 0x14) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 2033/05/18 03:37:46 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, r0, 0x0, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4024c1, 0x8) accept4(r1, &(0x7f0000000480)=@in={0x0, 0x0, @remote}, &(0x7f0000000500)=0x80, 0x80800) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000003c0)={{0x401, 0x4}, 'port1\x00', 0x1, 0x90004, 0x8, 0x48b, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x6be}) accept4(r1, &(0x7f0000000280)=@pptp={0x0, 0x0, {0x0, @multicast2}}, &(0x7f0000000340)=0x80, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000380)={0x6, 0x1, 0x0, 0x7, 0x6, 0x6}) socket$vsock_dgram(0x28, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x1) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000001c0)=""/94) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000640)=&(0x7f0000000680)) connect$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10) 2033/05/18 03:37:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 682.779426] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 682.786702] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 682.793983] RBP: 0000000000000000 R08: 00007f1690d56820 R09: 0000000000000000 [ 682.801258] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 682.808537] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 682.834151] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 683.370446] device bridge_slave_1 left promiscuous mode [ 683.382893] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.434232] device bridge_slave_0 left promiscuous mode [ 683.439851] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.540810] team0 (unregistering): Port device team_slave_1 removed [ 683.554431] team0 (unregistering): Port device team_slave_0 removed [ 683.567425] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 683.614860] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 683.671799] bond0 (unregistering): Released all slaves 2033/05/18 03:37:47 executing program 1 (fault-call:2 fault-nth:49): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:47 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x4, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:47 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r1, &(0x7f0000000040), 0x10000) 2033/05/18 03:37:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88480000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:47 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000780)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000007c0)={0x2, [0x2, 0xffffffffffffffff]}) r1 = accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x80000) setsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f0000000600)=0x401, 0x4) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x7fff, 0x5, &(0x7f0000000440)=[{&(0x7f00000001c0)="7638a9c99bfc849086d89ca81511252f85c8767f57a83ff36ca1500bda03202f722918a201f67361e009e0d2ff63c4724ecee1613084bc9d434f9e2a827a7b1feb3f8ae00d1a626b5117bcc4dc5b2019ae0e97ae514eb3669a2795067326a6143aa8c7d049d608885eba6c783aa2aed6a8ab2397633b0bd8328d087cf57d62d538f1a87badf77769d112b6b1df", 0x8d, 0xffff}, {&(0x7f0000000280)="e2030f237ec98acf687517274c20b488c6c109439537e4a858df7863dc83c7c22714069234ff2829feae3407ac23a39aafbddd26fa8fd32f5cd5a445e2130e877b7ec2e22fc6da6c2cbe059de3352ae5cc0cf554c559f8d483fd7be7079686012250cb005f93fa86f9061a5e868871aec867654b9c92fad82698fba416bf2452f6fc83914a4c3211bed65f164544a690193e547d521058c0813ea982efa585e4fba4", 0xa2, 0x365a}, {&(0x7f00000000c0)="5480d1391b1a", 0x6, 0x80}, {&(0x7f0000000340)="b3", 0x1, 0x1}, {&(0x7f0000000380)="ec7aba31286079eca5c2c85a774db0c359e74f99c5de1963591a05baea0ab0d44a833e90e1e364116a12735a7d2229dc22f0a0deaf3db79a8b736ca933fdc3e07ab9dc87368de220bbf8b1c74a4caf1ae299e7dfbfefc2e985eadab0487ea53eecb7b63ea113c49e6778032fee1af49a154d0e61bb7d02ac0b1b5172eeedd06dd401c6305cc8f9208de2f11c630ee2453a1c0eca8cc70520110595ffe672455b00f2d02930ab1771e2", 0xa9, 0x34a4}], 0x8024, &(0x7f00000004c0)=ANY=[@ANYBLOB="6769643d363f3438362c696f636861727365743d63703836342c63726561746f723dc12a83ab2c63726561746f723db6ed8a4a2c636f6465706167653d69736f383835392d332c696f636865743d6d616363726f617469616e2c00"]) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x7, 0x9e7e, 0x100, 0x800, 0x0, 0x526, 0x2040, 0x1, 0x5347eb1c, 0x5, 0x8, 0x81, 0x24, 0x2, 0x100000001, 0x1, 0x8001, 0x40000000000000, 0x5, 0x3ef, 0x10000000, 0x2, 0x4, 0xbc, 0x6, 0xfffffffffffffffb, 0x4, 0x100000001, 0x1, 0xff, 0x4, 0x7, 0x1000, 0x8d0, 0x5, 0x9, 0x0, 0x7ff, 0x4, @perf_bp={&(0x7f0000000640)}, 0x2001, 0xa92, 0x1, 0x0, 0x7, 0x20, 0x4}, r4, 0x0, r2, 0x0) pipe2(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) fcntl$dupfd(r6, 0x406, r1) 2033/05/18 03:37:47 executing program 6: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x7ffff000}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 683.945930] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 683.952875] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:47 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x17}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:47 executing program 5: perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000012c0)=""/168, 0xa8) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000001240)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], &(0x7f0000000240)=""/4096}, &(0x7f0000000040)=0x78) syz_open_dev$amidi(&(0x7f0000001380)='/dev/amidi#\x00', 0x5, 0x141200) pkey_alloc(0x0, 0x595770c25a6de178) 2033/05/18 03:37:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x9, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:47 executing program 7: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x12000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000001c0)={0x7, {{0xa, 0x4e23, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x88) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) 2033/05/18 03:37:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8847], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:47 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 684.085181] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 684.203986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 684.228285] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 685.778464] IPVS: ftp: loaded support on port[0] = 21 [ 686.349672] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.356124] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.369538] device bridge_slave_0 entered promiscuous mode [ 686.408455] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.414901] bridge0: port 2(bridge_slave_1) entered disabled state [ 686.423525] device bridge_slave_1 entered promiscuous mode [ 686.460443] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 686.498258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 686.608123] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 686.648245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 686.817711] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 686.826114] team0: Port device team_slave_0 added [ 686.861708] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 686.869572] team0: Port device team_slave_1 added [ 686.907287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 686.948872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 686.989414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 687.030581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 687.402837] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.409277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 687.415951] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.422325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 687.430312] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 688.224144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 688.770807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 688.899405] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 689.029085] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 689.035375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 689.051251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 689.177793] 8021q: adding VLAN 0 to HW filter on device team0 [ 689.995686] FAT-fs (loop1): bogus number of reserved sectors [ 690.001652] FAT-fs (loop1): Can't find a valid FAT filesystem [ 690.118330] FAULT_INJECTION: forcing a failure. [ 690.118330] name failslab, interval 1, probability 0, space 0, times 0 [ 690.129669] CPU: 1 PID: 13043 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 690.136947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.146301] Call Trace: [ 690.148904] dump_stack+0x1b9/0x294 [ 690.152553] ? dump_stack_print_info.cold.2+0x52/0x52 [ 690.157754] ? finish_task_switch+0x1ca/0x840 [ 690.162257] ? finish_task_switch+0x182/0x840 [ 690.166774] should_fail.cold.4+0xa/0x1a [ 690.170852] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 690.175981] ? __schedule+0x809/0x1e30 [ 690.179883] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 690.185007] ? __sched_text_start+0x8/0x8 [ 690.189167] ? find_held_lock+0x36/0x1c0 [ 690.193249] ? __lock_is_held+0xb5/0x140 [ 690.197343] ? check_same_owner+0x320/0x320 [ 690.201691] __should_failslab+0x124/0x180 [ 690.205938] should_failslab+0x9/0x14 [ 690.209747] kmem_cache_alloc+0x2af/0x760 [ 690.213902] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 690.218930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.223702] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 690.228738] __kernfs_new_node+0xe7/0x580 [ 690.232906] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 690.237684] ? lock_release+0x4d4/0xa10 [ 690.241683] ? lock_downgrade+0x8e0/0x8e0 [ 690.245855] kernfs_new_node+0x80/0xf0 [ 690.249765] __kernfs_create_file+0x4d/0x330 [ 690.254196] sysfs_add_file_mode_ns+0x21a/0x560 [ 690.258892] sysfs_create_file_ns+0x8b/0xb0 [ 690.263230] device_create_file+0xf4/0x1e0 [ 690.267479] ? acpi_bind_one+0x8f0/0x8f0 [ 690.271551] device_add+0x3ec/0x16d0 [ 690.275287] ? device_private_init+0x230/0x230 [ 690.279877] ? kfree+0x1e9/0x260 [ 690.283259] ? kfree_const+0x5e/0x70 [ 690.286989] device_create_groups_vargs+0x1ff/0x270 [ 690.292024] device_create_vargs+0x46/0x60 [ 690.296277] bdi_register_va.part.10+0xbb/0x9b0 [ 690.300959] ? cgwb_kill+0x630/0x630 [ 690.304686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.310232] ? bdi_init+0x416/0x510 [ 690.313865] ? wb_init+0x9e0/0x9e0 [ 690.317419] ? bdi_alloc_node+0x67/0xe0 [ 690.321400] ? bdi_alloc_node+0x67/0xe0 [ 690.325385] ? rcu_read_lock_sched_held+0x108/0x120 [ 690.330412] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 690.335707] ? _raw_spin_unlock+0x22/0x30 [ 690.339873] bdi_register_va+0x68/0x80 [ 690.343773] super_setup_bdi_name+0x123/0x220 [ 690.348281] ? kill_block_super+0x100/0x100 [ 690.352618] ? kmem_cache_alloc_trace+0x616/0x780 [ 690.357475] ? match_wildcard+0x3c0/0x3c0 [ 690.361648] ? trace_hardirqs_on+0xd/0x10 [ 690.365821] fuse_fill_super+0xe6e/0x1e20 [ 690.369988] ? fuse_get_root_inode+0x190/0x190 [ 690.374589] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 690.379621] ? kasan_check_read+0x11/0x20 [ 690.383788] ? cap_capable+0x1f9/0x260 [ 690.387697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.393244] ? security_capable+0x99/0xc0 [ 690.397407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.402954] ? ns_capable_common+0x13f/0x170 [ 690.407377] ? get_anon_bdev+0x2f0/0x2f0 [ 690.411456] ? sget+0x113/0x150 [ 690.414750] ? fuse_get_root_inode+0x190/0x190 [ 690.419344] mount_nodev+0x6b/0x110 [ 690.422984] fuse_mount+0x2c/0x40 [ 690.426449] mount_fs+0xae/0x328 [ 690.429840] vfs_kern_mount.part.34+0xd4/0x4d0 [ 690.434437] ? may_umount+0xb0/0xb0 [ 690.438079] ? _raw_read_unlock+0x22/0x30 [ 690.442234] ? __get_fs_type+0x97/0xc0 [ 690.446140] do_mount+0x564/0x3070 [ 690.449699] ? copy_mount_string+0x40/0x40 [ 690.453942] ? rcu_pm_notify+0xc0/0xc0 [ 690.457854] ? copy_mount_options+0x5f/0x380 [ 690.462273] ? rcu_read_lock_sched_held+0x108/0x120 [ 690.467299] ? kmem_cache_alloc_trace+0x616/0x780 [ 690.472160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.477707] ? _copy_from_user+0xdf/0x150 [ 690.481874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.487422] ? copy_mount_options+0x285/0x380 [ 690.491938] ksys_mount+0x12d/0x140 [ 690.495581] __x64_sys_mount+0xbe/0x150 [ 690.499566] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 690.504598] do_syscall_64+0x1b1/0x800 [ 690.508498] ? finish_task_switch+0x1ca/0x840 [ 690.513006] ? syscall_return_slowpath+0x5c0/0x5c0 [ 690.517947] ? syscall_return_slowpath+0x30f/0x5c0 [ 690.522901] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 690.528286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 690.533160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.538353] RIP: 0033:0x455a09 [ 690.541546] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 690.549271] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 690.556544] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 690.563829] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 690.571103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 690.578377] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:54 executing program 1 (fault-call:2 fault-nth:50): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x37}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:54 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xca200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r3, 0x0, 0x2, 0x7}, 0x10) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/141) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000040)={0x812, 0x40, 0x8, 0x5, 0xd1df, 0x6}) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r5 = socket$inet(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000005e006d60583bfd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 2033/05/18 03:37:54 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x5c500, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[@ANYBLOB="040000000000000000500000000000000900000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000010000000000f300000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000701000000000004600000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000800000000000000400000000000005a0000000000000024f46be342fd4db63993ca4855a43941d4fc16b38f54773dbb16180283757af6b1c31a51530bff758d98d06c35618fc7de272478474c03349d26e3fb4b53d56be9fb46ab0c4a38c404ee009321b8de06cb98198cf6cdcd9ae64e9cf7f1e5da8fb36a5d3a528e922576bbdd3c52f4209f566b8f6e7989fddae11955a1ae3d03bfcb9183cecd44641c17b39d4f01a8642adcc7b08e829d1fea6b1376cf2bcc453d5c808e986176d3f76fa2b07167c61623254e0348f075619b922a3a774b844653f2f0ccd3e6355f2c54df2579354b1119a9820bb098132aa9cb662b02f67875b2a48602", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f00000004c0)="1b613e6d19da6cffee1e48a77b89ef34b5b30840fe8c8a357a9a8684748be0035b806a0aca3712b28da359deab2d823198248c326bfa289db5f98c69e41aba81ed7bc59b61b46ea825d24b1f369a58737e3eaf5d686c13460636970819f072b0e790a182f7e10cc3cff8ec9514a12fa5b47976abb00f289a32d3fe5d0978df2476f35ed8376a641bb950419e4e8c1615bad371bc263c392a3bc721d869ad549bcabe233e354d4371d9663d274ef1d6a7df30512ebd0cc906fd8ce577800fd6c82cd24b785df2c8969ceb3cd010ae65a05040ba238ede7f4475f8b56a2c8a087370303f3805d046eb7b94153b2666", 0xee) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000000)=0x78) 2033/05/18 03:37:54 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:54 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xd95, 0x2) 2033/05/18 03:37:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe803000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x3e}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 690.707221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:54 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:54 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) ptrace$setsig(0x4203, r0, 0x484, &(0x7f00000000c0)={0x2, 0x95c}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:54 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x68000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 690.723999] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 690.797059] FAT-fs (loop1): bogus number of reserved sectors [ 690.809886] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:54 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:54 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket$kcm(0x29, 0x7, 0x0) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 690.831882] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 690.901288] FAULT_INJECTION: forcing a failure. [ 690.901288] name failslab, interval 1, probability 0, space 0, times 0 [ 690.919411] CPU: 0 PID: 13067 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 690.926700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.936065] Call Trace: [ 690.938676] dump_stack+0x1b9/0x294 [ 690.942331] ? dump_stack_print_info.cold.2+0x52/0x52 [ 690.947544] ? __lock_acquire+0x7f5/0x5140 [ 690.951818] should_fail.cold.4+0xa/0x1a [ 690.955908] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 690.960909] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 690.961045] ? graph_lock+0x170/0x170 [ 690.961066] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 690.976715] ? kasan_check_write+0x14/0x20 [ 690.980984] ? find_held_lock+0x36/0x1c0 [ 690.985075] ? __lock_is_held+0xb5/0x140 [ 690.989177] ? check_same_owner+0x320/0x320 [ 690.993520] ? rcu_note_context_switch+0x710/0x710 [ 690.998475] __should_failslab+0x124/0x180 [ 691.002728] should_failslab+0x9/0x14 [ 691.006540] kmem_cache_alloc+0x2af/0x760 [ 691.010700] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 691.016253] ? graph_lock+0x170/0x170 [ 691.020070] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 691.025106] __kernfs_new_node+0xe7/0x580 [ 691.029269] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 691.034038] ? find_held_lock+0x36/0x1c0 [ 691.038131] ? lock_downgrade+0x8e0/0x8e0 [ 691.042297] kernfs_new_node+0x80/0xf0 [ 691.046202] __kernfs_create_file+0x4d/0x330 [ 691.050632] sysfs_add_file_mode_ns+0x21a/0x560 [ 691.055329] sysfs_create_file_ns+0x8b/0xb0 [ 691.059662] device_create_file+0xf4/0x1e0 [ 691.063908] ? acpi_bind_one+0x8f0/0x8f0 [ 691.067990] device_add+0x3ec/0x16d0 [ 691.071723] ? device_private_init+0x230/0x230 [ 691.076312] ? kfree+0x1e9/0x260 [ 691.079694] ? kfree_const+0x5e/0x70 [ 691.083426] device_create_groups_vargs+0x1ff/0x270 [ 691.088459] device_create_vargs+0x46/0x60 [ 691.092716] bdi_register_va.part.10+0xbb/0x9b0 [ 691.097397] ? cgwb_kill+0x630/0x630 [ 691.101127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.106670] ? bdi_init+0x416/0x510 [ 691.110305] ? wb_init+0x9e0/0x9e0 [ 691.113861] ? bdi_alloc_node+0x67/0xe0 [ 691.117845] ? bdi_alloc_node+0x67/0xe0 [ 691.121829] ? rcu_read_lock_sched_held+0x108/0x120 [ 691.126858] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 691.132152] ? _raw_spin_unlock+0x22/0x30 [ 691.136318] bdi_register_va+0x68/0x80 [ 691.140221] super_setup_bdi_name+0x123/0x220 [ 691.144727] ? kill_block_super+0x100/0x100 [ 691.149061] ? kmem_cache_alloc_trace+0x616/0x780 [ 691.153921] ? match_wildcard+0x3c0/0x3c0 [ 691.158083] ? trace_hardirqs_on+0xd/0x10 [ 691.162255] fuse_fill_super+0xe6e/0x1e20 [ 691.166428] ? fuse_get_root_inode+0x190/0x190 [ 691.171029] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 691.176064] ? kasan_check_read+0x11/0x20 [ 691.180230] ? cap_capable+0x1f9/0x260 [ 691.184139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.189688] ? security_capable+0x99/0xc0 [ 691.193851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.199399] ? ns_capable_common+0x13f/0x170 [ 691.203824] ? get_anon_bdev+0x2f0/0x2f0 [ 691.207895] ? sget+0x113/0x150 [ 691.211198] ? fuse_get_root_inode+0x190/0x190 [ 691.215791] mount_nodev+0x6b/0x110 [ 691.219433] fuse_mount+0x2c/0x40 [ 691.222907] mount_fs+0xae/0x328 [ 691.226294] vfs_kern_mount.part.34+0xd4/0x4d0 [ 691.230893] ? may_umount+0xb0/0xb0 [ 691.234538] ? _raw_read_unlock+0x22/0x30 [ 691.238692] ? __get_fs_type+0x97/0xc0 [ 691.242601] do_mount+0x564/0x3070 [ 691.246164] ? copy_mount_string+0x40/0x40 [ 691.250409] ? rcu_pm_notify+0xc0/0xc0 [ 691.254321] ? copy_mount_options+0x5f/0x380 [ 691.258736] ? rcu_read_lock_sched_held+0x108/0x120 [ 691.263764] ? kmem_cache_alloc_trace+0x616/0x780 [ 691.268621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 691.274168] ? _copy_from_user+0xdf/0x150 [ 691.278336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.283884] ? copy_mount_options+0x285/0x380 [ 691.288400] ksys_mount+0x12d/0x140 [ 691.292043] __x64_sys_mount+0xbe/0x150 [ 691.296029] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 691.301061] do_syscall_64+0x1b1/0x800 [ 691.304959] ? finish_task_switch+0x1ca/0x840 [ 691.309465] ? syscall_return_slowpath+0x5c0/0x5c0 [ 691.314411] ? syscall_return_slowpath+0x30f/0x5c0 [ 691.319359] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 691.324743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 691.329607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.334802] RIP: 0033:0x455a09 [ 691.337996] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 691.345719] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:37:55 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socket(0xffef57e6183cb282, 0x800, 0x8000) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x13}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 691.353001] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 691.360275] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 691.367550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 691.374824] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 691.396734] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:55 executing program 1 (fault-call:2 fault-nth:51): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x2000000000000, 0x8001, 0x1f, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e048dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:55 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='ip_vti0\x00', 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x301100, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x401}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r3, 0x4171, 0x3}, 0xc) 2033/05/18 03:37:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x27}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:55 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80, 0x400000) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000040)=""/31) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:55 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x86ddffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x21}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 691.518756] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 691.547436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:55 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:55 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:55 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100, 0x0) accept4$ipx(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x80000) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x6}, &(0x7f0000000200)=0x8) fremovexattr(r0, &(0x7f0000000280)=@random={'trusted.', '/dev/snd/pcmC#D#p\x00'}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r3, 0x400000}, 0x8) 2033/05/18 03:37:55 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x4000000000000001, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0x10001, 0x0, 0x2, 0x20}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000040)={r2, 0x97}) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 691.600447] FAT-fs (loop1): bogus number of reserved sectors [ 691.606460] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:55 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:55 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 691.652137] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 691.673411] FAULT_INJECTION: forcing a failure. [ 691.673411] name failslab, interval 1, probability 0, space 0, times 0 [ 691.691578] CPU: 0 PID: 13112 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 691.698885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.708283] Call Trace: [ 691.710939] dump_stack+0x1b9/0x294 [ 691.714615] ? dump_stack_print_info.cold.2+0x52/0x52 [ 691.719853] should_fail.cold.4+0xa/0x1a [ 691.723969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 691.729127] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 691.734279] ? graph_lock+0x170/0x170 [ 691.738132] ? perf_tp_event+0xc30/0xc30 [ 691.742227] ? find_held_lock+0x36/0x1c0 [ 691.746320] ? __lock_is_held+0xb5/0x140 [ 691.750427] ? check_same_owner+0x320/0x320 [ 691.754764] ? graph_lock+0x170/0x170 [ 691.758589] ? rcu_note_context_switch+0x710/0x710 [ 691.762596] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 691.763535] ? kasan_check_write+0x14/0x20 [ 691.763564] __should_failslab+0x124/0x180 [ 691.763589] should_failslab+0x9/0x14 [ 691.763608] kmem_cache_alloc+0x2af/0x760 [ 691.776691] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 691.778165] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 691.778193] __kernfs_new_node+0xe7/0x580 [ 691.778216] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 691.811021] ? lock_downgrade+0x8e0/0x8e0 [ 691.815199] ? kasan_check_read+0x11/0x20 [ 691.819363] ? do_raw_spin_unlock+0x9e/0x2e0 [ 691.823796] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 691.828414] kernfs_new_node+0x80/0xf0 [ 691.832332] kernfs_create_link+0x33/0x180 [ 691.836586] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 691.841893] sysfs_create_link+0x65/0xc0 [ 691.845969] device_add+0x481/0x16d0 [ 691.849706] ? device_private_init+0x230/0x230 [ 691.854298] ? kfree+0x1e9/0x260 [ 691.857684] ? kfree_const+0x5e/0x70 [ 691.861419] device_create_groups_vargs+0x1ff/0x270 [ 691.866823] device_create_vargs+0x46/0x60 [ 691.871085] bdi_register_va.part.10+0xbb/0x9b0 [ 691.875768] ? cgwb_kill+0x630/0x630 [ 691.879500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.885046] ? bdi_init+0x416/0x510 [ 691.888681] ? wb_init+0x9e0/0x9e0 [ 691.892246] ? bdi_alloc_node+0x67/0xe0 [ 691.896227] ? bdi_alloc_node+0x67/0xe0 [ 691.900211] ? rcu_read_lock_sched_held+0x108/0x120 [ 691.905239] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 691.910539] ? _raw_spin_unlock+0x22/0x30 [ 691.914713] bdi_register_va+0x68/0x80 [ 691.918623] super_setup_bdi_name+0x123/0x220 [ 691.923136] ? kill_block_super+0x100/0x100 [ 691.927479] ? kmem_cache_alloc_trace+0x616/0x780 [ 691.932336] ? match_wildcard+0x3c0/0x3c0 [ 691.936502] ? trace_hardirqs_on+0xd/0x10 [ 691.940683] fuse_fill_super+0xe6e/0x1e20 [ 691.944871] ? fuse_get_root_inode+0x190/0x190 [ 691.949473] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 691.954508] ? kasan_check_read+0x11/0x20 [ 691.958679] ? cap_capable+0x1f9/0x260 [ 691.962679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.968251] ? security_capable+0x99/0xc0 [ 691.972418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.977965] ? ns_capable_common+0x13f/0x170 [ 691.982391] ? get_anon_bdev+0x2f0/0x2f0 [ 691.986464] ? sget+0x113/0x150 [ 691.989764] ? fuse_get_root_inode+0x190/0x190 [ 691.994356] mount_nodev+0x6b/0x110 [ 691.998000] fuse_mount+0x2c/0x40 [ 692.001467] mount_fs+0xae/0x328 [ 692.004862] vfs_kern_mount.part.34+0xd4/0x4d0 [ 692.009468] ? may_umount+0xb0/0xb0 [ 692.013111] ? _raw_read_unlock+0x22/0x30 [ 692.017275] ? __get_fs_type+0x97/0xc0 [ 692.021186] do_mount+0x564/0x3070 [ 692.024753] ? copy_mount_string+0x40/0x40 [ 692.029007] ? rcu_pm_notify+0xc0/0xc0 [ 692.032927] ? copy_mount_options+0x5f/0x380 [ 692.037349] ? rcu_read_lock_sched_held+0x108/0x120 [ 692.042374] ? kmem_cache_alloc_trace+0x616/0x780 [ 692.047241] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.052792] ? _copy_from_user+0xdf/0x150 [ 692.056963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.062510] ? copy_mount_options+0x285/0x380 [ 692.067026] ksys_mount+0x12d/0x140 [ 692.070674] __x64_sys_mount+0xbe/0x150 [ 692.074659] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 692.079696] do_syscall_64+0x1b1/0x800 [ 692.083592] ? finish_task_switch+0x1ca/0x840 [ 692.088102] ? syscall_return_slowpath+0x5c0/0x5c0 [ 692.093046] ? syscall_return_slowpath+0x30f/0x5c0 [ 692.097996] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 692.103382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 692.108246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.113442] RIP: 0033:0x455a09 [ 692.116636] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 692.124367] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 692.131656] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 692.138932] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 692.146208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 692.153489] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:56 executing program 1 (fault-call:2 fault-nth:52): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:56 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400100, 0x0) sendto(r0, &(0x7f00000001c0)="94b04e95c0888fdc9a55cb647ac498381b843fc6c43de00ad55165aeda7cba1a01b2626bc4c9f41c41a8acad92a2f9fdbd26341bc4993c3a6141bf461ff68d6726414802eaca5f8361184e4b6083801058e2dcb95ac83d52", 0x58, 0x81, &(0x7f0000000240)=@rc={0x1f, {0x92b0, 0x0, 0x4, 0xfd7, 0x8, 0x4}, 0xf9}, 0x80) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:56 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xcd0e], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x12}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:56 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2d, 'rdma', 0x20}, {0x2b, 'memory', 0x20}, {0x2f, 'io', 0x20}, {0x2f, 'pids', 0x20}, {0x0, 'memory', 0x20}, {0x2b, 'memory', 0x20}]}, 0x28) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x5, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565009a9d325e19a54c46fe7a54cdbd77b3", 0x37}, 0x1f4) 2033/05/18 03:37:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 692.272811] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x200000c1}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:56 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) accept4$netrom(r1, &(0x7f00000001c0)=@full, &(0x7f0000000040)=0x48, 0x800) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x19}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x181800, 0x0) r1 = accept$ax25(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10) socketpair(0x7, 0x4, 0x8, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000300)={r1, r2, 0x92fc, 0x20, &(0x7f0000000280)="d7fb60b01eed5b8b0e1c708b744f6ff61ec5152dc98ec502821399edafd092a9cae7d0c25d6439d470fdaf62cfacb28ee551d8d960a7ae925e677ef14efafd5c5ab62c74c3426cb1effb96536d2d143e97b5060acf2e7ec4a7dc6434af30c985", 0x4, 0x4cd6, 0x6, 0x3, 0x10000, 0x1ff, 0xffff, "4a3687b772793c5372c3abefeb987e28257d67e7e7eafb526b7d490f00cb59c2d0a8dfc76a7dededa867e1f65ad95af9d03c9469894414294ce7a35da637499b37aff60b2d20c79415626a797d07e1e2464e35dbb79ccf46f216cad72c62ef3b67c4b22c758bd3bd2dfebae1b7ff331782e0848724dcaa5f1a7c5c68806fab5fa0203370d920486e307dc289daef95b475df338c2775529ad62f9217adc70a51f93e27b9064584b5e33bb670efdfcf549affbabdda9976cfa4485d3ba9e441960c63bb47f25dab36b5bb20e16fc20fb95f544b576c"}) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x161a00, 0x0) setsockopt$inet_udp_int(r4, 0x11, 0x67, &(0x7f0000000040)=0x6, 0x4) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:56 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x400000000001, 0x1) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f00000001c0)=""/176, 0xb0) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6c], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 692.287012] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 692.502508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 692.617480] FAT-fs (loop1): bogus number of reserved sectors [ 692.623477] FAT-fs (loop1): Can't find a valid FAT filesystem [ 692.706436] FAULT_INJECTION: forcing a failure. [ 692.706436] name failslab, interval 1, probability 0, space 0, times 0 [ 692.717764] CPU: 1 PID: 13155 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 692.725046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.734399] Call Trace: [ 692.737002] dump_stack+0x1b9/0x294 [ 692.740649] ? dump_stack_print_info.cold.2+0x52/0x52 [ 692.745852] ? __lock_acquire+0x7f5/0x5140 [ 692.750114] should_fail.cold.4+0xa/0x1a [ 692.754191] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 692.759325] ? graph_lock+0x170/0x170 [ 692.763140] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 692.768258] ? kasan_check_write+0x14/0x20 [ 692.772507] ? find_held_lock+0x36/0x1c0 [ 692.776593] ? __lock_is_held+0xb5/0x140 [ 692.780689] ? check_same_owner+0x320/0x320 [ 692.785027] ? rcu_note_context_switch+0x710/0x710 [ 692.789979] __should_failslab+0x124/0x180 [ 692.794229] should_failslab+0x9/0x14 [ 692.798040] kmem_cache_alloc+0x2af/0x760 [ 692.802201] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 692.807747] ? graph_lock+0x170/0x170 [ 692.811560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 692.816590] __kernfs_new_node+0xe7/0x580 [ 692.820758] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 692.825529] ? find_held_lock+0x36/0x1c0 [ 692.829619] ? lock_downgrade+0x8e0/0x8e0 [ 692.833785] kernfs_new_node+0x80/0xf0 [ 692.837688] __kernfs_create_file+0x4d/0x330 [ 692.842115] sysfs_add_file_mode_ns+0x21a/0x560 [ 692.846807] sysfs_create_file_ns+0x8b/0xb0 [ 692.851140] device_create_file+0xf4/0x1e0 [ 692.855382] ? acpi_bind_one+0x8f0/0x8f0 [ 692.859454] device_add+0x3ec/0x16d0 [ 692.863191] ? device_private_init+0x230/0x230 [ 692.867781] ? kfree+0x1e9/0x260 [ 692.871163] ? kfree_const+0x5e/0x70 [ 692.874898] device_create_groups_vargs+0x1ff/0x270 [ 692.879933] device_create_vargs+0x46/0x60 [ 692.884188] bdi_register_va.part.10+0xbb/0x9b0 [ 692.888869] ? cgwb_kill+0x630/0x630 [ 692.892600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.898144] ? bdi_init+0x416/0x510 [ 692.901777] ? wb_init+0x9e0/0x9e0 [ 692.905330] ? bdi_alloc_node+0x67/0xe0 [ 692.909315] ? bdi_alloc_node+0x67/0xe0 [ 692.913313] ? rcu_read_lock_sched_held+0x108/0x120 [ 692.918342] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 692.923640] ? _raw_spin_unlock+0x22/0x30 [ 692.927805] bdi_register_va+0x68/0x80 [ 692.931707] super_setup_bdi_name+0x123/0x220 [ 692.936212] ? kill_block_super+0x100/0x100 [ 692.940546] ? kmem_cache_alloc_trace+0x616/0x780 [ 692.945397] ? match_wildcard+0x3c0/0x3c0 [ 692.949556] ? trace_hardirqs_on+0xd/0x10 [ 692.953728] fuse_fill_super+0xe6e/0x1e20 [ 692.957901] ? fuse_get_root_inode+0x190/0x190 [ 692.962498] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 692.967535] ? kasan_check_read+0x11/0x20 [ 692.971700] ? cap_capable+0x1f9/0x260 [ 692.975613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.981161] ? security_capable+0x99/0xc0 [ 692.985327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.990875] ? ns_capable_common+0x13f/0x170 [ 692.995299] ? get_anon_bdev+0x2f0/0x2f0 [ 692.999369] ? sget+0x113/0x150 [ 693.002661] ? fuse_get_root_inode+0x190/0x190 [ 693.007257] mount_nodev+0x6b/0x110 [ 693.010901] fuse_mount+0x2c/0x40 [ 693.014367] mount_fs+0xae/0x328 [ 693.017753] vfs_kern_mount.part.34+0xd4/0x4d0 [ 693.022350] ? may_umount+0xb0/0xb0 [ 693.025987] ? _raw_read_unlock+0x22/0x30 [ 693.030145] ? __get_fs_type+0x97/0xc0 [ 693.034054] do_mount+0x564/0x3070 [ 693.037608] ? do_raw_spin_unlock+0x9e/0x2e0 [ 693.042033] ? copy_mount_string+0x40/0x40 [ 693.046277] ? rcu_pm_notify+0xc0/0xc0 [ 693.050193] ? copy_mount_options+0x5f/0x380 [ 693.054607] ? rcu_read_lock_sched_held+0x108/0x120 [ 693.059630] ? kmem_cache_alloc_trace+0x616/0x780 [ 693.064489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.070047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.075591] ? copy_mount_options+0x285/0x380 [ 693.080103] ksys_mount+0x12d/0x140 [ 693.083748] __x64_sys_mount+0xbe/0x150 [ 693.087729] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 693.092760] do_syscall_64+0x1b1/0x800 [ 693.096656] ? finish_task_switch+0x1ca/0x840 [ 693.101163] ? syscall_return_slowpath+0x5c0/0x5c0 [ 693.106104] ? syscall_return_slowpath+0x30f/0x5c0 [ 693.111052] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 693.116433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 693.121301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.126498] RIP: 0033:0x455a09 [ 693.129694] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 693.137417] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 693.144694] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 693.151966] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 693.159243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 693.166518] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:57 executing program 1 (fault-call:2 fault-nth:53): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x9}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/230) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:37:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7f, 0x80040) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000200)=0xf002) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:57 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:57 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, "8811e78754a539d39c2bd6a4f0cbc8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55eabe9e068dd58ce565aa9a52325ebac7627ffe7a32cdbd77b3", 0x200}, 0x60) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040), 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0), 0x0) r2 = dup2(r0, r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000000)={0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}]}) shmget$private(0x0, 0x1000, 0x80, &(0x7f0000ffd000/0x1000)=nil) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000680), &(0x7f0000000640)=0x6) 2033/05/18 03:37:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x80) setsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f0000000040)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x7, 0x2, 0x4, 0x10000, r1}, 0x10) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000000c0)) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 693.281530] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 693.299138] FAT-fs (loop1): bogus number of reserved sectors [ 693.305078] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:57 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xf}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:57 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1001, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:37:57 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000001c0)=0xc) r1 = open(&(0x7f0000000200)='./file0\x00', 0x8000, 0x90) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x80c, 0x3, 0x3f, 0xfffffffffffffff8, 0x0, 0x7, 0x44, 0x3, 0x5, 0x1, 0x1, 0x80, 0xfff, 0x3, 0x3f, 0x3, 0x7f, 0x2d, 0x10000, 0x4000000000006, 0x281, 0x6, 0x8, 0x66, 0x10, 0x8, 0x401, 0xffffffff, 0x8, 0x1, 0x3, 0xfffffffffffffffa, 0x8, 0xfffffffffffffffd, 0x3, 0x100000001, 0x0, 0xfffffffffffffff8, 0x1, @perf_config_ext={0x6ebf73fa, 0x8114}, 0x1010, 0x4, 0x5, 0x4, 0x0, 0x100, 0xb137}, r0, 0x5, r1, 0xa) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001940)={0x0, @in6={{0xa, 0x4e24, 0x78d, @dev={0xfe, 0x80, [], 0x14}, 0x6}}}, &(0x7f0000001a00)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001a40)={r3, 0x1}, &(0x7f0000001a80)=0x8) connect$rds(r1, &(0x7f0000001900)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x10) sendmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000240)=@in={0x2, 0x4e21, @multicast2=0xe0000002}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000002c0)="d5dc104df5e6d160443b83440958437508b804e436954240d3070cfb5598ed3b5ca4dc6d8f220c993a7369b5b87cd19fdd8dcd84f5e98345a14613985f29ba85bbf9ee00f49f452d6480c3fd095c0735f97777dcda3f14d4121d4917f983c67db260f4522248f160689d6056e8d008c40d3e2d4b2122644f3a19b5aa7632043ef6e68793afe9e561834af0b6f037891648e33d72d96613d22e79ed8f52fed842ef1434f22ae2d1aae53d139c0b6364465ff78a51e67e", 0xb6}, {&(0x7f0000000380)="8965852dd009579d9defc1b5220247cf4fa85a2f230a747c5173a50a64d5abec9ddd55a1545da12f655ceaff5ec018c80ee3c6c66effbd4726aea43f6baa442d085a59a8934e405b95d8d41243d371aefdc350b739ec633d4ac25d8f55e558c150f0bf76e55f0393a156d98bfc2130203caf3639761ab0fa79979fa2d1d07669bbcf101efcb1c6df0d5fd5cf519f7341", 0x90}, {&(0x7f0000000440)="04153bf4370280a5845b534d039e6a", 0xf}, {&(0x7f0000000480)="3f8ae2967947c6e335f2b824e07949c0b68fa90cad2c223535a7bc4f4d473cd15403ab04357814d7ae4ef6184bc2b2456e8bdba58ffc79199dfeedb8b1aea120c096afdd66b7f52b64d9e76fdf22084bb84f8a2d83", 0x55}, {&(0x7f0000000500)="800cf4ab7a1b70", 0x7}, {&(0x7f0000000540)="26ca37f9d3d062bb720c5177883ad020703fb254076f757fc92ac176d860b14d394b8fc4d4a78a0a9117e9ab67a959a7f5612fff325d196498c016bf2579de93406eba4242c4978bd270e54c56461598124dba6d5841491fa63534b070bf63e9cddfca9df6fd52718bfd49", 0x6b}, {&(0x7f00000005c0)="d96619ab516d9faa353820432115d624c00832452d5c5cb4f55f3a7c5f91ea23c1aca2413bccf02516c8c8c12fc582489b9b2bb9230caa0dde90f2794124ad47daed9f5f97cd589e324caa19cb35f8f7e78544164e7ce56952098fc558b35689c1b1f28ad1d54ae2c24599cc98d23cba91d64ba49845606189eb790e3d441b1d32719f291d9de5d7dd2ed105a4eebb82fd6c1f443b1608e0e4485aa254e60ce2b8d09353f6d2fc0612fdaedc9470a0b2a1ef7a96a343f04aeef6082fb31022fa2251673e70d5a50db7e4fde4f82bbcdae196e9f9f43971ef47910c8f7a92c0a5638c7a9ea3d300a13a4ee971507476d5bbcc42681ca4580a4803fe41a87d04ff1819920dd75347ee69a25cd660a9360c272e076e08f39c04071f387f033adee40787cfa145eba383639a9fa626a3bff27d1a5535907c2885feeadb0c94a0747f0beb5265a5864af5cf3c20485f9ae5fd379a6384be9a60f9f40cd7a73afc5534a61ebfba30ff765f00f1ac6196ce1d1159d2cfee3c97b558419715eb6c0b1490c996eb8799d047e1070e46cc5b40e3857788b0290cb3172d9dc164c3bdc8cf35cbbd22afee48c335021a7e015fa433531f8a2597fefa08741be9acfdd3adbc6265e75e057249d3edc40893071d6cc2d19b4211fded4e3c5c02e249d6cb670bdee22c4f388422bcc5f7c79e013bf5ad30e2cfb244d69ca6d004f6c1f6c3c8fcb0a6db3d821a71acc77fc7cc29031f5565b16553de9d9c27ee79733474bf0c11e066ce24689d0825fa1e6cb8f995c36058c39ac73d5b882e681aee6c0f8b72f90507152da2f0fdd569cf1e901140441033e3f5b93130427c474841c71d92cde4bf635045b5f15e459632154ff9bd1120153cd964ed168cb36bbf3b6e0bf380f2debefb130bba2cbdcc20095844b0ee53b02bf5500e9344dd2572f98888f10887be7217e748f764524a7948db30f9b5c0b6bb0fd3712bd3b2153e92dfd6b5b52ef5041115f66d49ddcabab5b544d00f684d38b08cf74bd2aa5dd93d16d04c3889f4423b6c2e9bd3261a8bd3e8edc487e9084b02718b4f8c02a10e5169f3e747d766007622a917d3a3b8ceb2d25567647b9ea02171e0c60bbc9bbd88f77f3a251977b618a3c4b443a9dfd376572c9f7be6f2774fc719a20ef76d8c2bfb328b5668c3e43d396a105c2a69b70460bd840248b4d14a7e494748081d6dce60398e4544284d760391847731e6eaa41727c7c8d90bed6bbe4ea88e624cb66a9453339cf6289c0b7baad8ba0f17065fe195afb2736ff91431a488e2b2bcb6fc15ede5246e5f9b7d5bf595de3aad629242e722d705be58d69ba6e2585e475651ef152c4eea67d57ac90470a233b307ebf475a5d3c787c7d300518e23a11e62d0a02150e4a032e3243725c792b4b16b1f09711030bd017df36578e1b300c3dbef97a5b693bcb5c66eb15fd413c104bb8c52c8971b9bf6f1260e21a41f47bfa17ab0a50323c6e086fe27e32a99f980a4519014ecfcf7b5bac7159113f0a0acc21c4d2294ab5ac81fc6884b3b5fd4ef342a2c362739864b9297821007b72c2e5f78fb248581b3ef8f0ecc99bbf40f88e539f76359e3aaf58ea054a02dac65ab591f19d634d8a83fd912d35c56ce8881b86f632a1693f4b9c36349d63206222a06726f6d08a8b77a8526b721a15d4c82da470d5631f558515554af8b38122582ee29b0d4b40696690f9e8b8d0427ef905ca64aac274c6427413967e090240df2ee76f7e7f697b28683dbdfba7e4cefc228bb145010a494cb283433cb69a5b826abf3a7fb7a98ee3018643c5cdc34fd790cb620915b764a77c49adfdd32862900979a63087ec510a008061c7c6a81e9027457bf80b56c70ff9112f572b6d4f7d2bdba21dc4c75f139f126f6b165390a2b80aa0a12aa7eb3a5cb9151d7d83e00e2409e1d137eff9f87c2b54199e3aa6ffbe131cd62880020531101ef93a57790cd10dcb93189735b610e326509e3d78c3922b14cb9521acb1f8ea12b766a4e3b14acb4a2ef807e57d8f7fccd5a325c6fd92f672ff370515d89c50470ff69aa7ab9503a819c9c761ea5c758e634026af910270551779d8e1284d4ceec341b6774a6fbf1f97d481e740032bce43f9aa03c1451d00ba6996907ab9ab57f679c3108a5be3ea8f9747e0330498329c9a9a4521bb8eddacad37f574707b30b1eb53a7b54cafbcc4cdf46de20f28e9e507f663930eb8b1009db464dd8730858aa9f0ba04cd214790f64559e5424c837bd056b8662f2c72c320c0a766e2d569ed86465fce51b1750c0a666337a137cf025ea9942bb6f9267b52e19f690add0d6e5b92b6a117691d7d1854ee1a65238e5192d9ef7341fa1f0a52e8028152824c478f983834e556fd4e064ade3ebe516ed67d53f3d6f3fd8eac92807caea707a0dd5115f8bce512a8bb5752340ed98929e2bf479325ff3479eda7f466cad461cf813e16815532f40dc865045cdec97a82a4202a4e82c155f1b0f113dd837647c921646bcca4286c03d134f50e48dd252d621c4e9b3e3edcc95daefcccf5985f90f62dccf26414568c28fd169e966e592401046a4cbd7fa15a8f398436d1f59596e2e758d5827a7e37206a08dccd1b452c3d6f68ecec807e76589b3f921c6885894a162be9132559ac3a6cafb3a8ed369b27b0c61df099c3ba9ab37f1def814f35923ab1399da56d39ae57b3fb9ff97ca4c4167a22edf6835118d3df64e72b848ab9cee2471b5ef407d3d1b20ba193b1fd529b104af03f960817e5f1853ae7c37eec5a5d5217d0d5cec69c9c88e8c9fb113f080815a6c001f8d13b6957751ef882544a38447433bac79274ddba77ae0ac25dceb6da137047bf92fa01c655c8dc21e95913eb995e0b74e9b8e6815cf3432d6c573b596faa9b5b4ad64addaa992435140cb3ea3031d6f6831500e7297b16b2d12ccd5e04d4697e05f1de3eebe35d2c75c78bb4ac6c9f393f1120d449fdb3d9808ceb1a1aaf8b2890b6fa839678634ba6007ff348c07b0e1da07b72a6b4ab2213d45b5da4a203064962622424142df8868b587b6aa04688888f11511d087b244d889e544856566dc762cc8182d07ef74ec4d08ef00f4e24576e2dc4b733bf005b1077586637c1b738a47918ee76fdaf8398faee9cb1b492128e59392662b6d5cd85fe890911074121b83bf593c5c7697cc1cea93d1fdd8f11262973cc98ad5a153e39bb966e42c52a8a776f0d09ea4241e606fbcf7a7d85c5ddc84074b737b2af4d4ceadf86ecb8177a25852864a4207e824fe84e824346a2ad1a59a723c306f45b9fe9e964abc49e877bdbbb9b3aa7f0e7ae2280f8d231d30a5ebcf85676014c90060e86026e403a42eea45a81b6e54dfc599f3276a35c6d95c53350cb95c557e49bbe221589c8ad1a7d710af645a14fd0d6cf61fb3e2c035ff0f8927d482efcf0c815fb0bfad5c21cc5f356a29f5e1b965e10deb68d86c7d03f89acc80cbc66b7a1bd0f7e8596bf96f04a3d4cbcf91677099a8dcfd3fc13e85822062512255049a6eb78507c4f45819c38ba65a849008ecf8c2e764ab5a8d5a3cbef006a9b7ff6f4ac9fc070f662e09b00af411357290775450a8a762696dc861902cf073ced6230f73b5582957bb752f3284826141cfc9f64cbb555a354a3f31e4f2375d3287697f6a8508b14820c048f78afa617412ca0141d943c4e397c31f389b65d8866a7c1c1a2c8b8653bd4c0a475d4885f5a607b9f6c8177580910d44ba7adbf233c7945b939ddd1fe32a8637fdc8500b9c21bcecbe0090c1cddbdf196ec21a916ce1d2edb93db69342dd19eecebefa9bde678a574828a4529f6e2e10fe10a8c2feb06a068c059ef2e4dc253d6020003a2bce6aaea8d8a7ca3373b1996fed87ec0dd71d4ae3c80d62d5e760c8c46241da8b0b8c5019bcee8f4de66e2a9412599e5d1aed307e284d40218655736ac6e07b9505075f4bbede4d85480b552445e516e77906feb8cdc31bedb1ff56490007e8ad5e840ddb8ffe79513c4e07965ef1de3aa0b85a875c306776b80a996e4169ce2a4e72fc50685ef9c4aab8fc11815f9cb458ae84672606956c8a0eb4f0d64089f7e6da3814c105e8e42f425455bbd9727aca74b5b2649498ec23ea60ca04bce2da57c61944b8d24849b4d021a939f9bf5156205b8209bcdaa945989ad2226c9aa0e7c3fbfd4761d3c4e7c9e974351e0e65dfc872b76e0da7f7ce5974b91a7ffda1c34a5e2ef73a64cb40305b491a7d56b974894cd00174319bda4bc249d3489cea1a43136997abcd97d5f7e9f099e431a9978ceb01d86a4ab01a45a395be083a58c3fcfa1ce600babd257ff03feb91a7e61020d85633174946f54dae29ef15767e5713aedbb50c855972331fb99a225dec47cd3c92e254f3d26bffdaaef1e382e726997a41eb088bf5d1f5c98974eb21cd9a983cf85877c428ce5bc2f122b7d12d2cacfe2c0f886f0334ec9ee1e04a0f5f1af64ded6ceb5ca4595f75d8d81c1a4243c0c07107bfc9e32c55ce520262ef6a43d7309f4c6a1a6909fdc7aba49b6dd21b586134c6cd9f726c64d03638fbf3051c03dd2889cdb49111f11147bcbb14b46d99be3bcfe38d38041213ee940cb2c5361fdefc0b161e8f52772d2399251a787561484d61c2420d7af4ba846465b47dbd07fd511f2bedabb1c4c5a8ea35c39934efd413a52b09b9df2b44b43e8106ebc3ca88ffbad9e497e362e0104026bd7550bfc9b0fdfe4bbdf78fbc9bb0dc224e9ba1f776e817e26cba3af782fa75ad687898e6f88171a1da409594ed0790409cd45717a28f2c29124a445f906af08126d5f9e3fad7a5fd0d33237f08d6399e4b332a64cbf02a7520038b359ee8c8f76de427d1dcebe63c98f361f6d3cab757bafa9e471da26f3582eec5c310bcd18c3edc402899fe462fc521060e480b4050c680a0bf883a5b3a2a812155a777c1f2d9df54189f2d71b2e4d36547cc202f35de29234b23d067cfb12265dd18ab77e70a8b506396ce5460d35f7321661c59767098d1e451093b6c87a515c7dcf1fe069b41b80544b2f2efd4749a38fac7f89aa361a6a643204c22d71253e45f333b22ca3521f87f3a1ea425c73eacfa8e96df32ff9d8fca242f992608b9d890e44cc63d92af0a8e22b6afb864a42b91672b1e45f5649abf62cb22bc1fe42b52f542e80498ce73fda34aea4e913b844b2211d69147ad4f171221ebf35ae14c6f1e4db7f55fe2051ad87684e8542344d0c145b53f3a20bab330deb8a798ce0fe7b64d9e7d5375e033252d640677b74f38fbdd9f26d718398011c26efd20e4f831ffdd6e7c727ecdcf10aa5f6f161f0235f286210dd02c42848a8a160b44483e1fe93b72789eea9452e29a4bfc06f1b7df7a9ae12be1bcf0b001e9bd6ad0261fc6018a2b92c9fa05aa1fa9aed8ec764cffd7e403229f1fe08e12668300c585e2f5b5dbad083c20e27526ae8527ea2542796ce50159e9131d049558adf69df462451fa80f559347eaf08d673c141bc23e3df698ca83458f002ab90f61607c294d15c62bc45235ca773fea6c8401e7649869d3fc2dabce21ce2dd687e1cdb1724bc471df872750105d4d155edee382177dfd4b419c53965658ee31bae33f234ba53f456fae2ed820193b25d2b8f83d2dbb1778f7e972d46b186f5f4f3faf4bd747ba287d03741fba1311250ed0a120a0edcf6b9d28a2a7d74abdfa86ca63fa4cbeeafeeaf30535a1092d6ac723096d3a1b08d640f66d17e60737c2181c39c2c90274b107d8bd6b0955eef630aedf70de6f2a07", 0x1000}], 0x7, &(0x7f0000001640)=[{0x40, 0x0, 0x4, "f9411ec3c1cabee377b8be0e00c44b57650d510224eab9d72b8743b2ddf65fa88cc83eedf053ef8caa4daaec58f62b"}, {0xb8, 0x29, 0x6, "267898f32cf9eee22ae29f2f3bfc340b3b4ad3b21da9e3d6fbb424140e61ce26f9db0d988c0d449655cbc3cba5f6c662cdc7a0084b7baca80c5d6cd95b501186c4e0db827daf84e79d5ba8614a117e2e02a1e57aa4e17247e34edd0d6a64b5a49272e07b07478ed8dd687fb15960fb82414868bcb9499dd1eacf2269cbfe0e4a216fd2253211012b836d0f0b1c23938884acf122337e6f1e863f1d8030b4292d26f0553a0c236f"}, {0x60, 0x101, 0x9, "e3f7192d64261e93f01201fd51502eafd6a58966b1642ecfc369106f0875cdc32a005893eb66c8ea4ffc771049e3d88e10b93d499816d08f9fa42c3a3e976358c1c0da264c29f2659a"}, {0x28, 0x112, 0x1ffc00, "60fb3489845c09ca28e2a12c23b79ddad2da5976e277"}, {0x10, 0x119, 0xffffffffffffffc6}, {0x58, 0x195, 0x4d3f, "2fb1a650b075ebcc3660f972499d6ea28b826aa5a5cdafd068e9bac39faadb989efa1494c4bd02cb9e8a0641ef713063a3382fb7ea6e0ab2cbe88c49753d75d153ad870c"}, {0x98, 0x1ff, 0x4, "43016b5a4cb97629dedc9b22dc16bd926a2c7e62efdee3024e3f2c7a0dc51cade993949ac93fe792b4fb67787ca4d56a6a38cc297a54c44d6aeab6af7581064f70b1387b0c3017759a75bd521ab6c9c3360ee676fa3ce90d3019e7a811bb203dcabaad037a34047b3ec9f79c3e6862b52f9cb859c0618feada9e88f4dc84f5d1daa3b48c"}], 0x280, 0x4}, 0x20000000) [ 693.340902] FAULT_INJECTION: forcing a failure. [ 693.340902] name failslab, interval 1, probability 0, space 0, times 0 [ 693.352226] CPU: 0 PID: 13203 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 693.359511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.368875] Call Trace: [ 693.371482] dump_stack+0x1b9/0x294 [ 693.375138] ? dump_stack_print_info.cold.2+0x52/0x52 [ 693.380370] should_fail.cold.4+0xa/0x1a [ 693.384463] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 693.389604] ? graph_lock+0x170/0x170 [ 693.393438] ? find_held_lock+0x36/0x1c0 [ 693.397532] ? __lock_is_held+0xb5/0x140 [ 693.401643] ? check_same_owner+0x320/0x320 [ 693.405985] ? kasan_check_write+0x14/0x20 [ 693.410238] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 693.415192] ? rcu_note_context_switch+0x710/0x710 [ 693.420154] __should_failslab+0x124/0x180 [ 693.424417] should_failslab+0x9/0x14 [ 693.428243] kmem_cache_alloc+0x2af/0x760 [ 693.432410] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 693.437368] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 693.442416] __kernfs_new_node+0xe7/0x580 [ 693.446593] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 693.451370] ? mutex_unlock+0xd/0x10 [ 693.455103] ? kernfs_activate+0x20e/0x2a0 [ 693.459363] ? kernfs_walk_and_get_ns+0x320/0x320 [ 693.464233] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 693.469791] ? kernfs_link_sibling+0x1d2/0x3b0 [ 693.474409] kernfs_new_node+0x80/0xf0 [ 693.478322] __kernfs_create_file+0x4d/0x330 [ 693.482763] sysfs_add_file_mode_ns+0x21a/0x560 2033/05/18 03:37:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x25}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x10000000000003, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) poll(&(0x7f00000000c0)=[{r0, 0x1020}], 0x1, 0x1) sendto$inet(r0, &(0x7f00000001c0)="c3b75890da5a5ac89488838719603350c933c2f079f497b3e3e81e65280255546cb0db591d0c55059fb30e0601727b95fbcbad3c8d883a668d54f70b4b7eb3f7411e40d734b2f66464c11e14ba034bede876ce89f117381a4d70352e", 0x5c, 0xc0, 0x0, 0x0) [ 693.487469] internal_create_group+0x282/0x970 [ 693.492088] sysfs_create_groups+0x9b/0x150 [ 693.496434] device_add+0x84d/0x16d0 [ 693.500176] ? device_private_init+0x230/0x230 [ 693.504777] ? kfree+0x1e9/0x260 [ 693.508169] ? kfree_const+0x5e/0x70 [ 693.511919] device_create_groups_vargs+0x1ff/0x270 [ 693.516960] device_create_vargs+0x46/0x60 [ 693.521223] bdi_register_va.part.10+0xbb/0x9b0 [ 693.525913] ? cgwb_kill+0x630/0x630 [ 693.529649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.535203] ? bdi_init+0x416/0x510 [ 693.538848] ? wb_init+0x9e0/0x9e0 [ 693.542408] ? bdi_alloc_node+0x67/0xe0 [ 693.546398] ? bdi_alloc_node+0x67/0xe0 [ 693.550390] ? rcu_read_lock_sched_held+0x108/0x120 [ 693.555424] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 693.560730] ? _raw_spin_unlock+0x22/0x30 [ 693.564910] bdi_register_va+0x68/0x80 [ 693.568822] super_setup_bdi_name+0x123/0x220 [ 693.573336] ? kill_block_super+0x100/0x100 [ 693.577675] ? kmem_cache_alloc_trace+0x616/0x780 [ 693.582530] ? match_wildcard+0x3c0/0x3c0 [ 693.586700] ? trace_hardirqs_on+0xd/0x10 [ 693.590877] fuse_fill_super+0xe6e/0x1e20 [ 693.595059] ? fuse_get_root_inode+0x190/0x190 [ 693.599665] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 693.604706] ? kasan_check_read+0x11/0x20 [ 693.608885] ? cap_capable+0x1f9/0x260 [ 693.612804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.618360] ? security_capable+0x99/0xc0 [ 693.622532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.628080] ? ns_capable_common+0x13f/0x170 [ 693.632505] ? get_anon_bdev+0x2f0/0x2f0 [ 693.636577] ? sget+0x113/0x150 [ 693.639875] ? fuse_get_root_inode+0x190/0x190 [ 693.644472] mount_nodev+0x6b/0x110 [ 693.648118] fuse_mount+0x2c/0x40 [ 693.651588] mount_fs+0xae/0x328 [ 693.654978] vfs_kern_mount.part.34+0xd4/0x4d0 [ 693.659574] ? may_umount+0xb0/0xb0 [ 693.663213] ? _raw_read_unlock+0x22/0x30 [ 693.667373] ? __get_fs_type+0x97/0xc0 [ 693.671280] do_mount+0x564/0x3070 [ 693.674843] ? copy_mount_string+0x40/0x40 [ 693.679089] ? rcu_pm_notify+0xc0/0xc0 [ 693.683003] ? copy_mount_options+0x5f/0x380 [ 693.687419] ? rcu_read_lock_sched_held+0x108/0x120 [ 693.692447] ? kmem_cache_alloc_trace+0x616/0x780 [ 693.697313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.702864] ? _copy_from_user+0xdf/0x150 [ 693.707034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.712581] ? copy_mount_options+0x285/0x380 [ 693.717096] ksys_mount+0x12d/0x140 [ 693.720748] __x64_sys_mount+0xbe/0x150 [ 693.724731] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 693.729774] do_syscall_64+0x1b1/0x800 [ 693.733671] ? finish_task_switch+0x1ca/0x840 [ 693.738182] ? syscall_return_slowpath+0x5c0/0x5c0 [ 693.743123] ? syscall_return_slowpath+0x30f/0x5c0 [ 693.748071] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 693.753453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 693.758331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.763530] RIP: 0033:0x455a09 [ 693.766723] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 693.774451] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 693.781727] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 693.789006] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 693.796282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 693.803556] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:57 executing program 1 (fault-call:2 fault-nth:54): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 2033/05/18 03:37:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1b}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x101002) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100)={0x8, 0x80000000, 0x3, 0x1}, 0x8) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f00000000c0)=0x760278fb) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1207b, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) bind$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88a8ffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:57 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:57 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2540700000000000000cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = semget(0x0, 0x7, 0x24) semctl$SETVAL(r2, 0x2, 0x10, &(0x7f00000000c0)=0x2) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x1, 0x4, 0x1, 0x80000001, "9e6f7459c0d51ffb5127407d8cf3d35cb6c1e5066e503ce0d282e695f8f673d3da59ad0d73cc3c64d1c524ee81bc59c10fc54b21fdf4bf311f3e6e15c2dcf9", 0x23}, 0x60) 2033/05/18 03:37:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) [ 693.979400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0xffffffffffffffff, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) socket$inet_sctp(0x2, 0x5, 0x84) 2033/05/18 03:37:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2e}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:57 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 2033/05/18 03:37:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = dup(r0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x80}, 0x4) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000040)=&(0x7f0000000100)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfff, 0x143100) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) [ 694.049472] FAT-fs (loop1): bogus number of reserved sectors [ 694.055404] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffff7f], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 694.141258] FAULT_INJECTION: forcing a failure. [ 694.141258] name failslab, interval 1, probability 0, space 0, times 0 [ 694.152610] CPU: 1 PID: 13247 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 694.159891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.169253] Call Trace: [ 694.171862] dump_stack+0x1b9/0x294 [ 694.175512] ? dump_stack_print_info.cold.2+0x52/0x52 [ 694.180741] should_fail.cold.4+0xa/0x1a [ 694.184831] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 694.189957] ? kasan_check_write+0x14/0x20 [ 694.194213] ? __mutex_lock+0x7d9/0x17f0 [ 694.198303] ? graph_lock+0x170/0x170 [ 694.202127] ? zap_class+0x720/0x720 [ 694.205866] ? find_held_lock+0x36/0x1c0 [ 694.209962] ? __lock_is_held+0xb5/0x140 [ 694.214071] ? check_same_owner+0x320/0x320 [ 694.218411] ? find_held_lock+0x36/0x1c0 [ 694.222489] ? rcu_note_context_switch+0x710/0x710 [ 694.227476] __should_failslab+0x124/0x180 [ 694.231745] should_failslab+0x9/0x14 [ 694.235576] kmem_cache_alloc+0x2af/0x760 2033/05/18 03:37:57 executing program 7: r0 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffb000/0x4000)=nil) r1 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f00000000c0)=0xe8) r4 = getegid() r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{0x8, r1, r2, r3, r4, 0xd8, 0x100000001}, 0x80, 0x2, 0x3b61, 0x3, r5, r6}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r7, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 694.239749] ? kasan_check_write+0x14/0x20 [ 694.244005] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 694.248948] ? lock_downgrade+0x8e0/0x8e0 [ 694.253117] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 694.258152] __kernfs_new_node+0xe7/0x580 [ 694.262319] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 694.267110] ? kasan_check_write+0x14/0x20 [ 694.269803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 694.271354] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 694.271382] ? __lock_is_held+0xb5/0x140 [ 694.271402] ? wait_for_completion+0x870/0x870 [ 694.295308] kernfs_new_node+0x80/0xf0 [ 694.299224] __kernfs_create_file+0x4d/0x330 [ 694.303666] sysfs_add_file_mode_ns+0x21a/0x560 [ 694.308367] internal_create_group+0x282/0x970 [ 694.312982] sysfs_create_groups+0x9b/0x150 [ 694.317330] device_add+0x84d/0x16d0 [ 694.321069] ? device_private_init+0x230/0x230 [ 694.325665] ? kfree+0x1e9/0x260 [ 694.329065] ? kfree_const+0x5e/0x70 [ 694.332805] device_create_groups_vargs+0x1ff/0x270 [ 694.337845] device_create_vargs+0x46/0x60 [ 694.342108] bdi_register_va.part.10+0xbb/0x9b0 [ 694.346797] ? cgwb_kill+0x630/0x630 [ 694.350534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.356081] ? bdi_init+0x416/0x510 [ 694.359718] ? wb_init+0x9e0/0x9e0 [ 694.363274] ? bdi_alloc_node+0x67/0xe0 [ 694.367256] ? bdi_alloc_node+0x67/0xe0 [ 694.371242] ? rcu_read_lock_sched_held+0x108/0x120 [ 694.376274] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 694.381569] ? _raw_spin_unlock+0x22/0x30 [ 694.385738] bdi_register_va+0x68/0x80 [ 694.389646] super_setup_bdi_name+0x123/0x220 [ 694.394151] ? kill_block_super+0x100/0x100 [ 694.398491] ? kmem_cache_alloc_trace+0x616/0x780 [ 694.403351] ? match_wildcard+0x3c0/0x3c0 [ 694.407515] ? trace_hardirqs_on+0xd/0x10 [ 694.411691] fuse_fill_super+0xe6e/0x1e20 [ 694.415869] ? fuse_get_root_inode+0x190/0x190 [ 694.420470] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 694.425510] ? kasan_check_read+0x11/0x20 [ 694.429677] ? cap_capable+0x1f9/0x260 [ 694.433591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.439146] ? security_capable+0x99/0xc0 [ 694.443322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.448874] ? ns_capable_common+0x13f/0x170 [ 694.453299] ? get_anon_bdev+0x2f0/0x2f0 [ 694.457370] ? sget+0x113/0x150 [ 694.460668] ? fuse_get_root_inode+0x190/0x190 [ 694.465266] mount_nodev+0x6b/0x110 [ 694.468911] fuse_mount+0x2c/0x40 [ 694.472382] mount_fs+0xae/0x328 [ 694.475772] vfs_kern_mount.part.34+0xd4/0x4d0 [ 694.480370] ? may_umount+0xb0/0xb0 [ 694.484010] ? _raw_read_unlock+0x22/0x30 [ 694.488173] ? __get_fs_type+0x97/0xc0 [ 694.492089] do_mount+0x564/0x3070 [ 694.495639] ? interrupt_entry+0xb1/0xf0 [ 694.499719] ? copy_mount_string+0x40/0x40 [ 694.503977] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 694.508766] ? retint_kernel+0x10/0x10 [ 694.512689] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 694.518240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.523787] ? copy_mount_options+0x285/0x380 [ 694.528302] ksys_mount+0x12d/0x140 [ 694.531945] __x64_sys_mount+0xbe/0x150 [ 694.535927] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 694.540963] do_syscall_64+0x1b1/0x800 [ 694.544863] ? finish_task_switch+0x1ca/0x840 [ 694.549372] ? syscall_return_slowpath+0x5c0/0x5c0 [ 694.554318] ? syscall_return_slowpath+0x30f/0x5c0 [ 694.559267] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 694.564657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 694.569526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.574727] RIP: 0033:0x455a09 [ 694.577922] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 694.585644] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 694.592920] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 694.600203] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 694.607481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 694.614756] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:37:58 executing program 1 (fault-call:2 fault-nth:55): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x10}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0) 2033/05/18 03:37:58 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000001480)={0x27, 0x0, 0xffffffffffeffffc, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:58 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x4, 0x0, 0x0, 0x3, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0xffffffffffffff81) personality(0x400000b) 2033/05/18 03:37:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe803], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:58 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/softnet_stat\x00') r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffff9c, 0x7, 0x1, 0xcc, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000340)=[@text32={0x20, &(0x7f00000002c0)="66baf80cb8d45ac981ef66bafc0ced0f0966baf80cb89ca8d683ef66bafc0cb008ee65233667f4c4e3515f949e0300000000b9800000c00f3235000800000f300f01c966baa10066b8ca6166efc4c1fe1196aa000000", 0x56}], 0x1, 0x63, &(0x7f00000003c0)=[@cstype3={0x5, 0x6}, @efer={0x2, 0xc01}], 0x2) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x75e, 0x2, 0x3ff, 0x4}, &(0x7f00000000c0)=0x10) ioctl$KVM_RUN(r5, 0xae80, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_S390_VCPU_FAULT(r6, 0x4008ae52, &(0x7f0000000040)=0xfffffffffffff000) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:37:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x500, 0x100) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x8}, {0x8, 0x1}, 0x10000, 0x1, 0x2}) 2033/05/18 03:37:58 executing program 3: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x8, 0x40200) getpeername$inet6(r0, &(0x7f0000000200), &(0x7f0000000240)=0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000280)) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8004, 0x4) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x46d, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000000c0)={0x8, 0x9, 0x8}) ioctl$TIOCSBRK(r1, 0x5427) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000001640)={0x0, 0x10, &(0x7f0000001600)=[@in={0x2, 0x4e21, @loopback=0x7f000001}]}, &(0x7f0000001680)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000016c0)={r3, @in6={{0xa, 0x4e22, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xc0}}}, 0x84) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 694.799692] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:58 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2d}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:58 executing program 5: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x40) r1 = accept4$ipx(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000400)=0x10, 0x0) sendfile(r0, r1, &(0x7f0000000240), 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000480)=""/252) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x3, 0x30}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={r2, 0x95, "5bd0fdb1c36730fd87b56b7d2279839ce70a5dc2fc58e043cacf3c831b0489a5509bfb928d765801f32f2b839efd54f9b9612fd3f069ea174527c704bfa6b41342ad0be75ae3aaa1e5f6c635a82b7f2416a02c3dc5f60771abde63609cd051169815a7cb4c400f996b8bc7a26280fc7bb01e5749b386eb994df0d71b7f6e2302ad8fbdfc0a0b3dc963f6228f1c506aa15a68dab29a"}, &(0x7f00000003c0)=0x9d) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x10003, 0x1) getsockopt$nfc_llcp(r3, 0x118, 0x0, &(0x7f0000000000)=""/107, 0x6b) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 694.846959] FAT-fs (loop1): bogus number of reserved sectors [ 694.852940] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:37:58 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r2 = gettid() perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xffff, 0x4, 0x0, 0x5, 0x0, 0x84, 0x0, 0x8, 0xfffffffffffffff9, 0x80000001, 0x9, 0x7, 0x0, 0x6, 0x8, 0x10000, 0x0, 0x3f, 0x3, 0x3, 0x5, 0x33, 0x80000001, 0x80, 0x8, 0x6, 0x7e98e747, 0x1000, 0x8, 0x3, 0x6, 0xffffffffffffff81, 0x1ff, 0xfffffffffffffffe, 0x2, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x81, 0x3}, 0x1, 0x17d, 0x10001, 0x5, 0x1000, 0xcc89, 0x6dad}, r2, 0x3, r0, 0x2) r3 = epoll_create(0x665) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x2) semget(0x2, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f00000001c0)={0x1, 0x2, 0x200, 0x0, 0x1}) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0x4}) [ 694.907311] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 694.953935] FAULT_INJECTION: forcing a failure. [ 694.953935] name failslab, interval 1, probability 0, space 0, times 0 [ 694.972116] CPU: 1 PID: 13289 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 694.979398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.988749] Call Trace: [ 694.991360] dump_stack+0x1b9/0x294 [ 694.994987] ? dump_stack_print_info.cold.2+0x52/0x52 [ 695.000191] should_fail.cold.4+0xa/0x1a [ 695.004249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 695.009372] ? graph_lock+0x170/0x170 [ 695.013181] ? find_held_lock+0x36/0x1c0 [ 695.017253] ? __lock_is_held+0xb5/0x140 [ 695.021322] ? check_same_owner+0x320/0x320 [ 695.025644] ? kasan_check_write+0x14/0x20 [ 695.029878] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 695.034803] ? rcu_note_context_switch+0x710/0x710 [ 695.039734] __should_failslab+0x124/0x180 [ 695.043967] should_failslab+0x9/0x14 [ 695.047763] kmem_cache_alloc+0x2af/0x760 [ 695.051909] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 695.056846] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 695.061863] __kernfs_new_node+0xe7/0x580 [ 695.066013] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 695.070770] ? mutex_unlock+0xd/0x10 [ 695.074478] ? kernfs_activate+0x20e/0x2a0 [ 695.078715] ? kernfs_walk_and_get_ns+0x320/0x320 [ 695.083552] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 695.089082] ? kernfs_link_sibling+0x1d2/0x3b0 [ 695.093668] kernfs_new_node+0x80/0xf0 [ 695.097559] __kernfs_create_file+0x4d/0x330 [ 695.101965] sysfs_add_file_mode_ns+0x21a/0x560 [ 695.106635] internal_create_group+0x282/0x970 [ 695.111225] sysfs_create_groups+0x9b/0x150 [ 695.115553] device_add+0x84d/0x16d0 [ 695.119267] ? device_private_init+0x230/0x230 [ 695.123839] ? kfree+0x1e9/0x260 [ 695.127203] ? kfree_const+0x5e/0x70 [ 695.130924] device_create_groups_vargs+0x1ff/0x270 [ 695.135938] device_create_vargs+0x46/0x60 [ 695.140176] bdi_register_va.part.10+0xbb/0x9b0 [ 695.144839] ? cgwb_kill+0x630/0x630 [ 695.148551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.154079] ? bdi_init+0x416/0x510 [ 695.157699] ? wb_init+0x9e0/0x9e0 [ 695.161233] ? bdi_alloc_node+0x67/0xe0 [ 695.165201] ? bdi_alloc_node+0x67/0xe0 [ 695.169174] ? rcu_read_lock_sched_held+0x108/0x120 [ 695.174185] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 695.179476] ? _raw_spin_unlock+0x22/0x30 [ 695.183623] bdi_register_va+0x68/0x80 [ 695.187508] super_setup_bdi_name+0x123/0x220 [ 695.191995] ? kill_block_super+0x100/0x100 [ 695.196315] ? kmem_cache_alloc_trace+0x616/0x780 [ 695.201161] ? match_wildcard+0x3c0/0x3c0 [ 695.205303] ? trace_hardirqs_on+0xd/0x10 [ 695.209452] fuse_fill_super+0xe6e/0x1e20 [ 695.213603] ? fuse_get_root_inode+0x190/0x190 [ 695.218182] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 695.223202] ? kasan_check_read+0x11/0x20 [ 695.227352] ? cap_capable+0x1f9/0x260 [ 695.231240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.236778] ? security_capable+0x99/0xc0 [ 695.240924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.246458] ? ns_capable_common+0x13f/0x170 [ 695.250864] ? get_anon_bdev+0x2f0/0x2f0 [ 695.254916] ? sget+0x113/0x150 [ 695.258193] ? fuse_get_root_inode+0x190/0x190 [ 695.262766] mount_nodev+0x6b/0x110 [ 695.266386] fuse_mount+0x2c/0x40 [ 695.269836] mount_fs+0xae/0x328 [ 695.273204] vfs_kern_mount.part.34+0xd4/0x4d0 [ 695.277781] ? may_umount+0xb0/0xb0 [ 695.281402] ? _raw_read_unlock+0x22/0x30 [ 695.285541] ? __get_fs_type+0x97/0xc0 [ 695.289433] do_mount+0x564/0x3070 [ 695.292976] ? copy_mount_string+0x40/0x40 [ 695.297208] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 695.302221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 695.306975] ? retint_kernel+0x10/0x10 [ 695.310868] ? copy_mount_options+0x1a1/0x380 [ 695.315365] ? copy_mount_options+0x1d4/0x380 [ 695.319854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.325384] ? copy_mount_options+0x285/0x380 [ 695.329881] ksys_mount+0x12d/0x140 [ 695.333504] __x64_sys_mount+0xbe/0x150 [ 695.337468] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 695.342495] do_syscall_64+0x1b1/0x800 [ 695.346391] ? finish_task_switch+0x1ca/0x840 [ 695.350888] ? syscall_return_slowpath+0x5c0/0x5c0 [ 695.355817] ? syscall_return_slowpath+0x30f/0x5c0 [ 695.360768] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 695.366145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 695.370987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.376179] RIP: 0033:0x455a09 [ 695.379358] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 695.387061] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 695.394322] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 2033/05/18 03:37:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6000000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:59 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:59 executing program 5: r0 = memfd_create(&(0x7f0000000000)='][eth0\x00', 0x2) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) [ 695.401583] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 695.408853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 695.416115] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 695.455417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:37:59 executing program 1 (fault-call:2 fault-nth:56): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:37:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xc}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:59 executing program 3: r0 = gettid() r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3cc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, r0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0xd71, 0x4, 0x4) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000280)={'bcsf0\x00', {0x2, 0x4e24, @multicast2=0xe0000002}}) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x72) getsockname(r3, &(0x7f00000002c0)=@nfc, &(0x7f0000000340)=0x80) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x800, 0xae0, 0x6, 0x3, 0x0, 0x929d, 0x20008, 0xc, 0x4, 0x12d, 0x8001, 0x4, 0x9, 0x6, 0x5, 0xba0, 0x1ff, 0x4, 0x8, 0x8, 0x4, 0x0, 0x5, 0x800, 0x2, 0xf9, 0x9, 0x7f, 0x3, 0x7f, 0x401, 0x7fff, 0x6de, 0x800, 0x5, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x3, 0x40}, 0x2008, 0x1000, 0x1f, 0x7, 0x80000001, 0x9}, r4, 0x5, r1, 0x1) 2033/05/18 03:37:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:59 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10041, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x3}, 0x10) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10000) 2033/05/18 03:37:59 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:59 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:37:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x3d}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 695.493943] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 695.667630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 695.694727] QAT: Invalid ioctl [ 695.698147] FAT-fs (loop1): bogus number of reserved sectors [ 695.704235] FAT-fs (loop1): Can't find a valid FAT filesystem [ 695.713625] QAT: Invalid ioctl 2033/05/18 03:37:59 executing program 3: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000001c0)={{0x9979, 0x0, 0x7fffffff, 0x40, "d90b132d7b18711987116faa9ec63a905919d6316f087e80caf5988743491e5259821ce18dce303b6ffca41b", 0xf825}, 0x0, 0x0, 0x37f, r2, 0x5, 0x3602, "17bbe9e8e8a2b7efd0ac743cd948b8f025031e718c06b3a3a95f78e7090e726fbd112f6cc87b16f51799e13299e04622b29f99ac5236aa95d68c775aa80c3581", &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x11, [], [0xf0, 0x6, 0x3, 0x3]}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 695.717126] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 695.763295] FAULT_INJECTION: forcing a failure. [ 695.763295] name failslab, interval 1, probability 0, space 0, times 0 [ 695.781602] CPU: 1 PID: 13325 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 695.788885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.798252] Call Trace: [ 695.800863] dump_stack+0x1b9/0x294 [ 695.804519] ? dump_stack_print_info.cold.2+0x52/0x52 2033/05/18 03:37:59 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0xf2, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:37:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x28000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:37:59 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10041, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x3}, 0x10) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10000) [ 695.809754] should_fail.cold.4+0xa/0x1a [ 695.813844] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 695.818985] ? graph_lock+0x170/0x170 [ 695.822821] ? find_held_lock+0x36/0x1c0 [ 695.826914] ? __lock_is_held+0xb5/0x140 [ 695.831021] ? check_same_owner+0x320/0x320 [ 695.835368] ? kasan_check_write+0x14/0x20 [ 695.839624] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 695.844579] ? rcu_note_context_switch+0x710/0x710 [ 695.849539] __should_failslab+0x124/0x180 [ 695.853809] should_failslab+0x9/0x14 [ 695.857633] kmem_cache_alloc+0x2af/0x760 [ 695.861809] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 695.866772] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 695.871819] __kernfs_new_node+0xe7/0x580 [ 695.875749] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 695.875986] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 695.887516] ? mutex_unlock+0xd/0x10 [ 695.891252] ? kernfs_activate+0x20e/0x2a0 [ 695.895515] ? kernfs_walk_and_get_ns+0x320/0x320 [ 695.900383] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 695.905938] ? kernfs_link_sibling+0x1d2/0x3b0 [ 695.910565] kernfs_new_node+0x80/0xf0 [ 695.914477] __kernfs_create_file+0x4d/0x330 [ 695.918907] sysfs_add_file_mode_ns+0x21a/0x560 [ 695.923604] internal_create_group+0x282/0x970 [ 695.928223] sysfs_create_groups+0x9b/0x150 [ 695.931572] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 695.932557] device_add+0x84d/0x16d0 [ 695.932586] ? device_private_init+0x230/0x230 [ 695.932610] ? kfree+0x1e9/0x260 [ 695.954578] ? kfree_const+0x5e/0x70 [ 695.958313] device_create_groups_vargs+0x1ff/0x270 2033/05/18 03:37:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1300}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:37:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 695.963359] device_create_vargs+0x46/0x60 [ 695.967624] bdi_register_va.part.10+0xbb/0x9b0 [ 695.972312] ? cgwb_kill+0x630/0x630 [ 695.976578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.982126] ? bdi_init+0x416/0x510 [ 695.985769] ? wb_init+0x9e0/0x9e0 [ 695.989332] ? bdi_alloc_node+0x67/0xe0 [ 695.993322] ? bdi_alloc_node+0x67/0xe0 [ 695.997313] ? rcu_read_lock_sched_held+0x108/0x120 [ 696.002346] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 696.007649] ? _raw_spin_unlock+0x22/0x30 [ 696.011823] bdi_register_va+0x68/0x80 [ 696.015734] super_setup_bdi_name+0x123/0x220 [ 696.020246] ? kill_block_super+0x100/0x100 [ 696.024601] ? kmem_cache_alloc_trace+0x616/0x780 [ 696.029456] ? match_wildcard+0x3c0/0x3c0 [ 696.033626] ? trace_hardirqs_on+0xd/0x10 [ 696.037803] fuse_fill_super+0xe6e/0x1e20 [ 696.041984] ? fuse_get_root_inode+0x190/0x190 [ 696.046592] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 696.051636] ? kasan_check_read+0x11/0x20 [ 696.055808] ? cap_capable+0x1f9/0x260 [ 696.059726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.065283] ? security_capable+0x99/0xc0 [ 696.069456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.075011] ? ns_capable_common+0x13f/0x170 [ 696.079447] ? get_anon_bdev+0x2f0/0x2f0 [ 696.083527] ? sget+0x113/0x150 [ 696.086830] ? fuse_get_root_inode+0x190/0x190 [ 696.091427] mount_nodev+0x6b/0x110 [ 696.095072] fuse_mount+0x2c/0x40 [ 696.098552] mount_fs+0xae/0x328 [ 696.101949] vfs_kern_mount.part.34+0xd4/0x4d0 [ 696.106557] ? may_umount+0xb0/0xb0 [ 696.110199] ? _raw_read_unlock+0x22/0x30 [ 696.114360] ? __get_fs_type+0x97/0xc0 [ 696.118282] do_mount+0x564/0x3070 [ 696.121850] ? copy_mount_string+0x40/0x40 [ 696.126100] ? rcu_pm_notify+0xc0/0xc0 [ 696.130013] ? copy_mount_options+0x5f/0x380 [ 696.134436] ? rcu_read_lock_sched_held+0x108/0x120 [ 696.139471] ? kmem_cache_alloc_trace+0x616/0x780 [ 696.144345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.149901] ? _copy_from_user+0xdf/0x150 [ 696.154083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.159666] ? copy_mount_options+0x285/0x380 [ 696.164182] ksys_mount+0x12d/0x140 [ 696.167831] __x64_sys_mount+0xbe/0x150 [ 696.171819] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 696.176863] do_syscall_64+0x1b1/0x800 [ 696.180773] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 696.185637] ? syscall_return_slowpath+0x5c0/0x5c0 [ 696.190580] ? syscall_return_slowpath+0x30f/0x5c0 [ 696.195529] ? retint_user+0x18/0x18 [ 696.199267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.204136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.209333] RIP: 0033:0x455a09 2033/05/18 03:37:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x9}, r1, 0x0, r0, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) uname(&(0x7f0000000040)=""/59) [ 696.212527] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 696.220252] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 696.227531] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 696.234814] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 696.242093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 696.249370] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:00 executing program 1 (fault-call:2 fault-nth:57): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:00 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0xfffffffffffffffc}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10041, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x3}, 0x10) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10000) 2033/05/18 03:38:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6800], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x35}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:38:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:00 executing program 7: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2000000a, 0x1) bind$nfc_llcp(r3, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x2d, "d740fcf2027a5457fd195d68b1d44f06eb26960c55a40d44854a926961b84d54b61c956b1c991cf425e60d2197"}, &(0x7f0000000200)=0x35) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)={r5, 0xe2, "6f2bc584d56b39c5c9ae95b110a022c8ce49f32d1f12b41af3f87aa7debc6fe46cc045f9601b4f87dd276492decaf2232ee4d4f0a63bead7b0bdfdb540782a82e8ef80f4d35362fb5265e1d657b31f881e441b5dc8c3824bc404870ac7c0093b8abb3d411adabedff18388c22f23691c3db8420103ab9a7dc1486b0c98fcf2f73b2389229c3c3b95165aa3b8a55cd8c39fd5822614961e83c74064c0c7dc0cf9e04dc91ae4182f43dc130d3fc540569500eaa2f16c542d3fe00795cebbd6c7c64058b383910a6e0070bbfe5ca9c22cd76ca91754f381b74949a4d3d56c01039dbc70"}, &(0x7f0000000340)=0xea) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) [ 696.352369] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x38}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xffffffffffffff26, 0x20000) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x1, 0x3]) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x82, 0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000001c0)={0x2cd, 0x0, 0x0, 0x1, 0xb6}) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) [ 696.393734] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 696.417639] FAT-fs (loop1): bogus number of reserved sectors [ 696.430428] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:38:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x1f4], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10041, 0x0) connect$nfc_raw(r1, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x3}, 0x10) 2033/05/18 03:38:00 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x29}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 696.524902] FAULT_INJECTION: forcing a failure. [ 696.524902] name failslab, interval 1, probability 0, space 0, times 0 [ 696.536309] CPU: 1 PID: 13368 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 696.536317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 696.549496] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 696.553899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.553908] Call Trace: 2033/05/18 03:38:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4305000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 696.553936] dump_stack+0x1b9/0x294 [ 696.553964] ? dump_stack_print_info.cold.2+0x52/0x52 [ 696.554000] should_fail.cold.4+0xa/0x1a [ 696.585593] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.590724] ? kasan_check_write+0x14/0x20 [ 696.594987] ? __mutex_lock+0x7d9/0x17f0 [ 696.599079] ? graph_lock+0x170/0x170 [ 696.602902] ? zap_class+0x720/0x720 [ 696.606650] ? find_held_lock+0x36/0x1c0 [ 696.610742] ? __lock_is_held+0xb5/0x140 [ 696.614860] ? check_same_owner+0x320/0x320 [ 696.619198] ? find_held_lock+0x36/0x1c0 [ 696.621254] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 696.623279] ? rcu_note_context_switch+0x710/0x710 [ 696.623310] __should_failslab+0x124/0x180 [ 696.623332] should_failslab+0x9/0x14 [ 696.623353] kmem_cache_alloc+0x2af/0x760 [ 696.650749] ? kasan_check_write+0x14/0x20 [ 696.655000] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 696.659946] ? lock_downgrade+0x8e0/0x8e0 [ 696.664117] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 696.669160] __kernfs_new_node+0xe7/0x580 [ 696.673333] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 696.678108] ? kasan_check_write+0x14/0x20 [ 696.682359] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 696.687309] ? __lock_is_held+0xb5/0x140 [ 696.691380] ? wait_for_completion+0x870/0x870 [ 696.696001] kernfs_new_node+0x80/0xf0 [ 696.699914] __kernfs_create_file+0x4d/0x330 [ 696.704347] sysfs_add_file_mode_ns+0x21a/0x560 [ 696.709054] internal_create_group+0x282/0x970 [ 696.713679] sysfs_create_groups+0x9b/0x150 [ 696.718021] device_add+0x84d/0x16d0 [ 696.721766] ? device_private_init+0x230/0x230 [ 696.726358] ? kfree+0x1e9/0x260 [ 696.729740] ? kfree_const+0x5e/0x70 [ 696.733474] device_create_groups_vargs+0x1ff/0x270 [ 696.738514] device_create_vargs+0x46/0x60 [ 696.742770] bdi_register_va.part.10+0xbb/0x9b0 [ 696.747455] ? cgwb_kill+0x630/0x630 [ 696.751184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.756733] ? bdi_init+0x416/0x510 [ 696.760372] ? wb_init+0x9e0/0x9e0 [ 696.763929] ? bdi_alloc_node+0x67/0xe0 [ 696.767913] ? bdi_alloc_node+0x67/0xe0 [ 696.771897] ? rcu_read_lock_sched_held+0x108/0x120 [ 696.776924] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 696.782223] ? _raw_spin_unlock+0x22/0x30 [ 696.786389] bdi_register_va+0x68/0x80 [ 696.790294] super_setup_bdi_name+0x123/0x220 [ 696.794799] ? kill_block_super+0x100/0x100 [ 696.799134] ? kmem_cache_alloc_trace+0x616/0x780 [ 696.803985] ? match_wildcard+0x3c0/0x3c0 [ 696.808148] ? trace_hardirqs_on+0xd/0x10 [ 696.812321] fuse_fill_super+0xe6e/0x1e20 [ 696.816498] ? fuse_get_root_inode+0x190/0x190 [ 696.821097] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 696.826131] ? kasan_check_read+0x11/0x20 [ 696.830298] ? cap_capable+0x1f9/0x260 [ 696.834208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.839753] ? security_capable+0x99/0xc0 [ 696.843924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.849474] ? ns_capable_common+0x13f/0x170 [ 696.853898] ? get_anon_bdev+0x2f0/0x2f0 [ 696.857976] ? sget+0x113/0x150 [ 696.861272] ? fuse_get_root_inode+0x190/0x190 [ 696.865866] mount_nodev+0x6b/0x110 [ 696.869506] fuse_mount+0x2c/0x40 [ 696.872972] mount_fs+0xae/0x328 [ 696.876363] vfs_kern_mount.part.34+0xd4/0x4d0 [ 696.880965] ? may_umount+0xb0/0xb0 [ 696.884609] ? _raw_read_unlock+0x22/0x30 [ 696.888766] ? __get_fs_type+0x97/0xc0 [ 696.892676] do_mount+0x564/0x3070 [ 696.896227] ? do_raw_spin_unlock+0x9e/0x2e0 [ 696.900663] ? copy_mount_string+0x40/0x40 [ 696.904917] ? rcu_pm_notify+0xc0/0xc0 [ 696.908822] ? copy_mount_options+0x5f/0x380 [ 696.913223] ? rcu_read_lock_sched_held+0x108/0x120 [ 696.918233] ? kmem_cache_alloc_trace+0x616/0x780 [ 696.923074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.928610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.934140] ? copy_mount_options+0x285/0x380 [ 696.938637] ksys_mount+0x12d/0x140 [ 696.942262] __x64_sys_mount+0xbe/0x150 [ 696.946227] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 696.951237] do_syscall_64+0x1b1/0x800 [ 696.955116] ? finish_task_switch+0x1ca/0x840 [ 696.959607] ? syscall_return_slowpath+0x5c0/0x5c0 [ 696.964529] ? syscall_return_slowpath+0x30f/0x5c0 [ 696.969468] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 696.974830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.979671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.984849] RIP: 0033:0x455a09 [ 696.988033] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 696.995738] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 697.002997] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 697.010265] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 697.017537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 697.024806] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:00 executing program 1 (fault-call:2 fault-nth:58): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x3c}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:00 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:00 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:38:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xce0e000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:00 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10041, 0x0) 2033/05/18 03:38:00 executing program 7: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x89e1, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000001c0)={0x5, 0x40, 0x7c9, 'queue1\x00', 0x7fffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x301}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 697.178647] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x90000, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x800, 0x10000) ioctl$TCGETS(r1, 0x5401, &(0x7f00000000c0)) 2033/05/18 03:38:01 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = getpid() getpgid(r1) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0), 0x0, 0x0) keyctl$revoke(0x3, r2) 2033/05/18 03:38:01 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x608], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x15}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 697.382912] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 697.459955] FAT-fs (loop1): bogus number of reserved sectors [ 697.465906] FAT-fs (loop1): Can't find a valid FAT filesystem [ 697.512615] FAULT_INJECTION: forcing a failure. [ 697.512615] name failslab, interval 1, probability 0, space 0, times 0 [ 697.523933] CPU: 0 PID: 13431 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 697.531209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.540565] Call Trace: [ 697.543172] dump_stack+0x1b9/0x294 [ 697.546816] ? dump_stack_print_info.cold.2+0x52/0x52 [ 697.552032] should_fail.cold.4+0xa/0x1a [ 697.556132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 697.561263] ? graph_lock+0x170/0x170 [ 697.565073] ? rcu_note_context_switch+0x710/0x710 [ 697.570019] ? find_held_lock+0x36/0x1c0 [ 697.574151] ? __lock_is_held+0xb5/0x140 [ 697.578252] ? check_same_owner+0x320/0x320 [ 697.582592] ? rcu_note_context_switch+0x710/0x710 [ 697.587541] __should_failslab+0x124/0x180 [ 697.591792] should_failslab+0x9/0x14 [ 697.595603] kmem_cache_alloc+0x2af/0x760 [ 697.599768] ? kasan_check_write+0x14/0x20 [ 697.604012] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 697.609050] __kernfs_new_node+0xe7/0x580 [ 697.613218] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 697.617992] ? kasan_check_write+0x14/0x20 [ 697.622241] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 697.627177] ? graph_lock+0x170/0x170 [ 697.630997] ? wait_for_completion+0x870/0x870 [ 697.635598] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 697.641153] kernfs_new_node+0x80/0xf0 [ 697.645059] __kernfs_create_file+0x4d/0x330 [ 697.649493] sysfs_add_file_mode_ns+0x21a/0x560 [ 697.654186] sysfs_add_file+0x4e/0x60 [ 697.658000] sysfs_merge_group+0xfa/0x230 [ 697.662169] dpm_sysfs_add+0x161/0x210 [ 697.666070] device_add+0xa11/0x16d0 [ 697.669809] ? device_private_init+0x230/0x230 [ 697.674401] ? kfree+0x1e9/0x260 [ 697.677785] ? kfree_const+0x5e/0x70 [ 697.681528] device_create_groups_vargs+0x1ff/0x270 [ 697.686564] device_create_vargs+0x46/0x60 [ 697.690820] bdi_register_va.part.10+0xbb/0x9b0 [ 697.695521] ? cgwb_kill+0x630/0x630 [ 697.699255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.704802] ? bdi_init+0x416/0x510 [ 697.708438] ? wb_init+0x9e0/0x9e0 [ 697.711996] ? bdi_alloc_node+0x67/0xe0 [ 697.715977] ? bdi_alloc_node+0x67/0xe0 [ 697.719963] ? rcu_read_lock_sched_held+0x108/0x120 [ 697.724987] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 697.730283] ? _raw_spin_unlock+0x22/0x30 [ 697.734449] bdi_register_va+0x68/0x80 [ 697.738356] super_setup_bdi_name+0x123/0x220 [ 697.742863] ? kill_block_super+0x100/0x100 [ 697.747199] ? kmem_cache_alloc_trace+0x616/0x780 [ 697.752054] ? match_wildcard+0x3c0/0x3c0 [ 697.756216] ? trace_hardirqs_on+0xd/0x10 [ 697.760389] fuse_fill_super+0xe6e/0x1e20 [ 697.764564] ? fuse_get_root_inode+0x190/0x190 [ 697.769161] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 697.774193] ? kasan_check_read+0x11/0x20 [ 697.778355] ? cap_capable+0x1f9/0x260 [ 697.782265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.787809] ? security_capable+0x99/0xc0 [ 697.791973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.797519] ? ns_capable_common+0x13f/0x170 [ 697.801941] ? get_anon_bdev+0x2f0/0x2f0 [ 697.806012] ? sget+0x113/0x150 [ 697.809308] ? fuse_get_root_inode+0x190/0x190 [ 697.813902] mount_nodev+0x6b/0x110 [ 697.817545] fuse_mount+0x2c/0x40 [ 697.821010] mount_fs+0xae/0x328 [ 697.824398] vfs_kern_mount.part.34+0xd4/0x4d0 [ 697.828995] ? may_umount+0xb0/0xb0 [ 697.832631] ? _raw_read_unlock+0x22/0x30 [ 697.836786] ? __get_fs_type+0x97/0xc0 [ 697.840694] do_mount+0x564/0x3070 [ 697.844258] ? copy_mount_string+0x40/0x40 [ 697.848504] ? rcu_pm_notify+0xc0/0xc0 [ 697.852419] ? copy_mount_options+0x5f/0x380 [ 697.856834] ? rcu_read_lock_sched_held+0x108/0x120 [ 697.862286] ? kmem_cache_alloc_trace+0x616/0x780 [ 697.867148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.872694] ? _copy_from_user+0xdf/0x150 [ 697.876862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.882408] ? copy_mount_options+0x285/0x380 [ 697.886922] ksys_mount+0x12d/0x140 [ 697.890564] __x64_sys_mount+0xbe/0x150 [ 697.894547] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 697.899579] do_syscall_64+0x1b1/0x800 [ 697.903489] ? syscall_return_slowpath+0x5c0/0x5c0 [ 697.908432] ? syscall_return_slowpath+0x30f/0x5c0 [ 697.913381] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 697.918764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.923629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.928822] RIP: 0033:0x455a09 [ 697.932014] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 697.939736] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 697.947008] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 697.954281] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 2033/05/18 03:38:01 executing program 1 (fault-call:2 fault-nth:59): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:01 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000000)=&(0x7f0000000100)) 2033/05/18 03:38:01 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:01 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2a}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:01 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x200000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 697.961554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 697.968829] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 698.048106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:01 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0xfffffffffffffe93, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6537}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xe}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:01 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) 2033/05/18 03:38:01 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 698.113199] FAT-fs (loop1): bogus number of reserved sectors [ 698.119353] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:38:01 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 698.198964] FAULT_INJECTION: forcing a failure. [ 698.198964] name failslab, interval 1, probability 0, space 0, times 0 [ 698.210334] CPU: 0 PID: 13450 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 698.217623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.226993] Call Trace: [ 698.229602] dump_stack+0x1b9/0x294 [ 698.233258] ? dump_stack_print_info.cold.2+0x52/0x52 [ 698.238501] should_fail.cold.4+0xa/0x1a [ 698.242598] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 698.247739] ? graph_lock+0x170/0x170 [ 698.251577] ? find_held_lock+0x36/0x1c0 [ 698.255666] ? __lock_is_held+0xb5/0x140 [ 698.259762] ? check_same_owner+0x320/0x320 [ 698.264100] ? kasan_check_write+0x14/0x20 [ 698.268356] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 698.273304] ? rcu_note_context_switch+0x710/0x710 [ 698.278261] __should_failslab+0x124/0x180 [ 698.282520] should_failslab+0x9/0x14 [ 698.286342] kmem_cache_alloc+0x2af/0x760 [ 698.290511] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 698.295468] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 698.300512] __kernfs_new_node+0xe7/0x580 [ 698.304679] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 698.309457] ? mutex_unlock+0xd/0x10 [ 698.313179] ? kernfs_activate+0x20e/0x2a0 [ 698.317437] ? kernfs_walk_and_get_ns+0x320/0x320 [ 698.322295] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 698.327845] ? kernfs_link_sibling+0x1d2/0x3b0 [ 698.332452] kernfs_new_node+0x80/0xf0 [ 698.336355] __kernfs_create_file+0x4d/0x330 [ 698.340782] sysfs_add_file_mode_ns+0x21a/0x560 [ 698.345480] internal_create_group+0x282/0x970 [ 698.350094] sysfs_create_groups+0x9b/0x150 [ 698.354438] device_add+0x84d/0x16d0 [ 698.358177] ? device_private_init+0x230/0x230 [ 698.362767] ? kfree+0x1e9/0x260 [ 698.366148] ? kfree_const+0x5e/0x70 [ 698.369883] device_create_groups_vargs+0x1ff/0x270 [ 698.374919] device_create_vargs+0x46/0x60 [ 698.379173] bdi_register_va.part.10+0xbb/0x9b0 [ 698.383856] ? cgwb_kill+0x630/0x630 [ 698.387587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.393129] ? bdi_init+0x416/0x510 [ 698.396764] ? wb_init+0x9e0/0x9e0 [ 698.400316] ? bdi_alloc_node+0x67/0xe0 [ 698.404301] ? bdi_alloc_node+0x67/0xe0 [ 698.408283] ? rcu_read_lock_sched_held+0x108/0x120 [ 698.413311] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 698.418615] bdi_register_va+0x68/0x80 [ 698.422518] super_setup_bdi_name+0x123/0x220 [ 698.427023] ? kill_block_super+0x100/0x100 [ 698.431357] ? kmem_cache_alloc_trace+0x616/0x780 [ 698.436212] ? match_wildcard+0x3c0/0x3c0 [ 698.440371] ? trace_hardirqs_on+0xd/0x10 [ 698.444545] fuse_fill_super+0xe6e/0x1e20 [ 698.448720] ? fuse_get_root_inode+0x190/0x190 [ 698.453318] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 698.458349] ? kasan_check_read+0x11/0x20 [ 698.462515] ? cap_capable+0x1f9/0x260 [ 698.466429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.471982] ? security_capable+0x99/0xc0 [ 698.476145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.481692] ? ns_capable_common+0x13f/0x170 [ 698.486115] ? get_anon_bdev+0x2f0/0x2f0 [ 698.490185] ? sget+0x113/0x150 [ 698.493482] ? fuse_get_root_inode+0x190/0x190 [ 698.498074] mount_nodev+0x6b/0x110 [ 698.501714] fuse_mount+0x2c/0x40 [ 698.505184] mount_fs+0xae/0x328 [ 698.508574] vfs_kern_mount.part.34+0xd4/0x4d0 [ 698.513170] ? may_umount+0xb0/0xb0 [ 698.516812] ? _raw_read_unlock+0x22/0x30 [ 698.520973] ? __get_fs_type+0x97/0xc0 [ 698.524886] do_mount+0x564/0x3070 [ 698.528442] ? do_raw_spin_unlock+0x9e/0x2e0 [ 698.532882] ? copy_mount_string+0x40/0x40 [ 698.537127] ? rcu_pm_notify+0xc0/0xc0 [ 698.541037] ? copy_mount_options+0x5f/0x380 [ 698.545458] ? rcu_read_lock_sched_held+0x108/0x120 [ 698.550491] ? kmem_cache_alloc_trace+0x616/0x780 [ 698.555353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.560915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.566462] ? copy_mount_options+0x285/0x380 [ 698.570976] ksys_mount+0x12d/0x140 [ 698.574622] __x64_sys_mount+0xbe/0x150 [ 698.578606] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 698.583636] do_syscall_64+0x1b1/0x800 [ 698.587530] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 698.592387] ? syscall_return_slowpath+0x5c0/0x5c0 [ 698.597340] ? syscall_return_slowpath+0x30f/0x5c0 [ 698.602285] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 698.607667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 698.612531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.617725] RIP: 0033:0x455a09 [ 698.620918] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 698.628639] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 698.635914] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 698.643188] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 2033/05/18 03:38:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x100000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) [ 698.650462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 698.657740] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 698.681881] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:02 executing program 1 (fault-call:2 fault-nth:60): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 2033/05/18 03:38:02 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x3b}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000100)=&(0x7f0000000200)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x10001, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0x7}, 0x8) 2033/05/18 03:38:02 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4cb20300], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 698.701206] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 698.786445] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 698.813769] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 698.820520] FAT-fs (loop1): bogus number of reserved sectors 2033/05/18 03:38:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x39}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:02 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af60, &(0x7f0000000180)=&(0x7f0000000100)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x1, 0x80000000, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000200)=r2, 0x4) 2033/05/18 03:38:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) open_by_handle_at(r0, &(0x7f0000000000)={0x48, 0x7, "0e609aba165c58f50c25fad8fc2a95461f8b603ae5cfb3d16ff55bb1ce0cd43c1056468e14ea23d698ea0166d980799ba83511b1bcfcacdfb406e9e3cbb29177"}, 0x100) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 698.836798] FAT-fs (loop1): Can't find a valid FAT filesystem [ 698.891014] FAULT_INJECTION: forcing a failure. [ 698.891014] name failslab, interval 1, probability 0, space 0, times 0 [ 698.902436] CPU: 0 PID: 13490 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 698.909723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.919088] Call Trace: [ 698.921698] dump_stack+0x1b9/0x294 [ 698.925356] ? dump_stack_print_info.cold.2+0x52/0x52 [ 698.930595] should_fail.cold.4+0xa/0x1a [ 698.934686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 698.939822] ? graph_lock+0x170/0x170 [ 698.943657] ? find_held_lock+0x36/0x1c0 [ 698.947751] ? __lock_is_held+0xb5/0x140 [ 698.951858] ? check_same_owner+0x320/0x320 [ 698.956197] ? kasan_check_write+0x14/0x20 [ 698.960459] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 698.963218] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 698.965410] ? rcu_note_context_switch+0x710/0x710 [ 698.965446] __should_failslab+0x124/0x180 [ 698.981371] should_failslab+0x9/0x14 [ 698.985192] kmem_cache_alloc+0x2af/0x760 [ 698.989357] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 698.994316] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 698.999359] __kernfs_new_node+0xe7/0x580 [ 699.003532] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 699.008306] ? mutex_unlock+0xd/0x10 [ 699.012043] ? kernfs_activate+0x20e/0x2a0 [ 699.016301] ? kernfs_walk_and_get_ns+0x320/0x320 [ 699.021167] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 699.026722] ? kernfs_link_sibling+0x1d2/0x3b0 [ 699.031337] kernfs_new_node+0x80/0xf0 [ 699.035249] __kernfs_create_file+0x4d/0x330 [ 699.039682] sysfs_add_file_mode_ns+0x21a/0x560 [ 699.044377] sysfs_add_file+0x4e/0x60 [ 699.048206] sysfs_merge_group+0xfa/0x230 [ 699.052378] dpm_sysfs_add+0x161/0x210 [ 699.056292] device_add+0xa11/0x16d0 [ 699.060036] ? device_private_init+0x230/0x230 [ 699.064633] ? kfree+0x1e9/0x260 [ 699.068023] ? kfree_const+0x5e/0x70 [ 699.071763] device_create_groups_vargs+0x1ff/0x270 [ 699.076811] device_create_vargs+0x46/0x60 [ 699.081068] bdi_register_va.part.10+0xbb/0x9b0 [ 699.085756] ? cgwb_kill+0x630/0x630 [ 699.089491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.095043] ? bdi_init+0x416/0x510 [ 699.098686] ? wb_init+0x9e0/0x9e0 [ 699.102250] ? bdi_alloc_node+0x67/0xe0 [ 699.106343] ? bdi_alloc_node+0x67/0xe0 [ 699.110339] ? rcu_read_lock_sched_held+0x108/0x120 [ 699.115374] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 699.120682] ? _raw_spin_unlock+0x22/0x30 [ 699.124852] bdi_register_va+0x68/0x80 [ 699.128757] super_setup_bdi_name+0x123/0x220 [ 699.133265] ? kill_block_super+0x100/0x100 [ 699.137599] ? kmem_cache_alloc_trace+0x616/0x780 [ 699.142455] ? match_wildcard+0x3c0/0x3c0 [ 699.146616] ? trace_hardirqs_on+0xd/0x10 [ 699.150788] fuse_fill_super+0xe6e/0x1e20 [ 699.154965] ? fuse_get_root_inode+0x190/0x190 [ 699.159565] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 699.164600] ? kasan_check_read+0x11/0x20 [ 699.168767] ? cap_capable+0x1f9/0x260 [ 699.172680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.178227] ? security_capable+0x99/0xc0 [ 699.182400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.187949] ? ns_capable_common+0x13f/0x170 [ 699.192372] ? get_anon_bdev+0x2f0/0x2f0 [ 699.196459] ? sget+0x113/0x150 [ 699.199759] ? fuse_get_root_inode+0x190/0x190 [ 699.204368] mount_nodev+0x6b/0x110 [ 699.208016] fuse_mount+0x2c/0x40 [ 699.211486] mount_fs+0xae/0x328 [ 699.214874] vfs_kern_mount.part.34+0xd4/0x4d0 [ 699.219470] ? may_umount+0xb0/0xb0 [ 699.223107] ? _raw_read_unlock+0x22/0x30 [ 699.227263] ? __get_fs_type+0x97/0xc0 [ 699.231170] do_mount+0x564/0x3070 [ 699.234720] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 699.239757] ? copy_mount_string+0x40/0x40 [ 699.244004] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 699.249033] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.253815] ? retint_kernel+0x10/0x10 [ 699.257728] ? copy_mount_options+0x1f0/0x380 [ 699.262234] ? copy_mount_options+0x1f6/0x380 [ 699.266743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.272298] ? copy_mount_options+0x285/0x380 [ 699.276816] ksys_mount+0x12d/0x140 [ 699.280458] __x64_sys_mount+0xbe/0x150 [ 699.284441] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 699.289475] do_syscall_64+0x1b1/0x800 [ 699.293376] ? finish_task_switch+0x1ca/0x840 [ 699.297887] ? syscall_return_slowpath+0x5c0/0x5c0 [ 699.302843] ? syscall_return_slowpath+0x30f/0x5c0 [ 699.307789] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 699.313188] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.318057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.323257] RIP: 0033:0x455a09 [ 699.326455] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 699.334178] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 2033/05/18 03:38:02 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:02 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:02 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) sendmsg$alg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="65a58ed16074ee3b4abf715ce52d52b96dab2061a67d2b23a724f81faac51df595c7d13b6ffcc8453622ece1db7a1a14a44789626e02e85d75b7ec4454f8d7491a6468f691cf22eb5c5a8f0e9c4ba0830f833d774702166d27cc8a44668292efba2f5e244b9190", 0x67}], 0x1, 0x0, 0x0, 0x4040041}, 0x4000801) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 699.341464] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 699.348737] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 699.356013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 699.363289] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:03 executing program 1 (fault-call:2 fault-nth:61): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:03 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:03 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000000)={0x100000000, 0x3800000000000000}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x81, 0x101, 0x3ff, 0x6, 0x0, 0x3ff, 0x10, 0x4, 0x7, 0xfffffffffffffffb, 0x3, 0x41, 0x6, 0x1, 0x3, 0x0, 0x8, 0x1400000, 0x4, 0x7, 0x7, 0x8, 0x0, 0x9, 0x7fffffff, 0xc2d, 0x0, 0x5, 0x3, 0x8d, 0x2, 0x6, 0x400, 0x684a, 0x7, 0x3, 0x0, 0x3, 0x7, @perf_config_ext={0x6, 0x7}, 0x40, 0x8, 0x4, 0x5, 0x2, 0x5, 0x1}, r2, 0xd, r0, 0x8) 2033/05/18 03:38:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xecd], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xb}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 699.511764] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x34}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x74], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 699.525444] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 699.560600] FAT-fs (loop1): bogus number of reserved sectors [ 699.573350] FAT-fs (loop1): Can't find a valid FAT filesystem [ 699.622494] FAULT_INJECTION: forcing a failure. [ 699.622494] name failslab, interval 1, probability 0, space 0, times 0 [ 699.633986] CPU: 0 PID: 13528 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 699.641277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.650640] Call Trace: [ 699.653256] dump_stack+0x1b9/0x294 [ 699.656914] ? dump_stack_print_info.cold.2+0x52/0x52 [ 699.662146] should_fail.cold.4+0xa/0x1a [ 699.666241] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 699.671398] ? graph_lock+0x170/0x170 [ 699.673166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 699.675225] ? find_held_lock+0x36/0x1c0 [ 699.675253] ? __lock_is_held+0xb5/0x140 [ 699.691165] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 699.693686] ? iser_cma_handler+0xc90/0x1a80 [ 699.693729] ? check_same_owner+0x320/0x320 [ 699.693749] ? kasan_check_write+0x14/0x20 [ 699.713838] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 699.718785] ? rcu_note_context_switch+0x710/0x710 [ 699.723745] __should_failslab+0x124/0x180 [ 699.728003] should_failslab+0x9/0x14 [ 699.731818] kmem_cache_alloc+0x2af/0x760 [ 699.735979] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 699.740931] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 699.745969] __kernfs_new_node+0xe7/0x580 [ 699.750135] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 699.754908] ? mutex_unlock+0xd/0x10 [ 699.758637] ? kernfs_activate+0x20e/0x2a0 [ 699.762891] ? kernfs_walk_and_get_ns+0x320/0x320 [ 699.767758] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 699.773334] ? kernfs_link_sibling+0x1d2/0x3b0 [ 699.777934] kernfs_new_node+0x80/0xf0 [ 699.781818] __kernfs_create_file+0x4d/0x330 [ 699.786226] sysfs_add_file_mode_ns+0x21a/0x560 [ 699.790896] sysfs_add_file+0x4e/0x60 [ 699.794692] sysfs_merge_group+0xfa/0x230 [ 699.798840] dpm_sysfs_add+0x161/0x210 [ 699.802724] device_add+0xa11/0x16d0 [ 699.806437] ? device_private_init+0x230/0x230 [ 699.811025] ? kfree+0x1e9/0x260 [ 699.814390] ? kfree_const+0x5e/0x70 [ 699.818101] device_create_groups_vargs+0x1ff/0x270 [ 699.823115] device_create_vargs+0x46/0x60 [ 699.827352] bdi_register_va.part.10+0xbb/0x9b0 [ 699.832019] ? cgwb_kill+0x630/0x630 [ 699.835730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.841256] ? bdi_init+0x416/0x510 [ 699.844875] ? wb_init+0x9e0/0x9e0 [ 699.848411] ? bdi_alloc_node+0x67/0xe0 [ 699.852374] ? bdi_alloc_node+0x67/0xe0 [ 699.856349] ? rcu_read_lock_sched_held+0x108/0x120 [ 699.861744] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 699.867039] ? _raw_spin_unlock+0x22/0x30 [ 699.871188] bdi_register_va+0x68/0x80 [ 699.875073] super_setup_bdi_name+0x123/0x220 [ 699.879570] ? kill_block_super+0x100/0x100 [ 699.883888] ? kmem_cache_alloc_trace+0x616/0x780 [ 699.888721] ? match_wildcard+0x3c0/0x3c0 [ 699.892865] ? trace_hardirqs_on+0xd/0x10 [ 699.897020] fuse_fill_super+0xe6e/0x1e20 [ 699.903005] ? fuse_get_root_inode+0x190/0x190 [ 699.907588] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 699.912599] ? kasan_check_read+0x11/0x20 [ 699.916743] ? cap_capable+0x1f9/0x260 [ 699.920641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.926168] ? security_capable+0x99/0xc0 [ 699.930311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.935845] ? ns_capable_common+0x13f/0x170 [ 699.940250] ? get_anon_bdev+0x2f0/0x2f0 [ 699.944308] ? sget+0x113/0x150 [ 699.947591] ? fuse_get_root_inode+0x190/0x190 [ 699.952177] mount_nodev+0x6b/0x110 [ 699.955799] fuse_mount+0x2c/0x40 [ 699.959249] mount_fs+0xae/0x328 [ 699.962614] vfs_kern_mount.part.34+0xd4/0x4d0 [ 699.967199] ? may_umount+0xb0/0xb0 [ 699.970817] ? _raw_read_unlock+0x22/0x30 [ 699.974955] ? __get_fs_type+0x97/0xc0 [ 699.978841] do_mount+0x564/0x3070 [ 699.982380] ? copy_mount_string+0x40/0x40 [ 699.986605] ? rcu_pm_notify+0xc0/0xc0 [ 699.990495] ? copy_mount_options+0x5f/0x380 [ 699.994895] ? rcu_read_lock_sched_held+0x108/0x120 [ 699.999903] ? kmem_cache_alloc_trace+0x616/0x780 [ 700.004740] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.010270] ? _copy_from_user+0xdf/0x150 [ 700.014421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.019950] ? copy_mount_options+0x285/0x380 [ 700.024454] ksys_mount+0x12d/0x140 [ 700.028076] __x64_sys_mount+0xbe/0x150 [ 700.032042] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 700.037055] do_syscall_64+0x1b1/0x800 [ 700.040933] ? finish_task_switch+0x1ca/0x840 [ 700.045424] ? syscall_return_slowpath+0x5c0/0x5c0 [ 700.050349] ? syscall_return_slowpath+0x30f/0x5c0 [ 700.055276] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 700.060639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 700.065480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.070658] RIP: 0033:0x455a09 2033/05/18 03:38:03 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:03 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000380)={0x27, 0x0, 0x40000000000, 0x2, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x200}, 0xfffffffffffffe93) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x200000) ioctl$TIOCEXCL(r1, 0x540c) ioctl$fiemap(r1, 0xc020660b, &(0x7f00000001c0)={0x0, 0x1, 0x5, 0x3, 0x7, [{0x2, 0x3000000000, 0x4, 0x0, 0x0, 0x1803}, {0x1, 0x0, 0x8, 0x0, 0x0, 0x3}, {0x3, 0x90c2, 0x1, 0x0, 0x0, 0x400}, {0x1, 0x6, 0x1f, 0x0, 0x0, 0x2084}, {0x4, 0x4, 0x6, 0x0, 0x0, 0x80}, {0x67c, 0x20000000000000, 0x9, 0x0, 0x0, 0x5}, {0x9, 0x20, 0x1, 0x0, 0x0, 0x1000}]}) [ 700.073835] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 700.081539] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 700.088798] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 700.096059] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 700.103321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 700.110579] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:04 executing program 1 (fault-call:2 fault-nth:62): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2c}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8864], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:04 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001340)=""/49, 0x31}], 0x2, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:04 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000001c0)=""/146, &(0x7f0000000280)=0x92) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000040)) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000340)={r1, 0x400}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000300)={0x1, 0x2, 0x9, 0x6, r4}) 2033/05/18 03:38:04 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) dup3(r0, r1, 0x0) [ 700.322468] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 700.410772] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:04 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:04 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:04 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) dup3(r0, r1, 0x0) 2033/05/18 03:38:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x26}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 700.444325] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 700.452959] QAT: Invalid ioctl [ 700.482722] QAT: Invalid ioctl 2033/05/18 03:38:04 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f00000000c0)={0x1}, 0x8, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x9, 0x40080) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0xf6, "5e45430ced0136e2690e2529ee30a37378900507dd09c185d3b9c2229b4095554fdc212ad806c7c88807fec7309eeb5bab218a8ff8dee39dc41fa7f3c1891fab98835f5578ea26d8d1ef4172a64266dc9f4b0ed1322c14a52ce19b173549873fce364490d3a68c0f0fb79851186d81c67d2aaaf5568e89926bbd19ff3331fe7595588e36466e8a667152ef60dfac9620a5bd7bd8a5c907a9081496eb07fb4b17c4093859a815ccf6a5552df9260ca10f7828c0dc06226ca78029095972e64da21e13cc46e729c80373a122450ce9872506d44a187a5b6aa3aa9d9a2780db6d74988db5c4333b158b19f93f76491173351e8367e489b6"}, &(0x7f00000002c0)=0xfe) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1, 0x4}, 0x90) 2033/05/18 03:38:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffffffffffff000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 700.595166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 700.647936] FAT-fs (loop1): bogus number of reserved sectors [ 700.653249] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 700.653855] FAT-fs (loop1): Can't find a valid FAT filesystem [ 700.716687] FAULT_INJECTION: forcing a failure. [ 700.716687] name failslab, interval 1, probability 0, space 0, times 0 [ 700.728059] CPU: 1 PID: 13570 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 700.735340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.744700] Call Trace: [ 700.747303] dump_stack+0x1b9/0x294 [ 700.750951] ? dump_stack_print_info.cold.2+0x52/0x52 [ 700.756173] should_fail.cold.4+0xa/0x1a [ 700.760254] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 700.765383] ? graph_lock+0x170/0x170 [ 700.769204] ? rcu_note_context_switch+0x710/0x710 [ 700.774158] ? find_held_lock+0x36/0x1c0 [ 700.778241] ? __lock_is_held+0xb5/0x140 [ 700.782336] ? check_same_owner+0x320/0x320 [ 700.786674] ? rcu_note_context_switch+0x710/0x710 [ 700.791623] __should_failslab+0x124/0x180 [ 700.795870] should_failslab+0x9/0x14 [ 700.799679] kmem_cache_alloc+0x2af/0x760 [ 700.803841] ? kasan_check_write+0x14/0x20 [ 700.808100] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 700.813136] __kernfs_new_node+0xe7/0x580 [ 700.817304] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 700.822076] ? kasan_check_write+0x14/0x20 [ 700.826324] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 700.831258] ? graph_lock+0x170/0x170 [ 700.835078] ? wait_for_completion+0x870/0x870 [ 700.839687] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 700.845246] kernfs_new_node+0x80/0xf0 [ 700.849149] __kernfs_create_file+0x4d/0x330 [ 700.853579] sysfs_add_file_mode_ns+0x21a/0x560 [ 700.858270] sysfs_add_file+0x4e/0x60 [ 700.862083] sysfs_merge_group+0xfa/0x230 [ 700.866252] dpm_sysfs_add+0x161/0x210 [ 700.870153] device_add+0xa11/0x16d0 [ 700.873891] ? device_private_init+0x230/0x230 [ 700.878479] ? kfree+0x1e9/0x260 [ 700.881863] ? kfree_const+0x5e/0x70 [ 700.885600] device_create_groups_vargs+0x1ff/0x270 [ 700.890634] device_create_vargs+0x46/0x60 [ 700.894890] bdi_register_va.part.10+0xbb/0x9b0 [ 700.899572] ? cgwb_kill+0x630/0x630 [ 700.903304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.908850] ? bdi_init+0x416/0x510 [ 700.912487] ? wb_init+0x9e0/0x9e0 [ 700.916041] ? bdi_alloc_node+0x67/0xe0 [ 700.920025] ? bdi_alloc_node+0x67/0xe0 [ 700.924013] ? rcu_read_lock_sched_held+0x108/0x120 [ 700.929039] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 700.934333] ? _raw_spin_unlock+0x22/0x30 [ 700.938499] bdi_register_va+0x68/0x80 [ 700.942402] super_setup_bdi_name+0x123/0x220 [ 700.946906] ? kill_block_super+0x100/0x100 [ 700.951240] ? kmem_cache_alloc_trace+0x616/0x780 [ 700.956091] ? match_wildcard+0x3c0/0x3c0 [ 700.960251] ? trace_hardirqs_on+0xd/0x10 [ 700.964426] fuse_fill_super+0xe6e/0x1e20 [ 700.968599] ? fuse_get_root_inode+0x190/0x190 [ 700.973198] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 700.978231] ? kasan_check_read+0x11/0x20 [ 700.982398] ? cap_capable+0x1f9/0x260 [ 700.986307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.991852] ? security_capable+0x99/0xc0 [ 700.996016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.001564] ? ns_capable_common+0x13f/0x170 [ 701.005986] ? get_anon_bdev+0x2f0/0x2f0 [ 701.010056] ? sget+0x113/0x150 [ 701.013350] ? fuse_get_root_inode+0x190/0x190 [ 701.017945] mount_nodev+0x6b/0x110 [ 701.021585] fuse_mount+0x2c/0x40 [ 701.025050] mount_fs+0xae/0x328 [ 701.028440] vfs_kern_mount.part.34+0xd4/0x4d0 [ 701.033039] ? may_umount+0xb0/0xb0 [ 701.036680] ? _raw_read_unlock+0x22/0x30 [ 701.040837] ? __get_fs_type+0x97/0xc0 [ 701.044745] do_mount+0x564/0x3070 [ 701.048302] ? do_raw_spin_unlock+0x9e/0x2e0 [ 701.052731] ? copy_mount_string+0x40/0x40 [ 701.056977] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 701.062006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 701.066788] ? retint_kernel+0x10/0x10 [ 701.070704] ? copy_mount_options+0x1f0/0x380 [ 701.075208] ? copy_mount_options+0x200/0x380 [ 701.079712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.085259] ? copy_mount_options+0x285/0x380 [ 701.089780] ksys_mount+0x12d/0x140 [ 701.093422] __x64_sys_mount+0xbe/0x150 [ 701.097403] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 701.102435] do_syscall_64+0x1b1/0x800 [ 701.106337] ? syscall_return_slowpath+0x5c0/0x5c0 [ 701.111281] ? syscall_return_slowpath+0x30f/0x5c0 [ 701.116227] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 701.121609] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 701.126473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.131670] RIP: 0033:0x455a09 [ 701.134867] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 701.142590] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 701.149864] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 701.157140] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 2033/05/18 03:38:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x41}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x4, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x800, 0x40) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001740)={0x0, @multicast2, @rand_addr}, &(0x7f0000001780)=0xc) clock_gettime(0x0, &(0x7f0000001800)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000001900)={&(0x7f00000017c0)={0x1d, r1}, 0x10, &(0x7f00000018c0)={&(0x7f0000001840)={0x5, 0x800, 0x7, {}, {r2, r3/1000+30000}, {0x4, 0x4, 0xfffffffffffffffa, 0x100000001}, 0x1, @can={{0x1, 0x0, 0x541, 0x4}, 0x1, 0x1, 0x0, 0x0, "287d6de416a58e74"}}, 0x48}, 0x1}, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r4, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:05 executing program 1 (fault-call:2 fault-nth:63): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:05 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6gretap0\x00', 0x2be}) dup3(r0, r1, 0x0) [ 701.164416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 701.171689] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 701.239896] FAT-fs (loop1): bogus number of reserved sectors [ 701.245819] FAT-fs (loop1): Can't find a valid FAT filesystem [ 701.269341] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 701.272008] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x14}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001240)=""/34, 0x22}, {&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x3, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 701.302553] FAULT_INJECTION: forcing a failure. [ 701.302553] name failslab, interval 1, probability 0, space 0, times 0 [ 701.313875] CPU: 1 PID: 13587 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 701.321158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.330523] Call Trace: [ 701.333132] dump_stack+0x1b9/0x294 [ 701.336791] ? dump_stack_print_info.cold.2+0x52/0x52 [ 701.342018] should_fail.cold.4+0xa/0x1a [ 701.346108] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:38:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x4}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 701.351246] ? graph_lock+0x170/0x170 [ 701.355080] ? find_held_lock+0x36/0x1c0 [ 701.359174] ? __lock_is_held+0xb5/0x140 [ 701.363250] ? ib_unmap_fmr+0x180/0x1a0 [ 701.367267] ? check_same_owner+0x320/0x320 [ 701.371612] ? kasan_check_write+0x14/0x20 [ 701.375866] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 701.380818] ? rcu_note_context_switch+0x710/0x710 [ 701.385782] __should_failslab+0x124/0x180 [ 701.390043] should_failslab+0x9/0x14 [ 701.393861] kmem_cache_alloc+0x2af/0x760 [ 701.398026] ? __mutex_unlock_slowpath+0x180/0x8a0 2033/05/18 03:38:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf0ffffffffffff], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 701.402983] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 701.408025] __kernfs_new_node+0xe7/0x580 [ 701.412197] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 701.416977] ? mutex_unlock+0xd/0x10 [ 701.420709] ? kernfs_activate+0x20e/0x2a0 [ 701.424979] ? kernfs_walk_and_get_ns+0x320/0x320 [ 701.429850] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 701.435412] ? kernfs_link_sibling+0x1d2/0x3b0 [ 701.440025] kernfs_new_node+0x80/0xf0 [ 701.443937] __kernfs_create_file+0x4d/0x330 [ 701.448374] sysfs_add_file_mode_ns+0x21a/0x560 2033/05/18 03:38:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:05 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) [ 701.453074] sysfs_add_file+0x4e/0x60 [ 701.456894] sysfs_merge_group+0xfa/0x230 [ 701.461068] dpm_sysfs_add+0x161/0x210 [ 701.464974] device_add+0xa11/0x16d0 [ 701.468717] ? device_private_init+0x230/0x230 [ 701.473318] ? kfree+0x1e9/0x260 [ 701.476709] ? kfree_const+0x5e/0x70 [ 701.480454] device_create_groups_vargs+0x1ff/0x270 [ 701.485496] device_create_vargs+0x46/0x60 [ 701.489762] bdi_register_va.part.10+0xbb/0x9b0 [ 701.494453] ? cgwb_kill+0x630/0x630 [ 701.498189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.503744] ? bdi_init+0x416/0x510 [ 701.507381] ? wb_init+0x9e0/0x9e0 [ 701.510939] ? bdi_alloc_node+0x67/0xe0 [ 701.514925] ? bdi_alloc_node+0x67/0xe0 [ 701.518920] ? rcu_read_lock_sched_held+0x108/0x120 [ 701.523959] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 701.527953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 701.529253] ? _raw_spin_unlock+0x22/0x30 [ 701.529283] bdi_register_va+0x68/0x80 [ 701.529306] super_setup_bdi_name+0x123/0x220 [ 701.529324] ? kill_block_super+0x100/0x100 [ 701.552587] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 701.556454] ? kmem_cache_alloc_trace+0x616/0x780 [ 701.556475] ? match_wildcard+0x3c0/0x3c0 [ 701.556496] ? trace_hardirqs_on+0xd/0x10 [ 701.556530] fuse_fill_super+0xe6e/0x1e20 [ 701.556562] ? fuse_get_root_inode+0x190/0x190 [ 701.585135] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 701.590174] ? kasan_check_read+0x11/0x20 [ 701.594338] ? cap_capable+0x1f9/0x260 [ 701.598250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.603802] ? security_capable+0x99/0xc0 [ 701.607975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.613529] ? ns_capable_common+0x13f/0x170 [ 701.617953] ? get_anon_bdev+0x2f0/0x2f0 [ 701.622039] ? sget+0x113/0x150 [ 701.625337] ? fuse_get_root_inode+0x190/0x190 [ 701.629939] mount_nodev+0x6b/0x110 [ 701.633586] fuse_mount+0x2c/0x40 [ 701.637056] mount_fs+0xae/0x328 [ 701.640451] vfs_kern_mount.part.34+0xd4/0x4d0 [ 701.645057] ? may_umount+0xb0/0xb0 [ 701.648703] ? _raw_read_unlock+0x22/0x30 [ 701.652870] ? __get_fs_type+0x97/0xc0 [ 701.656777] do_mount+0x564/0x3070 [ 701.660345] ? copy_mount_string+0x40/0x40 [ 701.664593] ? rcu_pm_notify+0xc0/0xc0 [ 701.668510] ? copy_mount_options+0x5f/0x380 [ 701.672933] ? rcu_read_lock_sched_held+0x108/0x120 [ 701.677968] ? kmem_cache_alloc_trace+0x616/0x780 [ 701.682835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.688390] ? _copy_from_user+0xdf/0x150 [ 701.692559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.698548] ? copy_mount_options+0x285/0x380 [ 701.703071] ksys_mount+0x12d/0x140 [ 701.706725] __x64_sys_mount+0xbe/0x150 [ 701.710723] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 701.715761] do_syscall_64+0x1b1/0x800 [ 701.719669] ? finish_task_switch+0x1ca/0x840 [ 701.724184] ? syscall_return_slowpath+0x5c0/0x5c0 [ 701.729136] ? syscall_return_slowpath+0x30f/0x5c0 [ 701.734094] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 701.739481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 701.744347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.749545] RIP: 0033:0x455a09 2033/05/18 03:38:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x1, 0x5, 0x9, 0x1, "d9654e6cd10f7df71e53978cfb25a3db580892ac33073be49858da70566591d6a4d1e1bc28491b64454afa8f6a5aaae41f9b88f0d689937b243bf6eb28f7ee", 0xe}, 0x60) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x6, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) [ 701.752740] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 701.760465] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 701.767748] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 701.775031] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 701.782314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 701.789596] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:05 executing program 1 (fault-call:2 fault-nth:64): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/171, 0xab}, {&(0x7f0000001340)=""/49, 0x31}], 0x2, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) 2033/05/18 03:38:05 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, 0xffffffffffffffff, 0x0) 2033/05/18 03:38:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x700000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:05 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x0) 2033/05/18 03:38:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xff04}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 701.880875] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:05 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x111) ioctl$TCGETS(r1, 0x5401, &(0x7f00000000c0)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:05 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(0xffffffffffffffff, r0, 0x0) [ 701.927593] FAT-fs (loop1): bogus number of reserved sectors [ 701.933576] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:38:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/49, 0x31}], 0x1, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 701.986729] FAULT_INJECTION: forcing a failure. [ 701.986729] name failslab, interval 1, probability 0, space 0, times 0 [ 701.998116] CPU: 1 PID: 13639 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 702.005399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.014761] Call Trace: [ 702.017376] dump_stack+0x1b9/0x294 [ 702.021033] ? dump_stack_print_info.cold.2+0x52/0x52 [ 702.026268] should_fail.cold.4+0xa/0x1a [ 702.030360] ? fault_create_debugfs_attr+0x1f0/0x1f0 2033/05/18 03:38:05 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200), &(0x7f00000001c0)=0x1c4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14, 0x80000) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x2, "262a0600000000000000d6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55b5419e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x43050000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 702.035496] ? graph_lock+0x170/0x170 [ 702.039314] ? lock_downgrade+0x8e0/0x8e0 [ 702.043482] ? kasan_check_write+0x14/0x20 [ 702.047752] ? find_held_lock+0x36/0x1c0 [ 702.051844] ? __lock_is_held+0xb5/0x140 [ 702.055955] ? check_same_owner+0x320/0x320 [ 702.060301] ? rcu_note_context_switch+0x710/0x710 [ 702.065257] __should_failslab+0x124/0x180 [ 702.069517] should_failslab+0x9/0x14 [ 702.073340] kmem_cache_alloc_trace+0x2cb/0x780 [ 702.078048] ? device_create_file+0x1e0/0x1e0 [ 702.082567] kobject_uevent_env+0x20f/0xea0 [ 702.086909] ? device_pm_add+0x221/0x340 [ 702.091008] kobject_uevent+0x1f/0x30 [ 702.094831] device_add+0xb01/0x16d0 [ 702.098578] ? device_private_init+0x230/0x230 [ 702.103174] ? kfree+0x1e9/0x260 [ 702.106570] ? kfree_const+0x5e/0x70 [ 702.110312] device_create_groups_vargs+0x1ff/0x270 [ 702.115357] device_create_vargs+0x46/0x60 [ 702.119623] bdi_register_va.part.10+0xbb/0x9b0 [ 702.121066] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/33, 0x21, 0x101}, 0x40) [ 702.124308] ? cgwb_kill+0x630/0x630 [ 702.124336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.124351] ? bdi_init+0x416/0x510 [ 702.124368] ? wb_init+0x9e0/0x9e0 [ 702.151070] ? bdi_alloc_node+0x67/0xe0 [ 702.155063] ? bdi_alloc_node+0x67/0xe0 [ 702.159054] ? rcu_read_lock_sched_held+0x108/0x120 [ 702.164090] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 702.169392] ? _raw_spin_unlock+0x22/0x30 [ 702.173568] bdi_register_va+0x68/0x80 [ 702.177477] super_setup_bdi_name+0x123/0x220 [ 702.181991] ? kill_block_super+0x100/0x100 [ 702.186332] ? kmem_cache_alloc_trace+0x616/0x780 [ 702.191190] ? match_wildcard+0x3c0/0x3c0 [ 702.195353] ? trace_hardirqs_on+0xd/0x10 [ 702.199532] fuse_fill_super+0xe6e/0x1e20 [ 702.203711] ? fuse_get_root_inode+0x190/0x190 [ 702.208315] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 702.213355] ? kasan_check_read+0x11/0x20 [ 702.217526] ? cap_capable+0x1f9/0x260 [ 702.221439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.226990] ? security_capable+0x99/0xc0 [ 702.231162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.236720] ? ns_capable_common+0x13f/0x170 [ 702.241149] ? get_anon_bdev+0x2f0/0x2f0 [ 702.245226] ? sget+0x113/0x150 [ 702.248525] ? fuse_get_root_inode+0x190/0x190 [ 702.253121] mount_nodev+0x6b/0x110 [ 702.256770] fuse_mount+0x2c/0x40 [ 702.260249] mount_fs+0xae/0x328 [ 702.263643] vfs_kern_mount.part.34+0xd4/0x4d0 [ 702.268252] ? may_umount+0xb0/0xb0 [ 702.271900] ? _raw_read_unlock+0x22/0x30 [ 702.276067] ? __get_fs_type+0x97/0xc0 [ 702.279980] do_mount+0x564/0x3070 [ 702.283546] ? copy_mount_string+0x40/0x40 [ 702.287796] ? rcu_pm_notify+0xc0/0xc0 [ 702.291714] ? copy_mount_options+0x5f/0x380 [ 702.296134] ? rcu_read_lock_sched_held+0x108/0x120 [ 702.301164] ? kmem_cache_alloc_trace+0x616/0x780 [ 702.306040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.311589] ? copy_mount_options+0x285/0x380 [ 702.316107] ksys_mount+0x12d/0x140 [ 702.319752] __x64_sys_mount+0xbe/0x150 [ 702.323740] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 702.328772] do_syscall_64+0x1b1/0x800 [ 702.332673] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 702.337533] ? syscall_return_slowpath+0x5c0/0x5c0 [ 702.342477] ? syscall_return_slowpath+0x30f/0x5c0 [ 702.347425] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 702.352810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 702.357684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.362879] RIP: 0033:0x455a09 [ 702.366074] RSP: 002b:00007fd45fe5b808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 702.373797] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 702.381076] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 702.388351] RBP: 0000000000000000 R08: 00007fd45fe5b820 R09: 0000000000000000 [ 702.395628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 702.402911] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:06 executing program 1 (fault-call:2 fault-nth:65): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:06 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x0) 2033/05/18 03:38:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:06 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000001c0)={@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, {&(0x7f0000000000)=""/32, 0x20}, &(0x7f0000000040), 0x1c}, 0xa0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x28) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000002c0)=r2, 0x4) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x89060000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xd}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) [ 702.674305] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 [ 702.744622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x2f}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:06 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x5, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x29}, 0x60) 2033/05/18 03:38:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380), 0x0, &(0x7f00000013c0)=""/33, 0x21}, 0x0) 2033/05/18 03:38:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 702.831169] device bridge_slave_1 left promiscuous mode [ 702.836783] bridge0: port 2(bridge_slave_1) entered disabled state 2033/05/18 03:38:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x11], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) [ 702.898585] device bridge_slave_0 left promiscuous mode [ 702.904190] bridge0: port 1(bridge_slave_0) entered disabled state 2033/05/18 03:38:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xffffff80}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) [ 703.065641] team0 (unregistering): Port device team_slave_1 removed [ 703.098274] team0 (unregistering): Port device team_slave_0 removed [ 703.121823] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 703.146956] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 703.212385] bond0 (unregistering): Released all slaves [ 703.249068] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 703.590663] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 [ 704.340869] IPVS: ftp: loaded support on port[0] = 21 [ 705.201689] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.208120] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.215418] device bridge_slave_0 entered promiscuous mode [ 705.252104] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.258527] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.265815] device bridge_slave_1 entered promiscuous mode [ 705.301521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 705.336555] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 705.441841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 705.479687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 705.643126] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 705.650973] team0: Port device team_slave_0 added [ 705.686221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 705.694477] team0: Port device team_slave_1 added [ 705.728226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 705.766709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 705.804646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 705.842876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 706.199282] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.205706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.212371] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.218740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.227317] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 707.104331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 707.508912] 8021q: adding VLAN 0 to HW filter on device bond0 [ 707.636621] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 707.759774] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 707.766063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 707.780186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.901509] 8021q: adding VLAN 0 to HW filter on device team0 [ 708.677725] FAT-fs (loop1): bogus number of reserved sectors [ 708.683673] FAT-fs (loop1): Can't find a valid FAT filesystem [ 708.754984] FAULT_INJECTION: forcing a failure. [ 708.754984] name failslab, interval 1, probability 0, space 0, times 0 [ 708.766323] CPU: 1 PID: 13952 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 708.773611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.782968] Call Trace: [ 708.785569] dump_stack+0x1b9/0x294 [ 708.789212] ? dump_stack_print_info.cold.2+0x52/0x52 [ 708.794436] should_fail.cold.4+0xa/0x1a [ 708.798513] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 708.803639] ? graph_lock+0x170/0x170 [ 708.807462] ? find_held_lock+0x36/0x1c0 [ 708.811549] ? __lock_is_held+0xb5/0x140 [ 708.815651] ? check_same_owner+0x320/0x320 [ 708.819981] ? kasan_check_write+0x14/0x20 [ 708.824228] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 708.829176] ? rcu_note_context_switch+0x710/0x710 [ 708.834123] __should_failslab+0x124/0x180 [ 708.838372] should_failslab+0x9/0x14 [ 708.842181] kmem_cache_alloc+0x2af/0x760 [ 708.846341] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 708.851288] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 708.856324] __kernfs_new_node+0xe7/0x580 [ 708.860488] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 708.865259] ? mutex_unlock+0xd/0x10 [ 708.868986] ? kernfs_activate+0x20e/0x2a0 [ 708.873248] ? kernfs_walk_and_get_ns+0x320/0x320 [ 708.878107] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 708.883652] ? kernfs_link_sibling+0x1d2/0x3b0 [ 708.888264] kernfs_new_node+0x80/0xf0 [ 708.892167] __kernfs_create_file+0x4d/0x330 [ 708.896594] sysfs_add_file_mode_ns+0x21a/0x560 [ 708.901287] sysfs_add_file+0x4e/0x60 [ 708.905103] sysfs_merge_group+0xfa/0x230 [ 708.909276] dpm_sysfs_add+0x161/0x210 [ 708.913176] device_add+0xa11/0x16d0 [ 708.916915] ? device_private_init+0x230/0x230 [ 708.921504] ? kfree+0x1e9/0x260 [ 708.924886] ? kfree_const+0x5e/0x70 [ 708.928621] device_create_groups_vargs+0x1ff/0x270 [ 708.933656] device_create_vargs+0x46/0x60 [ 708.937909] bdi_register_va.part.10+0xbb/0x9b0 [ 708.942589] ? cgwb_kill+0x630/0x630 [ 708.946317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.951864] ? bdi_init+0x416/0x510 [ 708.955498] ? wb_init+0x9e0/0x9e0 [ 708.959053] ? bdi_alloc_node+0x67/0xe0 [ 708.963036] ? bdi_alloc_node+0x67/0xe0 [ 708.967026] ? rcu_read_lock_sched_held+0x108/0x120 [ 708.972052] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 708.977351] ? _raw_spin_unlock+0x22/0x30 [ 708.981520] bdi_register_va+0x68/0x80 [ 708.985424] super_setup_bdi_name+0x123/0x220 [ 708.989928] ? kill_block_super+0x100/0x100 [ 708.994265] ? kmem_cache_alloc_trace+0x616/0x780 [ 708.999115] ? match_wildcard+0x3c0/0x3c0 [ 709.003278] ? trace_hardirqs_on+0xd/0x10 [ 709.007451] fuse_fill_super+0xe6e/0x1e20 [ 709.011625] ? fuse_get_root_inode+0x190/0x190 [ 709.016223] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 709.021262] ? kasan_check_read+0x11/0x20 [ 709.025429] ? cap_capable+0x1f9/0x260 [ 709.029339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.034883] ? security_capable+0x99/0xc0 [ 709.039050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.044599] ? ns_capable_common+0x13f/0x170 [ 709.049023] ? get_anon_bdev+0x2f0/0x2f0 [ 709.053093] ? sget+0x113/0x150 [ 709.056386] ? fuse_get_root_inode+0x190/0x190 [ 709.060983] mount_nodev+0x6b/0x110 [ 709.064625] fuse_mount+0x2c/0x40 [ 709.068091] mount_fs+0xae/0x328 [ 709.071480] vfs_kern_mount.part.34+0xd4/0x4d0 [ 709.076080] ? may_umount+0xb0/0xb0 [ 709.079717] ? _raw_read_unlock+0x22/0x30 [ 709.083875] ? __get_fs_type+0x97/0xc0 [ 709.087785] do_mount+0x564/0x3070 [ 709.091346] ? copy_mount_string+0x40/0x40 [ 709.095588] ? rcu_pm_notify+0xc0/0xc0 [ 709.099502] ? copy_mount_options+0x5f/0x380 [ 709.103921] ? rcu_read_lock_sched_held+0x108/0x120 [ 709.108948] ? kmem_cache_alloc_trace+0x616/0x780 [ 709.113813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.119362] ? _copy_from_user+0xdf/0x150 [ 709.123530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.129077] ? copy_mount_options+0x285/0x380 [ 709.133589] ksys_mount+0x12d/0x140 [ 709.137238] __x64_sys_mount+0xbe/0x150 [ 709.141227] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 709.146261] do_syscall_64+0x1b1/0x800 [ 709.150174] ? finish_task_switch+0x1ca/0x840 [ 709.154686] ? syscall_return_slowpath+0x5c0/0x5c0 [ 709.159631] ? syscall_return_slowpath+0x30f/0x5c0 [ 709.164576] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 709.169958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 709.174823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.180018] RIP: 0033:0x455a09 [ 709.183220] RSP: 002b:00007f4ba4a5f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 709.190942] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 709.198223] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 709.205498] RBP: 0000000000000000 R08: 00007f4ba4a5f820 R09: 0000000000000000 [ 709.212775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 709.220050] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:13 executing program 1 (fault-call:2 fault-nth:66): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x4000002, 0x70, 0x3e3, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x31b, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x8}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x4, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:13 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:13 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x0) 2033/05/18 03:38:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x28], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 709.299482] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xece], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 709.349186] FAT-fs (loop1): bogus number of reserved sectors [ 709.355120] FAT-fs (loop1): Can't find a valid FAT filesystem [ 709.404913] FAULT_INJECTION: forcing a failure. [ 709.404913] name failslab, interval 1, probability 0, space 0, times 0 [ 709.416341] CPU: 1 PID: 13970 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 709.423632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.432999] Call Trace: [ 709.435616] dump_stack+0x1b9/0x294 [ 709.439274] ? dump_stack_print_info.cold.2+0x52/0x52 [ 709.439432] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 709.444500] should_fail.cold.4+0xa/0x1a [ 709.444529] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 709.444562] ? graph_lock+0x170/0x170 [ 709.444589] ? find_held_lock+0x36/0x1c0 [ 709.471900] ? __lock_is_held+0xb5/0x140 [ 709.476003] ? check_same_owner+0x320/0x320 [ 709.480341] ? kasan_check_write+0x14/0x20 [ 709.484593] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 709.489542] ? rcu_note_context_switch+0x710/0x710 [ 709.494497] __should_failslab+0x124/0x180 [ 709.498752] should_failslab+0x9/0x14 [ 709.502568] kmem_cache_alloc+0x2af/0x760 [ 709.506734] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 709.511689] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 709.516727] __kernfs_new_node+0xe7/0x580 [ 709.520898] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 709.525673] ? mutex_unlock+0xd/0x10 [ 709.529403] ? kernfs_activate+0x20e/0x2a0 [ 709.533661] ? kernfs_walk_and_get_ns+0x320/0x320 [ 709.538525] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 709.544083] ? kernfs_link_sibling+0x1d2/0x3b0 [ 709.548695] kernfs_new_node+0x80/0xf0 2033/05/18 03:38:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x28}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8864000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f00000001c0)=""/174, 0xae) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x7f, 0x800) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000680), &(0x7f00000006c0)=0x4) 2033/05/18 03:38:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 709.552606] __kernfs_create_file+0x4d/0x330 [ 709.557037] sysfs_add_file_mode_ns+0x21a/0x560 [ 709.561730] sysfs_add_file+0x4e/0x60 [ 709.565546] sysfs_merge_group+0xfa/0x230 [ 709.569713] dpm_sysfs_add+0x161/0x210 [ 709.573621] device_add+0xa11/0x16d0 [ 709.577358] ? device_private_init+0x230/0x230 [ 709.581954] ? kfree+0x1e9/0x260 [ 709.585355] ? kfree_const+0x5e/0x70 [ 709.589088] device_create_groups_vargs+0x1ff/0x270 [ 709.594246] device_create_vargs+0x46/0x60 [ 709.598506] bdi_register_va.part.10+0xbb/0x9b0 2033/05/18 03:38:13 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) [ 709.603202] ? cgwb_kill+0x630/0x630 [ 709.606937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.612486] ? bdi_init+0x416/0x510 [ 709.616129] ? wb_init+0x9e0/0x9e0 [ 709.619687] ? bdi_alloc_node+0x67/0xe0 [ 709.623675] ? bdi_alloc_node+0x67/0xe0 [ 709.627667] ? rcu_read_lock_sched_held+0x108/0x120 [ 709.632703] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 709.638005] ? _raw_spin_unlock+0x22/0x30 [ 709.642178] bdi_register_va+0x68/0x80 [ 709.644102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 709.646088] super_setup_bdi_name+0x123/0x220 [ 709.646109] ? kill_block_super+0x100/0x100 [ 709.646132] ? kmem_cache_alloc_trace+0x616/0x780 [ 709.646152] ? match_wildcard+0x3c0/0x3c0 [ 709.646171] ? trace_hardirqs_on+0xd/0x10 [ 709.646202] fuse_fill_super+0xe6e/0x1e20 [ 709.682574] ? fuse_get_root_inode+0x190/0x190 [ 709.687186] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 709.692227] ? kasan_check_read+0x11/0x20 [ 709.696825] ? cap_capable+0x1f9/0x260 [ 709.700747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.706298] ? security_capable+0x99/0xc0 [ 709.710468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.716020] ? ns_capable_common+0x13f/0x170 [ 709.720451] ? get_anon_bdev+0x2f0/0x2f0 [ 709.724526] ? sget+0x113/0x150 [ 709.727825] ? fuse_get_root_inode+0x190/0x190 [ 709.732423] mount_nodev+0x6b/0x110 [ 709.736074] fuse_mount+0x2c/0x40 [ 709.739551] mount_fs+0xae/0x328 [ 709.742938] vfs_kern_mount.part.34+0xd4/0x4d0 [ 709.747545] ? may_umount+0xb0/0xb0 [ 709.751193] ? _raw_read_unlock+0x22/0x30 [ 709.755358] ? __get_fs_type+0x97/0xc0 [ 709.759275] do_mount+0x564/0x3070 [ 709.762836] ? do_raw_spin_unlock+0x9e/0x2e0 [ 709.767268] ? copy_mount_string+0x40/0x40 [ 709.771518] ? rcu_pm_notify+0xc0/0xc0 [ 709.775442] ? copy_mount_options+0x5f/0x380 [ 709.779866] ? rcu_read_lock_sched_held+0x108/0x120 [ 709.784899] ? kmem_cache_alloc_trace+0x616/0x780 [ 709.789769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.795336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.800891] ? copy_mount_options+0x285/0x380 [ 709.805414] ksys_mount+0x12d/0x140 [ 709.809066] __x64_sys_mount+0xbe/0x150 [ 709.813055] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 709.818091] do_syscall_64+0x1b1/0x800 [ 709.821989] ? finish_task_switch+0x1ca/0x840 [ 709.826502] ? syscall_return_slowpath+0x5c0/0x5c0 [ 709.831445] ? syscall_return_slowpath+0x30f/0x5c0 [ 709.836402] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 709.841797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 709.846671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.851871] RIP: 0033:0x455a09 [ 709.855068] RSP: 002b:00007f4ba4a5f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 709.862798] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 709.870079] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 709.877361] RBP: 0000000000000000 R08: 00007f4ba4a5f820 R09: 0000000000000000 [ 709.884663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 709.892031] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:13 executing program 1 (fault-call:2 fault-nth:67): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:13 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400200, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x400, 'veth1_to_team\x00', 0x1}, 0x18) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:13 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x32}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:13 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:13 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x464100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x9, 0x200) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:14 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) [ 710.114124] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 [ 710.183827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 710.210876] FAT-fs (loop1): bogus number of reserved sectors [ 710.216837] FAT-fs (loop1): Can't find a valid FAT filesystem 2033/05/18 03:38:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0xffffffc2}], 0x1, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:14 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000240)=0x8, 0x4) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 710.267271] FAULT_INJECTION: forcing a failure. [ 710.267271] name failslab, interval 1, probability 0, space 0, times 0 [ 710.278661] CPU: 1 PID: 14000 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 710.285953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.295327] Call Trace: [ 710.297943] dump_stack+0x1b9/0x294 [ 710.301595] ? dump_stack_print_info.cold.2+0x52/0x52 [ 710.306825] should_fail.cold.4+0xa/0x1a [ 710.310917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 710.316057] ? graph_lock+0x170/0x170 [ 710.319888] ? lock_downgrade+0x8e0/0x8e0 [ 710.324065] ? kasan_check_write+0x14/0x20 [ 710.328330] ? find_held_lock+0x36/0x1c0 [ 710.332424] ? __lock_is_held+0xb5/0x140 [ 710.336538] ? check_same_owner+0x320/0x320 [ 710.340889] ? rcu_note_context_switch+0x710/0x710 [ 710.345850] __should_failslab+0x124/0x180 [ 710.350111] should_failslab+0x9/0x14 [ 710.353936] kmem_cache_alloc_trace+0x2cb/0x780 [ 710.358643] ? device_create_file+0x1e0/0x1e0 [ 710.363164] kobject_uevent_env+0x20f/0xea0 2033/05/18 03:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:14 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x25, &(0x7f0000000040)=ANY=[]}, 0x0) [ 710.367503] ? device_pm_add+0x221/0x340 [ 710.371604] kobject_uevent+0x1f/0x30 [ 710.375426] device_add+0xb01/0x16d0 [ 710.379177] ? device_private_init+0x230/0x230 [ 710.383776] ? kfree+0x1e9/0x260 [ 710.387173] ? kfree_const+0x5e/0x70 [ 710.390918] device_create_groups_vargs+0x1ff/0x270 [ 710.395961] device_create_vargs+0x46/0x60 [ 710.400219] bdi_register_va.part.10+0xbb/0x9b0 [ 710.404912] ? cgwb_kill+0x630/0x630 [ 710.408652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.414206] ? bdi_init+0x416/0x510 [ 710.417848] ? wb_init+0x9e0/0x9e0 [ 710.421409] ? bdi_alloc_node+0x67/0xe0 [ 710.425395] ? bdi_alloc_node+0x67/0xe0 [ 710.429387] ? rcu_read_lock_sched_held+0x108/0x120 [ 710.434422] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 710.439725] ? _raw_spin_unlock+0x22/0x30 [ 710.443900] bdi_register_va+0x68/0x80 [ 710.447808] super_setup_bdi_name+0x123/0x220 [ 710.452319] ? kill_block_super+0x100/0x100 [ 710.456660] ? kmem_cache_alloc_trace+0x616/0x780 [ 710.461519] ? match_wildcard+0x3c0/0x3c0 [ 710.465686] ? trace_hardirqs_on+0xd/0x10 [ 710.469869] fuse_fill_super+0xe6e/0x1e20 [ 710.474048] ? fuse_get_root_inode+0x190/0x190 [ 710.478658] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 710.483701] ? kasan_check_read+0x11/0x20 [ 710.487870] ? cap_capable+0x1f9/0x260 [ 710.491783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.497332] ? security_capable+0x99/0xc0 [ 710.501502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.507055] ? ns_capable_common+0x13f/0x170 [ 710.511488] ? get_anon_bdev+0x2f0/0x2f0 [ 710.515566] ? sget+0x113/0x150 [ 710.518871] ? fuse_get_root_inode+0x190/0x190 [ 710.523472] mount_nodev+0x6b/0x110 [ 710.527121] fuse_mount+0x2c/0x40 [ 710.530598] mount_fs+0xae/0x328 [ 710.533991] vfs_kern_mount.part.34+0xd4/0x4d0 [ 710.538591] ? may_umount+0xb0/0xb0 [ 710.542233] ? _raw_read_unlock+0x22/0x30 [ 710.546398] ? __get_fs_type+0x97/0xc0 [ 710.550314] do_mount+0x564/0x3070 [ 710.553874] ? do_raw_spin_unlock+0x9e/0x2e0 [ 710.558304] ? copy_mount_string+0x40/0x40 [ 710.562574] ? rcu_pm_notify+0xc0/0xc0 [ 710.566503] ? copy_mount_options+0x5f/0x380 [ 710.570929] ? rcu_read_lock_sched_held+0x108/0x120 [ 710.575965] ? kmem_cache_alloc_trace+0x616/0x780 [ 710.580834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.586403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.591963] ? copy_mount_options+0x285/0x380 [ 710.596492] ksys_mount+0x12d/0x140 [ 710.600142] __x64_sys_mount+0xbe/0x150 [ 710.604140] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 710.609180] do_syscall_64+0x1b1/0x800 [ 710.613084] ? finish_task_switch+0x1ca/0x840 [ 710.617598] ? syscall_return_slowpath+0x5c0/0x5c0 [ 710.622559] ? syscall_return_slowpath+0x30f/0x5c0 [ 710.627511] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 710.632900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 710.637766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.642966] RIP: 0033:0x455a09 [ 710.646160] RSP: 002b:00007f4ba4a5f808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 710.653888] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 710.661170] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 710.668449] RBP: 0000000000000000 R08: 00007f4ba4a5f820 R09: 0000000000000000 [ 710.675725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 710.683006] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:14 executing program 1 (fault-call:2 fault-nth:68): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:14 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:14 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:14 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(0xffffffffffffffff, r1, 0x0) 2033/05/18 03:38:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffca88], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x37, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:14 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:14 executing program 7 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) [ 710.803616] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 710.820598] FAULT_INJECTION: forcing a failure. [ 710.820598] name failslab, interval 1, probability 0, space 0, times 0 [ 710.832419] CPU: 0 PID: 14040 Comm: syz-executor5 Not tainted 4.17.0-rc5+ #54 [ 710.839704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.849067] Call Trace: [ 710.851675] dump_stack+0x1b9/0x294 [ 710.855322] ? dump_stack_print_info.cold.2+0x52/0x52 [ 710.860550] should_fail.cold.4+0xa/0x1a [ 710.864644] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 710.869776] ? graph_lock+0x170/0x170 [ 710.873591] ? lock_downgrade+0x8e0/0x8e0 [ 710.877759] ? refcount_sub_and_test+0x212/0x330 [ 710.882533] ? find_held_lock+0x36/0x1c0 [ 710.886625] ? __lock_is_held+0xb5/0x140 [ 710.890725] ? check_same_owner+0x320/0x320 [ 710.895066] ? rcu_note_context_switch+0x710/0x710 [ 710.900010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.905564] __should_failslab+0x124/0x180 [ 710.909814] should_failslab+0x9/0x14 [ 710.913630] __kmalloc_track_caller+0x2c4/0x760 [ 710.918317] ? nfc_get_device+0x83/0xaf [ 710.922306] ? nfc_alloc_send_skb+0x1b0/0x1b0 [ 710.926808] ? llcp_sock_bind+0x3f2/0x5e0 [ 710.930976] kmemdup+0x24/0x50 [ 710.934183] llcp_sock_bind+0x3f2/0x5e0 [ 710.938176] ? llcp_raw_sock_bind+0x460/0x460 [ 710.942681] ? __might_sleep+0x95/0x190 [ 710.946685] ? _copy_from_user+0xdf/0x150 [ 710.950853] ? security_socket_bind+0x94/0xc0 [ 710.955377] __sys_bind+0x331/0x440 [ 710.959023] ? __ia32_sys_socketpair+0xf0/0xf0 [ 710.963631] ? __sb_end_write+0xac/0xe0 [ 710.967647] ? __ia32_sys_read+0xb0/0xb0 [ 710.971724] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 710.976591] __x64_sys_bind+0x73/0xb0 [ 710.980411] do_syscall_64+0x1b1/0x800 [ 710.984318] ? syscall_return_slowpath+0x5c0/0x5c0 [ 710.989263] ? syscall_return_slowpath+0x30f/0x5c0 [ 710.994211] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 710.999601] ? trace_hardirqs_off_thunk+0x1a/0x1c 2033/05/18 03:38:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x14, &(0x7f0000000040)=ANY=[]}, 0x0) [ 711.004464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.009663] RIP: 0033:0x455a09 [ 711.012856] RSP: 002b:00007f30fa08bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 711.020579] RAX: ffffffffffffffda RBX: 00007f30fa08c6d4 RCX: 0000000000455a09 [ 711.027855] RDX: 0000000000000060 RSI: 0000000020000100 RDI: 0000000000000015 [ 711.035130] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 711.042403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 711.049678] R13: 000000000000002b R14: 00000000006f44a8 R15: 0000000000000000 2033/05/18 03:38:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:14 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, 0xffffffffffffffff, 0x0) 2033/05/18 03:38:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800e0000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:14 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x32, &(0x7f0000000040)=ANY=[]}, 0x0) [ 711.064805] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 711.185844] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:15 executing program 3 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) [ 711.208748] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 711.323422] device bridge_slave_1 left promiscuous mode [ 711.335869] bridge0: port 2(bridge_slave_1) entered disabled state 2033/05/18 03:38:15 executing program 1 (fault-call:2 fault-nth:69): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:15 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:15 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4c00], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:15 executing program 5 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0xffffffc2, &(0x7f0000000040)=ANY=[]}, 0x0) [ 711.401480] device bridge_slave_0 left promiscuous mode [ 711.407147] bridge0: port 1(bridge_slave_0) entered disabled state 2033/05/18 03:38:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x3, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:15 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x100000000000000) 2033/05/18 03:38:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:15 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x1000000) 2033/05/18 03:38:15 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x22, &(0x7f0000000040)=ANY=[]}, 0x0) [ 711.472102] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 711.611429] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 711.632229] team0 (unregistering): Port device team_slave_1 removed [ 711.727146] team0 (unregistering): Port device team_slave_0 removed [ 711.768415] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 711.779404] IPVS: ftp: loaded support on port[0] = 21 [ 711.796500] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 711.857468] bond0 (unregistering): Released all slaves [ 711.887441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 712.986938] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.993383] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.029071] device bridge_slave_0 entered promiscuous mode [ 713.106737] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.113167] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.136920] device bridge_slave_1 entered promiscuous mode [ 713.208388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 713.291107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 713.522554] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 713.576147] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 713.802389] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 713.817689] team0: Port device team_slave_0 added [ 713.884494] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 713.891964] team0: Port device team_slave_1 added [ 713.927192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 713.971643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 714.027073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 714.034280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 714.046621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 714.116301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 714.123540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 714.136602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 714.513906] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.520353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 714.527059] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.533435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 714.541771] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 715.168295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 715.834225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 715.958534] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 716.081103] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 716.087349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 716.101362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 716.219752] 8021q: adding VLAN 0 to HW filter on device team0 [ 716.965786] FAT-fs (loop1): bogus number of reserved sectors [ 716.971772] FAT-fs (loop1): Can't find a valid FAT filesystem [ 717.013450] FAULT_INJECTION: forcing a failure. [ 717.013450] name failslab, interval 1, probability 0, space 0, times 0 [ 717.025217] CPU: 0 PID: 14361 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 717.032500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.041867] Call Trace: [ 717.044470] dump_stack+0x1b9/0x294 [ 717.048117] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.053342] should_fail.cold.4+0xa/0x1a [ 717.057426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.062559] ? graph_lock+0x170/0x170 [ 717.066385] ? find_held_lock+0x36/0x1c0 [ 717.070469] ? __lock_is_held+0xb5/0x140 [ 717.074570] ? check_same_owner+0x320/0x320 [ 717.078906] ? device_create_groups_vargs+0x1ff/0x270 [ 717.084103] ? device_create_vargs+0x46/0x60 [ 717.088532] ? rcu_note_context_switch+0x710/0x710 [ 717.093469] ? mount_nodev+0x6b/0x110 [ 717.097277] ? fuse_mount+0x2c/0x40 [ 717.100912] ? mount_fs+0xae/0x328 [ 717.104469] __should_failslab+0x124/0x180 [ 717.108723] should_failslab+0x9/0x14 [ 717.112536] kmem_cache_alloc+0x2af/0x760 [ 717.116713] skb_clone+0x1ed/0x4f0 [ 717.120267] ? refcount_add_not_zero+0x290/0x320 [ 717.125034] ? skb_split+0x11d0/0x11d0 [ 717.128935] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 717.133963] ? netlink_trim+0x1b2/0x370 [ 717.137951] ? netlink_skb_destructor+0x210/0x210 [ 717.143072] ? cleanup_uevent_env+0x40/0x40 [ 717.147419] netlink_broadcast_filtered+0x1024/0x1580 [ 717.152636] ? __netlink_sendskb+0xd0/0xd0 [ 717.156904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.162453] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 717.167233] ? refcount_add_not_zero+0x320/0x320 [ 717.172012] ? cleanup_uevent_env+0x40/0x40 [ 717.176352] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 717.181387] kobject_uevent_env+0x6e4/0xea0 [ 717.185718] ? device_pm_add+0x221/0x340 [ 717.189808] kobject_uevent+0x1f/0x30 [ 717.193618] device_add+0xb01/0x16d0 [ 717.197357] ? device_private_init+0x230/0x230 [ 717.201947] ? kfree+0x1e9/0x260 [ 717.205330] ? kfree_const+0x5e/0x70 [ 717.209063] device_create_groups_vargs+0x1ff/0x270 [ 717.214114] device_create_vargs+0x46/0x60 [ 717.218368] bdi_register_va.part.10+0xbb/0x9b0 [ 717.223048] ? cgwb_kill+0x630/0x630 [ 717.226776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.232321] ? bdi_init+0x416/0x510 [ 717.235956] ? wb_init+0x9e0/0x9e0 [ 717.239510] ? bdi_alloc_node+0x67/0xe0 [ 717.243496] ? bdi_alloc_node+0x67/0xe0 [ 717.247483] ? rcu_read_lock_sched_held+0x108/0x120 [ 717.252601] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 717.257896] ? _raw_spin_unlock+0x22/0x30 [ 717.262065] bdi_register_va+0x68/0x80 [ 717.265968] super_setup_bdi_name+0x123/0x220 [ 717.270475] ? kill_block_super+0x100/0x100 [ 717.274814] ? kmem_cache_alloc_trace+0x616/0x780 [ 717.279665] ? match_wildcard+0x3c0/0x3c0 [ 717.283827] ? trace_hardirqs_on+0xd/0x10 [ 717.287999] fuse_fill_super+0xe6e/0x1e20 [ 717.292174] ? fuse_get_root_inode+0x190/0x190 [ 717.296781] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 717.301817] ? kasan_check_read+0x11/0x20 [ 717.305983] ? cap_capable+0x1f9/0x260 [ 717.309896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.315440] ? security_capable+0x99/0xc0 [ 717.319610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.325157] ? ns_capable_common+0x13f/0x170 [ 717.329585] ? get_anon_bdev+0x2f0/0x2f0 [ 717.333669] ? sget+0x113/0x150 [ 717.336961] ? fuse_get_root_inode+0x190/0x190 [ 717.341557] mount_nodev+0x6b/0x110 [ 717.345201] fuse_mount+0x2c/0x40 [ 717.348668] mount_fs+0xae/0x328 [ 717.352053] vfs_kern_mount.part.34+0xd4/0x4d0 [ 717.356650] ? may_umount+0xb0/0xb0 [ 717.360291] ? _raw_read_unlock+0x22/0x30 [ 717.364447] ? __get_fs_type+0x97/0xc0 [ 717.368358] do_mount+0x564/0x3070 [ 717.371919] ? copy_mount_string+0x40/0x40 [ 717.376162] ? rcu_pm_notify+0xc0/0xc0 [ 717.380082] ? copy_mount_options+0x5f/0x380 [ 717.384497] ? rcu_read_lock_sched_held+0x108/0x120 [ 717.389524] ? kmem_cache_alloc_trace+0x616/0x780 [ 717.394395] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.399944] ? _copy_from_user+0xdf/0x150 [ 717.404111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.409657] ? copy_mount_options+0x285/0x380 [ 717.414172] ksys_mount+0x12d/0x140 [ 717.417821] __x64_sys_mount+0xbe/0x150 [ 717.421808] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 717.426842] do_syscall_64+0x1b1/0x800 [ 717.430737] ? finish_task_switch+0x1ca/0x840 [ 717.435245] ? syscall_return_slowpath+0x5c0/0x5c0 [ 717.440196] ? syscall_return_slowpath+0x30f/0x5c0 [ 717.445147] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 717.450539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.455414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.460611] RIP: 0033:0x455a09 [ 717.463804] RSP: 002b:00007f990c196808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 717.471625] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 717.478898] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 717.486182] RBP: 0000000000000000 R08: 00007f990c196820 R09: 0000000000000000 [ 717.493456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 717.500731] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:21 executing program 1 (fault-call:2 fault-nth:70): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0xffffff82, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r1, r2, 0x0) 2033/05/18 03:38:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) [ 717.581689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0xf, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:21 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x30000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000000c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r0, 0x4) 2033/05/18 03:38:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800e], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0xa, &(0x7f0000000040)=ANY=[]}, 0x0) [ 717.594878] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 717.757178] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 717.783174] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:21 executing program 1 (fault-call:2 fault-nth:71): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xce0e], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x18, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:21 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000000)=""/44, 0x2c) dup3(r0, r1, 0x0) 2033/05/18 03:38:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 717.904447] device bridge_slave_1 left promiscuous mode [ 717.910121] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.949711] device bridge_slave_0 left promiscuous mode [ 717.955321] bridge0: port 1(bridge_slave_0) entered disabled state 2033/05/18 03:38:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x1000000, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0xc, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:21 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 2033/05/18 03:38:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:21 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) rt_sigaction(0x10, &(0x7f00000000c0)={0x2, {0x3}, 0x0, 0x567b}, &(0x7f00000001c0), 0x8, &(0x7f0000000200)) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) [ 717.961913] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 718.106202] team0 (unregistering): Port device team_slave_1 removed 2033/05/18 03:38:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x3a, &(0x7f0000000040)=ANY=[]}, 0x0) [ 718.134809] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 718.212422] team0 (unregistering): Port device team_slave_0 removed [ 718.314309] IPVS: ftp: loaded support on port[0] = 21 [ 718.323917] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 718.348848] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 718.460666] bond0 (unregistering): Released all slaves [ 718.494480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 719.420780] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.427211] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.451920] device bridge_slave_0 entered promiscuous mode [ 719.523458] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.529884] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.556950] device bridge_slave_1 entered promiscuous mode [ 719.633114] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 719.713212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 719.918165] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 719.955400] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 720.176198] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 720.183554] team0: Port device team_slave_0 added [ 720.217460] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 720.224785] team0: Port device team_slave_1 added [ 720.258758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 720.296904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 720.333000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 720.340326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 720.355062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 720.385553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 720.392707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 720.403545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 720.747397] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.753833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.760477] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.766857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 720.774972] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 721.760183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 722.071379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 722.194947] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 722.317229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 722.323471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 722.337587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 722.454119] 8021q: adding VLAN 0 to HW filter on device team0 [ 723.191932] FAT-fs (loop1): bogus number of reserved sectors [ 723.197860] FAT-fs (loop1): Can't find a valid FAT filesystem [ 723.212039] FAULT_INJECTION: forcing a failure. [ 723.212039] name failslab, interval 1, probability 0, space 0, times 0 [ 723.223744] CPU: 1 PID: 14701 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 723.231022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.240378] Call Trace: [ 723.242983] dump_stack+0x1b9/0x294 [ 723.246634] ? dump_stack_print_info.cold.2+0x52/0x52 [ 723.251856] should_fail.cold.4+0xa/0x1a [ 723.255937] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.261058] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.266090] ? graph_lock+0x170/0x170 [ 723.269899] ? __lockdep_init_map+0x105/0x590 [ 723.274422] ? find_held_lock+0x36/0x1c0 [ 723.278508] ? __lock_is_held+0xb5/0x140 [ 723.282605] ? check_same_owner+0x320/0x320 [ 723.286946] ? rcu_note_context_switch+0x710/0x710 [ 723.291898] __should_failslab+0x124/0x180 [ 723.296149] should_failslab+0x9/0x14 [ 723.299969] kmem_cache_alloc+0x2af/0x760 [ 723.304151] alloc_inode+0xb2/0x190 [ 723.307791] new_inode_pseudo+0x69/0x1a0 [ 723.311867] ? prune_icache_sb+0x1a0/0x1a0 [ 723.316115] ? down_read+0x1b0/0x1b0 [ 723.319839] ? mntput+0x74/0xa0 [ 723.323138] new_inode+0x1c/0x40 [ 723.326516] debugfs_get_inode+0x19/0x120 [ 723.330679] debugfs_create_dir+0x75/0x3c0 [ 723.334936] bdi_register_va.part.10+0x318/0x9b0 [ 723.339706] ? cgwb_kill+0x630/0x630 [ 723.343439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.348986] ? bdi_init+0x416/0x510 [ 723.352624] ? wb_init+0x9e0/0x9e0 [ 723.356183] ? bdi_alloc_node+0x67/0xe0 [ 723.360164] ? bdi_alloc_node+0x67/0xe0 [ 723.364149] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.369177] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 723.374471] ? _raw_spin_unlock+0x22/0x30 [ 723.378639] bdi_register_va+0x68/0x80 [ 723.382543] super_setup_bdi_name+0x123/0x220 [ 723.387048] ? kill_block_super+0x100/0x100 [ 723.391388] ? kmem_cache_alloc_trace+0x616/0x780 [ 723.396241] ? match_wildcard+0x3c0/0x3c0 [ 723.400402] ? trace_hardirqs_on+0xd/0x10 [ 723.404574] fuse_fill_super+0xe6e/0x1e20 [ 723.408748] ? fuse_get_root_inode+0x190/0x190 [ 723.413350] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 723.418381] ? kasan_check_read+0x11/0x20 [ 723.422546] ? cap_capable+0x1f9/0x260 [ 723.426456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.432003] ? security_capable+0x99/0xc0 [ 723.436169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.441714] ? ns_capable_common+0x13f/0x170 [ 723.446137] ? get_anon_bdev+0x2f0/0x2f0 [ 723.450207] ? sget+0x113/0x150 [ 723.453505] ? fuse_get_root_inode+0x190/0x190 [ 723.458101] mount_nodev+0x6b/0x110 [ 723.461741] fuse_mount+0x2c/0x40 [ 723.465207] mount_fs+0xae/0x328 [ 723.468595] vfs_kern_mount.part.34+0xd4/0x4d0 [ 723.473196] ? may_umount+0xb0/0xb0 [ 723.476835] ? _raw_read_unlock+0x22/0x30 [ 723.480990] ? __get_fs_type+0x97/0xc0 [ 723.484901] do_mount+0x564/0x3070 [ 723.488464] ? copy_mount_string+0x40/0x40 [ 723.492715] ? rcu_pm_notify+0xc0/0xc0 [ 723.496633] ? copy_mount_options+0x5f/0x380 [ 723.501055] ? rcu_read_lock_sched_held+0x108/0x120 [ 723.506084] ? kmem_cache_alloc_trace+0x616/0x780 [ 723.510943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.516492] ? _copy_from_user+0xdf/0x150 [ 723.520657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.526202] ? copy_mount_options+0x285/0x380 [ 723.530718] ksys_mount+0x12d/0x140 [ 723.534361] __x64_sys_mount+0xbe/0x150 [ 723.538342] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 723.543371] do_syscall_64+0x1b1/0x800 [ 723.547272] ? finish_task_switch+0x1ca/0x840 [ 723.551780] ? syscall_return_slowpath+0x5c0/0x5c0 [ 723.556728] ? syscall_return_slowpath+0x30f/0x5c0 [ 723.561679] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 723.567066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.571932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.577127] RIP: 0033:0x455a09 [ 723.580320] RSP: 002b:00007ffa86a02808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 723.588041] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 723.595318] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 723.602592] RBP: 0000000000000000 R08: 00007ffa86a02820 R09: 0000000000000000 [ 723.609868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 723.617147] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:27 executing program 1 (fault-call:2 fault-nth:72): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:27 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x4, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:27 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x7ffff000, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x1000000, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x2b, &(0x7f0000000040)=ANY=[]}, 0x0) [ 723.709956] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 723.718379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:27 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x1, 0x480) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)={0x200, 0x4, [0x40]}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r1, r2, 0x0) 2033/05/18 03:38:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:27 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xcd0e000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:27 executing program 1 (fault-call:2 fault-nth:73): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:27 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x26, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:27 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x11}, 0x60) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x340c0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="c437b10dc40cf9d065d8019379551f62", 0x10) recvfrom$llc(r2, &(0x7f0000000040), 0x0, 0x2000, 0x0, 0x0) dup3(r0, r1, 0x0) 2033/05/18 03:38:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x1000000, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x9, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:27 executing program 6: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x80ffffff00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 723.922395] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 724.011297] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 724.049421] device bridge_slave_1 left promiscuous mode [ 724.055114] bridge0: port 2(bridge_slave_1) entered disabled state 2033/05/18 03:38:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) [ 724.093420] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 724.122365] device bridge_slave_0 left promiscuous mode [ 724.134839] bridge0: port 1(bridge_slave_0) entered disabled state 2033/05/18 03:38:27 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x2d, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 724.326508] team0 (unregistering): Port device team_slave_1 removed [ 724.344539] IPVS: ftp: loaded support on port[0] = 21 [ 724.352348] team0 (unregistering): Port device team_slave_0 removed [ 724.368381] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 724.408144] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 724.452920] bond0 (unregistering): Released all slaves [ 724.505764] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 725.310367] bridge0: port 1(bridge_slave_0) entered blocking state [ 725.316809] bridge0: port 1(bridge_slave_0) entered disabled state [ 725.324296] device bridge_slave_0 entered promiscuous mode [ 725.366748] bridge0: port 2(bridge_slave_1) entered blocking state [ 725.373173] bridge0: port 2(bridge_slave_1) entered disabled state [ 725.380986] device bridge_slave_1 entered promiscuous mode [ 725.427219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 725.469136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 725.671722] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 725.710415] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 725.914729] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 725.922774] team0: Port device team_slave_0 added [ 725.957752] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 725.965755] team0: Port device team_slave_1 added [ 726.032009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 726.097855] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 726.173315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 726.180489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 726.191178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 726.248256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 726.255403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 726.267543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 726.819444] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.825873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 726.832510] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.838882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 726.846285] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 726.880562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 728.135181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 728.257615] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 728.380253] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 728.386489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 728.400782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 728.519853] 8021q: adding VLAN 0 to HW filter on device team0 [ 729.271000] FAT-fs (loop1): bogus number of reserved sectors [ 729.276974] FAT-fs (loop1): Can't find a valid FAT filesystem [ 729.306808] FAULT_INJECTION: forcing a failure. [ 729.306808] name failslab, interval 1, probability 0, space 0, times 0 [ 729.318162] CPU: 1 PID: 15033 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 729.325446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.334804] Call Trace: [ 729.337404] dump_stack+0x1b9/0x294 [ 729.341051] ? dump_stack_print_info.cold.2+0x52/0x52 [ 729.346274] should_fail.cold.4+0xa/0x1a [ 729.350351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.355471] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 729.360501] ? graph_lock+0x170/0x170 [ 729.364306] ? __lockdep_init_map+0x105/0x590 [ 729.368823] ? find_held_lock+0x36/0x1c0 [ 729.372907] ? __lock_is_held+0xb5/0x140 [ 729.377003] ? check_same_owner+0x320/0x320 [ 729.381340] ? rcu_note_context_switch+0x710/0x710 [ 729.386292] __should_failslab+0x124/0x180 [ 729.390542] should_failslab+0x9/0x14 [ 729.394353] kmem_cache_alloc+0x2af/0x760 [ 729.398530] alloc_inode+0xb2/0x190 [ 729.402168] new_inode_pseudo+0x69/0x1a0 [ 729.406244] ? prune_icache_sb+0x1a0/0x1a0 [ 729.410490] ? down_read+0x1b0/0x1b0 [ 729.414212] ? mntput+0x74/0xa0 [ 729.417514] new_inode+0x1c/0x40 [ 729.420896] debugfs_get_inode+0x19/0x120 [ 729.425057] __debugfs_create_file+0xb5/0x400 [ 729.429575] debugfs_create_file+0x57/0x70 [ 729.433827] bdi_register_va.part.10+0x365/0x9b0 [ 729.438598] ? cgwb_kill+0x630/0x630 [ 729.442330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.447877] ? bdi_init+0x416/0x510 [ 729.451517] ? wb_init+0x9e0/0x9e0 [ 729.455072] ? bdi_alloc_node+0x67/0xe0 [ 729.459057] ? bdi_alloc_node+0x67/0xe0 [ 729.463043] ? rcu_read_lock_sched_held+0x108/0x120 [ 729.468070] ? kmem_cache_alloc_node_trace+0x34e/0x770 [ 729.473368] ? _raw_spin_unlock+0x22/0x30 [ 729.477535] bdi_register_va+0x68/0x80 [ 729.481439] super_setup_bdi_name+0x123/0x220 [ 729.485944] ? kill_block_super+0x100/0x100 [ 729.490276] ? kmem_cache_alloc_trace+0x616/0x780 [ 729.495127] ? match_wildcard+0x3c0/0x3c0 [ 729.499285] ? trace_hardirqs_on+0xd/0x10 [ 729.503456] fuse_fill_super+0xe6e/0x1e20 [ 729.507633] ? fuse_get_root_inode+0x190/0x190 [ 729.512233] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 729.517265] ? kasan_check_read+0x11/0x20 [ 729.521430] ? cap_capable+0x1f9/0x260 [ 729.525338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.530887] ? security_capable+0x99/0xc0 [ 729.535062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.540608] ? ns_capable_common+0x13f/0x170 [ 729.545030] ? get_anon_bdev+0x2f0/0x2f0 [ 729.549098] ? sget+0x113/0x150 [ 729.552391] ? fuse_get_root_inode+0x190/0x190 [ 729.556984] mount_nodev+0x6b/0x110 [ 729.560622] fuse_mount+0x2c/0x40 [ 729.564088] mount_fs+0xae/0x328 [ 729.567476] vfs_kern_mount.part.34+0xd4/0x4d0 [ 729.572075] ? may_umount+0xb0/0xb0 [ 729.575717] ? _raw_read_unlock+0x22/0x30 [ 729.579872] ? __get_fs_type+0x97/0xc0 [ 729.583787] do_mount+0x564/0x3070 [ 729.587348] ? copy_mount_string+0x40/0x40 [ 729.591592] ? rcu_pm_notify+0xc0/0xc0 [ 729.595503] ? copy_mount_options+0x5f/0x380 [ 729.599919] ? rcu_read_lock_sched_held+0x108/0x120 [ 729.604951] ? kmem_cache_alloc_trace+0x616/0x780 [ 729.609813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.615360] ? _copy_from_user+0xdf/0x150 [ 729.619530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.625073] ? copy_mount_options+0x285/0x380 [ 729.629588] ksys_mount+0x12d/0x140 [ 729.633231] __x64_sys_mount+0xbe/0x150 [ 729.637212] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 729.642252] do_syscall_64+0x1b1/0x800 [ 729.646148] ? finish_task_switch+0x1ca/0x840 [ 729.650655] ? syscall_return_slowpath+0x5c0/0x5c0 [ 729.655595] ? syscall_return_slowpath+0x30f/0x5c0 [ 729.660543] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 729.665925] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.670788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.675983] RIP: 0033:0x455a09 [ 729.679174] RSP: 002b:00007fdc00dee808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 729.686905] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 729.694608] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 729.701889] RBP: 0000000000000000 R08: 00007fdc00dee820 R09: 0000000000000000 [ 729.709163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 729.716436] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:33 executing program 6: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x4}, 0x60) 2033/05/18 03:38:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x1000000, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x19, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:33 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:33 executing program 1 (fault-call:2 fault-nth:74): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c00000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 729.808198] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x12, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) 2033/05/18 03:38:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x2, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8848000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:33 executing program 1 (fault-call:2 fault-nth:75): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:33 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = dup3(r0, r1, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f00000001c0)={"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"}) 2033/05/18 03:38:33 executing program 6: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x2c, &(0x7f0000000040)=ANY=[]}, 0x0) [ 729.821390] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 730.038180] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 730.053520] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="c626262c8523bf012cf66f") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00008deff8)='/\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)="6e66730039ad695ab91f0928267795ce2b07ba848ecc6b7c69", 0x2007a00, &(0x7f0000000140)) umount2(&(0x7f0000000100)='./file0\x00', 0xa) 2033/05/18 03:38:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x1000000, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 730.105319] device bridge_slave_1 left promiscuous mode [ 730.110917] bridge0: port 2(bridge_slave_1) entered disabled state 2033/05/18 03:38:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:33 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x31, &(0x7f0000000040)=ANY=[]}, 0x0) [ 730.158727] device bridge_slave_0 left promiscuous mode [ 730.164306] bridge0: port 1(bridge_slave_0) entered disabled state 2033/05/18 03:38:34 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) 2033/05/18 03:38:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa054d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x35, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:34 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x1, 0x0, 0x1, 0xffffffffffffffff, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x17}, 0xfffffffffffffff3) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x100, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f00000000c0)=0x3) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000000)=""/96, 0x60) dup3(0xffffffffffffffff, r0, 0x0) 2033/05/18 03:38:34 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) [ 730.233796] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 730.345396] team0 (unregistering): Port device team_slave_1 removed [ 730.384763] IPVS: ftp: loaded support on port[0] = 21 [ 730.411721] team0 (unregistering): Port device team_slave_0 removed [ 730.418542] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 730.436863] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 730.466988] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 730.511248] bond0 (unregistering): Released all slaves [ 731.868443] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.875065] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.915078] device bridge_slave_0 entered promiscuous mode [ 731.987822] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.994253] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.032913] device bridge_slave_1 entered promiscuous mode [ 732.123567] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 732.217581] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 732.472388] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 732.579268] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 732.949194] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 732.964659] team0: Port device team_slave_0 added [ 733.032244] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 733.052634] team0: Port device team_slave_1 added [ 733.133267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 733.140188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 733.152604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 733.222863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 733.229778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 733.243584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 733.313334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 733.320529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 733.338447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 733.397257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 733.404419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 733.416607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 734.015320] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.021753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.028445] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.034823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.113320] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 735.013273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 736.481145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 736.672951] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 736.807485] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 736.813745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 736.822840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 736.946104] 8021q: adding VLAN 0 to HW filter on device team0 [ 737.707951] FAT-fs (loop1): bogus number of reserved sectors [ 737.713918] FAT-fs (loop1): Can't find a valid FAT filesystem [ 737.768475] FAULT_INJECTION: forcing a failure. [ 737.768475] name failslab, interval 1, probability 0, space 0, times 0 [ 737.779822] CPU: 0 PID: 15368 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 737.787108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.796472] Call Trace: [ 737.799071] dump_stack+0x1b9/0x294 [ 737.802718] ? dump_stack_print_info.cold.2+0x52/0x52 [ 737.807917] ? __lock_acquire+0x7f5/0x5140 [ 737.812181] should_fail.cold.4+0xa/0x1a [ 737.816258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 737.821375] ? perf_tp_event+0xc30/0xc30 [ 737.825451] ? graph_lock+0x170/0x170 [ 737.829263] ? find_held_lock+0x36/0x1c0 [ 737.833340] ? find_held_lock+0x36/0x1c0 [ 737.837420] ? __lock_is_held+0xb5/0x140 [ 737.841524] ? check_same_owner+0x320/0x320 [ 737.845856] ? graph_lock+0x170/0x170 [ 737.849669] ? rcu_note_context_switch+0x710/0x710 [ 737.854605] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 737.860037] __should_failslab+0x124/0x180 [ 737.864289] should_failslab+0x9/0x14 [ 737.868098] kmem_cache_alloc+0x2af/0x760 [ 737.872258] ? find_held_lock+0x36/0x1c0 [ 737.876344] fuse_alloc_inode+0x96/0x4f0 [ 737.880416] ? fuse_dev_alloc+0x4e0/0x4e0 [ 737.884568] ? lock_downgrade+0x8e0/0x8e0 [ 737.888738] ? kasan_check_read+0x11/0x20 [ 737.892899] ? do_raw_spin_unlock+0x9e/0x2e0 [ 737.897317] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 737.901917] ? kasan_check_write+0x14/0x20 [ 737.906164] ? find_inode.isra.19+0xc3/0x1d0 [ 737.910582] ? fuse_dev_alloc+0x4e0/0x4e0 [ 737.914744] alloc_inode+0x63/0x190 [ 737.918383] iget5_locked+0x20e/0x570 [ 737.922188] ? fuse_inode_eq+0x80/0x80 [ 737.926082] ? fuse_init_file_inode+0x70/0x70 [ 737.930594] ? inode_lru_isolate+0x580/0x580 [ 737.935007] ? cgwb_kill+0x630/0x630 [ 737.938737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.944286] ? print_usage_bug+0xc0/0xc0 [ 737.948361] fuse_iget+0x1cc/0x820 [ 737.951926] ? fuse_change_attributes+0x810/0x810 [ 737.956780] ? _raw_spin_unlock+0x22/0x30 [ 737.960955] fuse_get_root_inode+0x121/0x190 [ 737.965374] ? fuse_iget+0x820/0x820 [ 737.969115] ? _raw_spin_unlock_bh+0x30/0x40 [ 737.973534] ? bdi_set_max_ratio+0x112/0x150 [ 737.977957] fuse_fill_super+0x11e0/0x1e20 [ 737.982215] ? fuse_get_root_inode+0x190/0x190 [ 737.986812] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 737.991854] ? kasan_check_read+0x11/0x20 [ 737.996019] ? cap_capable+0x1f9/0x260 [ 737.999931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.005476] ? security_capable+0x99/0xc0 [ 738.009641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.015186] ? ns_capable_common+0x13f/0x170 [ 738.019608] ? get_anon_bdev+0x2f0/0x2f0 [ 738.023676] ? sget+0x113/0x150 [ 738.026970] ? fuse_get_root_inode+0x190/0x190 [ 738.031565] mount_nodev+0x6b/0x110 [ 738.035205] fuse_mount+0x2c/0x40 [ 738.038692] mount_fs+0xae/0x328 [ 738.042081] vfs_kern_mount.part.34+0xd4/0x4d0 [ 738.046675] ? may_umount+0xb0/0xb0 [ 738.050312] ? _raw_read_unlock+0x22/0x30 [ 738.054470] ? __get_fs_type+0x97/0xc0 [ 738.058379] do_mount+0x564/0x3070 [ 738.061943] ? copy_mount_string+0x40/0x40 [ 738.066191] ? rcu_pm_notify+0xc0/0xc0 [ 738.070108] ? copy_mount_options+0x5f/0x380 [ 738.074526] ? rcu_read_lock_sched_held+0x108/0x120 [ 738.079556] ? kmem_cache_alloc_trace+0x616/0x780 [ 738.084417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.089964] ? _copy_from_user+0xdf/0x150 [ 738.094130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.099674] ? copy_mount_options+0x285/0x380 [ 738.104190] ksys_mount+0x12d/0x140 [ 738.107839] __x64_sys_mount+0xbe/0x150 [ 738.111823] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 738.116861] do_syscall_64+0x1b1/0x800 [ 738.120756] ? finish_task_switch+0x1ca/0x840 [ 738.125264] ? syscall_return_slowpath+0x5c0/0x5c0 [ 738.130211] ? syscall_return_slowpath+0x30f/0x5c0 [ 738.135161] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 738.140546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.145411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.150604] RIP: 0033:0x455a09 [ 738.153799] RSP: 002b:00007f0039090808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 738.161527] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 738.168800] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 738.176093] RBP: 0000000000000000 R08: 00007f0039090820 R09: 0000000000000000 [ 738.183365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 738.190642] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:42 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0425fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0x2e, &(0x7f0000000040)=ANY=[]}, 0x0) 2033/05/18 03:38:42 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) dup3(r0, r1, 0x0) r2 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0)='\'\x00', 0xfffffffffffffff8) keyctl$update(0x2, r2, &(0x7f00000001c0)="ef89f25b312803bd4b186b37e5e1621c3f4d3c557e9497db50cc599ce38cc2098e87b6132841d037bc253843ef4a253c613c2a08308a31aa01ca1a20e1834996dfd1833b067fa60df3d55df84d3b308317d8cdc06672a2c0462898a48db3a9619a4be67a7737afccacdc773d4775354a5378e9a0f88c3aea9a286e641532e58b35971dd09079030a918ae473c00de5e7620a216d5ace253b703176099dc0c2e2d36d39399e1f2544a099759a5f48f8323c223d7ebf7b353f5160c05d747511a41b60a4979c413c45274f5ce73c4684948f688820b33f47ed679675eef64f00f36677dac5b9c00e039383bba4749731", 0xef) 2033/05/18 03:38:42 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8847000000000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) 2033/05/18 03:38:42 executing program 1 (fault-call:2 fault-nth:76): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 2033/05/18 03:38:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) keyctl$clear(0x7, r0) 2033/05/18 03:38:42 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)='z', 0x1}], 0xffffff80, &(0x7f0000000040)=ANY=[]}, 0x0) [ 738.283419] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 738.285970] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2033/05/18 03:38:42 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000001480)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) recvmsg(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/33, 0x21}, 0x40) 2033/05/18 03:38:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) [ 738.347272] FAT-fs (loop1): bogus number of reserved sectors [ 738.353248] FAT-fs (loop1): Can't find a valid FAT filesystem [ 738.394324] FAULT_INJECTION: forcing a failure. [ 738.394324] name failslab, interval 1, probability 0, space 0, times 0 [ 738.405700] CPU: 0 PID: 15388 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 738.412989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.422352] Call Trace: [ 738.424962] dump_stack+0x1b9/0x294 [ 738.428619] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.433855] should_fail.cold.4+0xa/0x1a [ 738.437948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.443074] ? save_stack+0x43/0xd0 [ 738.446711] ? kasan_kmalloc+0xc4/0xe0 [ 738.450608] ? kmem_cache_alloc+0x12e/0x760 [ 738.454939] ? fuse_alloc_inode+0x96/0x4f0 [ 738.459184] ? alloc_inode+0x63/0x190 [ 738.462994] ? iget5_locked+0x20e/0x570 [ 738.466986] ? graph_lock+0x170/0x170 [ 738.470801] ? print_usage_bug+0xc0/0xc0 [ 738.474874] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 738.479640] ? do_mount+0x564/0x3070 [ 738.483360] ? ksys_mount+0x12d/0x140 [ 738.487168] ? __x64_sys_mount+0xbe/0x150 [ 738.491332] ? find_held_lock+0x36/0x1c0 [ 738.495419] ? __lock_is_held+0xb5/0x140 [ 738.499518] ? check_same_owner+0x320/0x320 [ 738.503852] ? __mutex_init+0x1ef/0x280 [ 738.507841] ? rcu_note_context_switch+0x710/0x710 [ 738.512783] ? __ia32_sys_membarrier+0x150/0x150 [ 738.517562] __should_failslab+0x124/0x180 [ 738.521817] should_failslab+0x9/0x14 [ 738.525627] kmem_cache_alloc_trace+0x2cb/0x780 [ 738.530303] ? init_wait_entry+0x1b0/0x1b0 [ 738.534569] fuse_alloc_inode+0x3ae/0x4f0 [ 738.538731] ? fuse_dev_alloc+0x4e0/0x4e0 [ 738.542888] ? lock_downgrade+0x8e0/0x8e0 [ 738.547060] ? kasan_check_read+0x11/0x20 [ 738.551218] ? do_raw_spin_unlock+0x9e/0x2e0 [ 738.555640] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 738.560236] ? kasan_check_write+0x14/0x20 [ 738.564482] ? find_inode.isra.19+0xc3/0x1d0 [ 738.568907] ? fuse_dev_alloc+0x4e0/0x4e0 [ 738.573068] alloc_inode+0x63/0x190 [ 738.576706] iget5_locked+0x20e/0x570 [ 738.580513] ? fuse_inode_eq+0x80/0x80 [ 738.584411] ? fuse_init_file_inode+0x70/0x70 [ 738.588924] ? inode_lru_isolate+0x580/0x580 [ 738.593338] ? cgwb_kill+0x630/0x630 [ 738.597065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.602613] ? print_usage_bug+0xc0/0xc0 [ 738.606693] fuse_iget+0x1cc/0x820 [ 738.610255] ? fuse_change_attributes+0x810/0x810 [ 738.615113] ? _raw_spin_unlock+0x22/0x30 [ 738.619285] fuse_get_root_inode+0x121/0x190 [ 738.623707] ? fuse_iget+0x820/0x820 [ 738.627449] ? _raw_spin_unlock_bh+0x30/0x40 [ 738.631874] ? bdi_set_max_ratio+0x112/0x150 [ 738.636297] fuse_fill_super+0x11e0/0x1e20 [ 738.640556] ? fuse_get_root_inode+0x190/0x190 [ 738.645154] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 738.650187] ? kasan_check_read+0x11/0x20 [ 738.654351] ? cap_capable+0x1f9/0x260 [ 738.658261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.663813] ? security_capable+0x99/0xc0 [ 738.667980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.673523] ? ns_capable_common+0x13f/0x170 [ 738.677947] ? get_anon_bdev+0x2f0/0x2f0 [ 738.682023] ? sget+0x113/0x150 [ 738.685318] ? fuse_get_root_inode+0x190/0x190 [ 738.689911] mount_nodev+0x6b/0x110 [ 738.693551] fuse_mount+0x2c/0x40 [ 738.697018] mount_fs+0xae/0x328 [ 738.700403] vfs_kern_mount.part.34+0xd4/0x4d0 [ 738.705008] ? may_umount+0xb0/0xb0 [ 738.708645] ? _raw_read_unlock+0x22/0x30 [ 738.712806] ? __get_fs_type+0x97/0xc0 [ 738.716714] do_mount+0x564/0x3070 [ 738.720276] ? copy_mount_string+0x40/0x40 [ 738.724868] ? rcu_pm_notify+0xc0/0xc0 [ 738.728784] ? copy_mount_options+0x5f/0x380 [ 738.733209] ? rcu_read_lock_sched_held+0x108/0x120 [ 738.738237] ? kmem_cache_alloc_trace+0x616/0x780 [ 738.743101] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.748650] ? _copy_from_user+0xdf/0x150 [ 738.752819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.758368] ? copy_mount_options+0x285/0x380 [ 738.762890] ksys_mount+0x12d/0x140 [ 738.766535] __x64_sys_mount+0xbe/0x150 [ 738.770517] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 738.775548] do_syscall_64+0x1b1/0x800 [ 738.779443] ? finish_task_switch+0x1ca/0x840 [ 738.783952] ? syscall_return_slowpath+0x5c0/0x5c0 [ 738.788894] ? syscall_return_slowpath+0x30f/0x5c0 [ 738.793847] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 738.799231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.804100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.809295] RIP: 0033:0x455a09 [ 738.812489] RSP: 002b:00007f0039090808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 738.820211] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 738.827486] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 738.834759] RBP: 0000000000000000 R08: 00007f0039090820 R09: 0000000000000000 2033/05/18 03:38:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x3c}, 0x60) 2033/05/18 03:38:42 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r1, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) r2 = dup3(r0, r1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) [ 738.842037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 738.849311] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 2033/05/18 03:38:42 executing program 6: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 2033/05/18 03:38:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffff7f00000000], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) [ 738.883353] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -11 0 [ 738.922498] ================================================================== [ 738.936657] BUG: KASAN: use-after-free in __lock_acquire+0x3888/0x5140 [ 738.943320] Read of size 8 at addr ffff8801ca523dc8 by task syz-executor1/15388 [ 738.950755] [ 738.952382] CPU: 1 PID: 15388 Comm: syz-executor1 Not tainted 4.17.0-rc5+ #54 [ 738.959645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.968990] Call Trace: [ 738.971578] dump_stack+0x1b9/0x294 [ 738.975213] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.980403] ? printk+0x9e/0xba [ 738.983684] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 738.988442] ? kasan_check_write+0x14/0x20 [ 738.992680] print_address_description+0x6c/0x20b [ 738.997525] ? __lock_acquire+0x3888/0x5140 [ 739.001851] kasan_report.cold.7+0x242/0x2fe [ 739.006271] __asan_report_load8_noabort+0x14/0x20 [ 739.011196] __lock_acquire+0x3888/0x5140 [ 739.015338] ? lock_downgrade+0x8e0/0x8e0 [ 739.019485] ? rcu_is_watching+0x85/0x140 [ 739.023631] ? debug_check_no_locks_freed+0x310/0x310 [ 739.028818] ? is_bpf_text_address+0xd7/0x170 [ 739.033312] ? kernel_text_address+0x79/0xf0 [ 739.037715] ? __unwind_start+0x166/0x330 [ 739.041858] ? __kernel_text_address+0xd/0x40 [ 739.046352] ? unwind_get_return_address+0x61/0xa0 [ 739.051284] ? __save_stack_trace+0x7e/0xd0 [ 739.055609] ? save_stack+0xa9/0xd0 [ 739.059231] ? save_stack+0x43/0xd0 [ 739.062858] ? __kasan_slab_free+0x11a/0x170 [ 739.067266] ? kasan_slab_free+0xe/0x10 [ 739.071235] ? kfree+0xd9/0x260 [ 739.074512] ? unregister_shrinker+0x216/0x3a0 [ 739.079120] ? deactivate_locked_super+0x70/0x100 [ 739.083959] ? mount_nodev+0xfa/0x110 [ 739.087756] ? fuse_mount+0x2c/0x40 [ 739.091377] ? mount_fs+0xae/0x328 [ 739.094910] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.099660] ? do_mount+0x564/0x3070 [ 739.103366] ? ksys_mount+0x12d/0x140 [ 739.107164] ? graph_lock+0x170/0x170 [ 739.110958] ? kasan_check_read+0x11/0x20 [ 739.115105] ? do_raw_spin_unlock+0x9e/0x2e0 [ 739.119512] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 739.124089] ? print_usage_bug+0xc0/0xc0 [ 739.128146] ? kasan_check_write+0x14/0x20 [ 739.132375] ? do_raw_spin_lock+0xc1/0x200 [ 739.136609] lock_acquire+0x1dc/0x520 [ 739.140405] ? fuse_kill_sb_anon+0x50/0xb0 [ 739.144635] ? lock_release+0xa10/0xa10 [ 739.148608] ? check_same_owner+0x320/0x320 [ 739.152921] ? quarantine_put+0xeb/0x190 [ 739.156979] ? rcu_note_context_switch+0x710/0x710 [ 739.161908] ? __might_sleep+0x95/0x190 [ 739.165878] down_write+0x87/0x120 [ 739.169415] ? fuse_kill_sb_anon+0x50/0xb0 [ 739.173647] ? down_read+0x1b0/0x1b0 [ 739.177357] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 739.182894] fuse_kill_sb_anon+0x50/0xb0 [ 739.186956] deactivate_locked_super+0x97/0x100 [ 739.191622] ? fuse_get_root_inode+0x190/0x190 [ 739.196199] mount_nodev+0xfa/0x110 [ 739.199840] fuse_mount+0x2c/0x40 [ 739.203287] mount_fs+0xae/0x328 [ 739.206650] vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.211230] ? may_umount+0xb0/0xb0 [ 739.214859] ? _raw_read_unlock+0x22/0x30 [ 739.219003] ? __get_fs_type+0x97/0xc0 [ 739.222887] do_mount+0x564/0x3070 [ 739.226424] ? copy_mount_string+0x40/0x40 [ 739.230654] ? rcu_pm_notify+0xc0/0xc0 [ 739.234540] ? copy_mount_options+0x5f/0x380 [ 739.238943] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.243963] ? kmem_cache_alloc_trace+0x616/0x780 [ 739.248804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.254341] ? _copy_from_user+0xdf/0x150 [ 739.258486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.264016] ? copy_mount_options+0x285/0x380 [ 739.268505] ksys_mount+0x12d/0x140 [ 739.272128] __x64_sys_mount+0xbe/0x150 [ 739.276098] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 739.281109] do_syscall_64+0x1b1/0x800 [ 739.284996] ? finish_task_switch+0x1ca/0x840 [ 739.289488] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.294416] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.299348] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.304714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.309560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.314744] RIP: 0033:0x455a09 [ 739.317927] RSP: 002b:00007f0039090808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.325629] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 739.332891] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 739.340153] RBP: 0000000000000000 R08: 00007f0039090820 R09: 0000000000000000 [ 739.347414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 739.354674] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 739.361938] [ 739.363559] Allocated by task 15388: [ 739.367271] save_stack+0x43/0xd0 [ 739.370718] kasan_kmalloc+0xc4/0xe0 [ 739.374427] kmem_cache_alloc_trace+0x152/0x780 [ 739.379090] fuse_fill_super+0xc92/0x1e20 [ 739.383235] mount_nodev+0x6b/0x110 [ 739.386867] fuse_mount+0x2c/0x40 [ 739.390311] mount_fs+0xae/0x328 [ 739.393672] vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.398248] do_mount+0x564/0x3070 [ 739.401781] ksys_mount+0x12d/0x140 [ 739.405400] __x64_sys_mount+0xbe/0x150 [ 739.409369] do_syscall_64+0x1b1/0x800 [ 739.413254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.418426] [ 739.420049] Freed by task 2388: [ 739.423342] save_stack+0x43/0xd0 [ 739.426794] __kasan_slab_free+0x11a/0x170 [ 739.431027] kasan_slab_free+0xe/0x10 [ 739.434828] kfree+0xd9/0x260 [ 739.436152] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 739.437936] rcu_process_callbacks+0xa69/0x15f0 [ 739.437950] __do_softirq+0x2e0/0xaf5 [ 739.437953] [ 739.437962] The buggy address belongs to the object at ffff8801ca523b00 [ 739.437962] which belongs to the cache kmalloc-1024 of size 1024 [ 739.437971] The buggy address is located 712 bytes inside of [ 739.437971] 1024-byte region [ffff8801ca523b00, ffff8801ca523f00) [ 739.437979] The buggy address belongs to the page: [ 739.488024] page:ffffea0007294880 count:1 mapcount:0 mapping:ffff8801ca522000 index:0x0 compound_mapcount: 0 [ 739.497989] flags: 0x2fffc0000008100(slab|head) [ 739.502658] raw: 02fffc0000008100 ffff8801ca522000 0000000000000000 0000000100000007 [ 739.510536] raw: ffffea00076419a0 ffffea0006c4da20 ffff8801da800ac0 0000000000000000 [ 739.518406] page dumped because: kasan: bad access detected [ 739.524099] [ 739.525712] Memory state around the buggy address: [ 739.530633] ffff8801ca523c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 739.537987] ffff8801ca523d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 739.545335] >ffff8801ca523d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 739.552679] ^ [ 739.558384] ffff8801ca523e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 739.565745] ffff8801ca523e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 739.573181] ================================================================== [ 739.580616] Disabling lock debugging due to kernel taint [ 739.586055] Kernel panic - not syncing: panic_on_warn set ... [ 739.586055] [ 739.593421] CPU: 1 PID: 15388 Comm: syz-executor1 Tainted: G B 4.17.0-rc5+ #54 [ 739.602074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.611415] Call Trace: [ 739.614000] dump_stack+0x1b9/0x294 [ 739.617626] ? dump_stack_print_info.cold.2+0x52/0x52 [ 739.622813] ? lock_downgrade+0x8e0/0x8e0 [ 739.626958] ? vprintk_default+0x28/0x30 [ 739.631017] ? __lock_acquire+0x37b0/0x5140 [ 739.635335] panic+0x22f/0x4de [ 739.638524] ? add_taint.cold.5+0x16/0x16 [ 739.642668] ? add_taint.cold.5+0x5/0x16 [ 739.646729] ? do_raw_spin_unlock+0x9e/0x2e0 [ 739.651135] ? __lock_acquire+0x3888/0x5140 [ 739.655453] kasan_end_report+0x47/0x4f [ 739.659425] kasan_report.cold.7+0x76/0x2fe [ 739.663745] __asan_report_load8_noabort+0x14/0x20 [ 739.668667] __lock_acquire+0x3888/0x5140 [ 739.672809] ? lock_downgrade+0x8e0/0x8e0 [ 739.676956] ? rcu_is_watching+0x85/0x140 [ 739.681097] ? debug_check_no_locks_freed+0x310/0x310 [ 739.686286] ? is_bpf_text_address+0xd7/0x170 [ 739.690778] ? kernel_text_address+0x79/0xf0 [ 739.695556] ? __unwind_start+0x166/0x330 [ 739.699786] ? __kernel_text_address+0xd/0x40 [ 739.704276] ? unwind_get_return_address+0x61/0xa0 [ 739.709202] ? __save_stack_trace+0x7e/0xd0 [ 739.713524] ? save_stack+0xa9/0xd0 [ 739.717145] ? save_stack+0x43/0xd0 [ 739.720786] ? __kasan_slab_free+0x11a/0x170 [ 739.725189] ? kasan_slab_free+0xe/0x10 [ 739.729157] ? kfree+0xd9/0x260 [ 739.732427] ? unregister_shrinker+0x216/0x3a0 [ 739.737002] ? deactivate_locked_super+0x70/0x100 [ 739.741836] ? mount_nodev+0xfa/0x110 [ 739.745631] ? fuse_mount+0x2c/0x40 [ 739.749251] ? mount_fs+0xae/0x328 [ 739.752787] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.757537] ? do_mount+0x564/0x3070 [ 739.761242] ? ksys_mount+0x12d/0x140 [ 739.765037] ? graph_lock+0x170/0x170 [ 739.768831] ? kasan_check_read+0x11/0x20 [ 739.772972] ? do_raw_spin_unlock+0x9e/0x2e0 [ 739.777373] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 739.781952] ? print_usage_bug+0xc0/0xc0 [ 739.786006] ? kasan_check_write+0x14/0x20 [ 739.790235] ? do_raw_spin_lock+0xc1/0x200 [ 739.794464] lock_acquire+0x1dc/0x520 [ 739.798260] ? fuse_kill_sb_anon+0x50/0xb0 [ 739.802488] ? lock_release+0xa10/0xa10 [ 739.806457] ? check_same_owner+0x320/0x320 [ 739.810768] ? quarantine_put+0xeb/0x190 [ 739.814827] ? rcu_note_context_switch+0x710/0x710 [ 739.819752] ? __might_sleep+0x95/0x190 [ 739.823722] down_write+0x87/0x120 [ 739.827256] ? fuse_kill_sb_anon+0x50/0xb0 [ 739.831484] ? down_read+0x1b0/0x1b0 [ 739.835195] ? perf_trace_mm_vmscan_writepage+0x750/0x750 [ 739.840731] fuse_kill_sb_anon+0x50/0xb0 [ 739.844786] deactivate_locked_super+0x97/0x100 [ 739.849452] ? fuse_get_root_inode+0x190/0x190 [ 739.854027] mount_nodev+0xfa/0x110 [ 739.857646] fuse_mount+0x2c/0x40 [ 739.861097] mount_fs+0xae/0x328 [ 739.864462] vfs_kern_mount.part.34+0xd4/0x4d0 [ 739.869036] ? may_umount+0xb0/0xb0 [ 739.872658] ? _raw_read_unlock+0x22/0x30 [ 739.876800] ? __get_fs_type+0x97/0xc0 [ 739.880680] do_mount+0x564/0x3070 [ 739.884219] ? copy_mount_string+0x40/0x40 [ 739.888450] ? rcu_pm_notify+0xc0/0xc0 [ 739.892333] ? copy_mount_options+0x5f/0x380 [ 739.896739] ? rcu_read_lock_sched_held+0x108/0x120 [ 739.901748] ? kmem_cache_alloc_trace+0x616/0x780 [ 739.906586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 739.912120] ? _copy_from_user+0xdf/0x150 [ 739.916265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.921795] ? copy_mount_options+0x285/0x380 [ 739.926283] ksys_mount+0x12d/0x140 [ 739.929907] __x64_sys_mount+0xbe/0x150 [ 739.933872] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 739.938884] do_syscall_64+0x1b1/0x800 [ 739.942766] ? finish_task_switch+0x1ca/0x840 [ 739.947256] ? syscall_return_slowpath+0x5c0/0x5c0 [ 739.952184] ? syscall_return_slowpath+0x30f/0x5c0 [ 739.957112] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 739.962469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.967310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.972488] RIP: 0033:0x455a09 [ 739.975667] RSP: 002b:00007f0039090808 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 739.983375] RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000000455a09 [ 739.990639] RDX: 00000000004c1eb6 RSI: 0000000020000400 RDI: 00000000004de0c5 [ 739.997911] RBP: 0000000000000000 R08: 00007f0039090820 R09: 0000000000000000 [ 740.005234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 740.012493] R13: 0000000020000400 R14: 0000000000000000 R15: 0000000000000000 [ 740.020235] Dumping ftrace buffer: [ 740.023759] (ftrace buffer empty) [ 740.027444] Kernel Offset: disabled [ 740.031054] Rebooting in 86400 seconds..