mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x2031, r0, 0x2000200) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) setsockopt(r1, 0x5, 0xcb, &(0x7f0000000040)="a6de", 0x2) getsockopt$sock_cred(r1, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:53 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$vbi(0x0, 0x3, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) [ 410.665796][T23306] FAULT_INJECTION: forcing a failure. [ 410.665796][T23306] name failslab, interval 1, probability 0, space 0, times 0 [ 410.745738][T23306] CPU: 1 PID: 23306 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 410.753782][T23306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.763854][T23306] Call Trace: [ 410.767163][T23306] dump_stack+0x172/0x1f0 [ 410.771525][T23306] should_fail.cold+0xa/0x15 [ 410.776134][T23306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 410.781958][T23306] ? ___might_sleep+0x163/0x280 [ 410.786837][T23306] __should_failslab+0x121/0x190 14:36:53 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x7f, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x2, 'none\x00', 0xc, 0x1fc0000, 0xa}, 0x2c) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 410.791786][T23306] should_failslab+0x9/0x14 [ 410.796313][T23306] __kmalloc+0x2dc/0x740 [ 410.800571][T23306] ? lockdep_init_map+0x1be/0x6d0 [ 410.805617][T23306] ? prealloc_shrinker+0xa6/0x350 [ 410.810666][T23306] prealloc_shrinker+0xa6/0x350 [ 410.815527][T23306] alloc_super+0x710/0x890 [ 410.819951][T23306] ? test_single_super+0x10/0x10 [ 410.824896][T23306] sget_userns+0xf1/0x560 [ 410.829229][T23306] ? kill_litter_super+0x60/0x60 [ 410.834175][T23306] ? test_single_super+0x10/0x10 [ 410.839130][T23306] ? kill_litter_super+0x60/0x60 [ 410.844083][T23306] sget+0x10c/0x150 [ 410.847904][T23306] mount_bdev+0xff/0x3c0 [ 410.852157][T23306] ? vfat_mount+0x40/0x40 [ 410.856498][T23306] vfat_mount+0x35/0x40 [ 410.860665][T23306] ? setup+0x120/0x120 [ 410.864742][T23306] legacy_get_tree+0xf2/0x200 [ 410.869438][T23306] vfs_get_tree+0x123/0x450 [ 410.873953][T23306] do_mount+0x1436/0x2c40 [ 410.878310][T23306] ? copy_mount_string+0x40/0x40 [ 410.883269][T23306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.889525][T23306] ? copy_mount_options+0x280/0x3a0 14:36:53 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) [ 410.894737][T23306] ksys_mount+0xdb/0x150 [ 410.898994][T23306] __x64_sys_mount+0xbe/0x150 [ 410.903684][T23306] do_syscall_64+0x103/0x610 [ 410.908296][T23306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.914195][T23306] RIP: 0033:0x45b81a [ 410.918094][T23306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 410.937713][T23306] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:36:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 410.946145][T23306] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 410.954132][T23306] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 410.962115][T23306] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 410.970096][T23306] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 410.978072][T23306] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:36:53 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:36:53 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x3f, 0x100000000, 0x9, 0x4, 0x16, 0x1, 0xca4c, 0xffffffff, 0x93fc, 0x80000000, 0x2, 0x5}) 14:36:53 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x400) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x793, 0xb7, 0x4, 0x0, 0x9, 0x0, 0x4105, 0x100, 0x2, 0x3, 0x1000, 0x0, 0x0, 0x6e4, 0x0, 0x3, 0xff, 0xb11c, 0x2ba}) 14:36:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:36:53 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'veth1_to_bridge\x00', 0x80000001}) listen(r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x802, 0x0) connect$x25(r1, &(0x7f0000000400)={0x9, @remote={[], 0x0}}, 0x12) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0x101, 0x0, [], {0x0, @bt={0x7, 0x8, 0x0, 0x2, 0x40, 0x4c1, 0x401, 0x7f, 0x7, 0x4, 0x6, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x10}}}) socket$inet_udplite(0x2, 0x2, 0x88) alarm(0x3f9) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000100)) futex(&(0x7f0000000340)=0x2, 0x4, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x1, 0x0) r2 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x50, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x74, 0x0, &(0x7f0000000200)=[@transaction_sg={0x40486311, {{0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x40, 0x18, &(0x7f0000000180)=[@ptr={0x70742a85, 0x1, &(0x7f0000000000), 0x1, 0x0, 0x1ff}, @fd={0x66642a85, 0x0, r1, 0x0, 0x1}], &(0x7f00000001c0)=[0x0, 0x28, 0x30]}, 0x21}}, @acquire_done={0x40106309, r2, 0x3}, @increfs={0x40046304, 0x2}, @dead_binder_done={0x40086310, 0x3}], 0x45, 0x0, &(0x7f0000000280)="3d5810e75ed54b93b1363bf04010b5f16790b03b5073989f42fa79fb4256cd5fd0db4f9122491e3635456a484c42c6fb37c5f1fb8d7a0c7f34d6b15ae34433a034164d32cf"}) pipe2$9p(&(0x7f0000000440), 0x84000) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:53 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0xfffffffffffffff9, 0x1, 0x8}) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 14:36:53 executing program 3: syz_emit_ethernet(0xb7, &(0x7f0000000000)={@remote, @dev={[], 0x23}, [], {@llc={0x4, {@snap={0xaa, 0xab, "06", "04ec68", 0x800, "d5e32416a23a1a7f171cf1152817bca4f9d0faae70339e5b041271d97460b1d968ad7d58a6f4b028676a3e8c8e4a4ce21fc7dd4f95292be3b80ef5f741e73c91b908af93b6406c8e9463afeac0e07fd0aa1240dc176da7cbe84d2fe1ec82109370c4fcb24ebe32f49b2b8ae49ae90b7e0ce7ff3d717f450855b559e9aec0efa78faef483d3fff4d4c4ab7e872a97f5c88ca59801707f52662b2e15366c0a345506"}}}}}, &(0x7f00000000c0)={0x1, 0x2, [0x856, 0xde9, 0xa00, 0xe6e]}) socket$pptp(0x18, 0x1, 0x2) syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80100, 0x0) 14:36:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 411.268017][T23348] FAULT_INJECTION: forcing a failure. [ 411.268017][T23348] name failslab, interval 1, probability 0, space 0, times 0 14:36:53 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 411.365714][T23348] CPU: 0 PID: 23348 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 411.373750][T23348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.383819][T23348] Call Trace: [ 411.387127][T23348] dump_stack+0x172/0x1f0 [ 411.391479][T23348] should_fail.cold+0xa/0x15 [ 411.396083][T23348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 411.401902][T23348] ? ___might_sleep+0x163/0x280 [ 411.401924][T23348] __should_failslab+0x121/0x190 [ 411.401940][T23348] should_failslab+0x9/0x14 [ 411.401962][T23348] kmem_cache_alloc_trace+0x2d1/0x760 [ 411.411753][T23348] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 411.427405][T23348] __memcg_init_list_lru_node+0x8a/0x1e0 [ 411.433055][T23348] __list_lru_init+0x3cf/0x6e0 [ 411.437838][T23348] alloc_super+0x762/0x890 [ 411.442269][T23348] ? test_single_super+0x10/0x10 [ 411.447231][T23348] sget_userns+0xf1/0x560 [ 411.451569][T23348] ? kill_litter_super+0x60/0x60 [ 411.456516][T23348] ? test_single_super+0x10/0x10 [ 411.461457][T23348] ? kill_litter_super+0x60/0x60 [ 411.466427][T23348] sget+0x10c/0x150 [ 411.470267][T23348] mount_bdev+0xff/0x3c0 [ 411.474526][T23348] ? vfat_mount+0x40/0x40 [ 411.478869][T23348] vfat_mount+0x35/0x40 [ 411.483032][T23348] ? setup+0x120/0x120 [ 411.487111][T23348] legacy_get_tree+0xf2/0x200 [ 411.491797][T23348] vfs_get_tree+0x123/0x450 [ 411.491817][T23348] do_mount+0x1436/0x2c40 [ 411.491839][T23348] ? copy_mount_string+0x40/0x40 [ 411.491856][T23348] ? _copy_from_user+0xdd/0x150 [ 411.491877][T23348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.500698][T23348] ? copy_mount_options+0x280/0x3a0 [ 411.500719][T23348] ksys_mount+0xdb/0x150 [ 411.500738][T23348] __x64_sys_mount+0xbe/0x150 [ 411.530910][T23348] do_syscall_64+0x103/0x610 [ 411.535512][T23348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.541406][T23348] RIP: 0033:0x45b81a [ 411.545314][T23348] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:36:53 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x9, 0x2000) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 411.564942][T23348] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 411.573377][T23348] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 411.581361][T23348] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 411.589345][T23348] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 411.597337][T23348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 411.605326][T23348] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:36:54 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:36:54 executing program 4: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfd, 0x80}, 0xc) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x3f, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) 14:36:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:54 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vcs\x00', 0x8000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/loop-control\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000008c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x42, r1, 0xd00, 0x70bd25, 0x25dfdbff}, 0xffffffffffffffe4}, 0x1, 0x0, 0x0, 0x84}, 0x40004) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000880)=[0x0, 0xc9e]) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000000)={0x100000000, 0x7, 0x3f, 0x2, 0x9, 0xffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) r10 = geteuid() bind$rose(r3, &(0x7f0000000900)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getgid() r18 = getgid() syz_open_dev$radio(&(0x7f0000000940)='/dev/radio#\x00', 0x0, 0x2) fsetxattr$system_posix_acl(r4, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=r7, @ANYBLOB="02000600", @ANYRES32=r8, @ANYBLOB="02000100", @ANYRES32=r9, @ANYBLOB="02000100", @ANYRES32=r10, @ANYBLOB="02000700", @ANYRES32=r11, @ANYBLOB="040003000000000008000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r14, @ANYBLOB="08000200", @ANYRES32=r15, @ANYBLOB="08000400", @ANYRES32=r16, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r17, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB="10000100000000002000000000000000"], 0x94, 0x2) 14:36:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x2, 0x2, 0x10000, 0x401, r1}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x408002, 0x0) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000140)=""/126) fcntl$lock(r0, 0x0, &(0x7f0000000040)={0x3, 0x7, 0x0, 0x4, r2}) 14:36:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:36:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000040)) 14:36:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000020000"], 0x2f) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 411.870755][T23381] FAULT_INJECTION: forcing a failure. [ 411.870755][T23381] name failslab, interval 1, probability 0, space 0, times 0 [ 411.901992][T23381] CPU: 1 PID: 23381 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 411.910035][T23381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.920104][T23381] Call Trace: [ 411.920135][T23381] dump_stack+0x172/0x1f0 [ 411.920162][T23381] should_fail.cold+0xa/0x15 [ 411.932371][T23381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 411.938201][T23381] ? ___might_sleep+0x163/0x280 [ 411.943075][T23381] __should_failslab+0x121/0x190 [ 411.948027][T23381] should_failslab+0x9/0x14 [ 411.952550][T23381] kmem_cache_alloc_trace+0x2d1/0x760 [ 411.957943][T23381] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 411.957975][T23381] __memcg_init_list_lru_node+0x8a/0x1e0 [ 411.969428][T23381] __list_lru_init+0x3cf/0x6e0 [ 411.974214][T23381] alloc_super+0x762/0x890 [ 411.978649][T23381] ? test_single_super+0x10/0x10 [ 411.983599][T23381] sget_userns+0xf1/0x560 [ 411.987939][T23381] ? kill_litter_super+0x60/0x60 [ 411.992886][T23381] ? test_single_super+0x10/0x10 [ 411.992899][T23381] ? kill_litter_super+0x60/0x60 [ 411.992911][T23381] sget+0x10c/0x150 [ 411.992929][T23381] mount_bdev+0xff/0x3c0 [ 411.992944][T23381] ? vfat_mount+0x40/0x40 [ 411.992963][T23381] vfat_mount+0x35/0x40 [ 411.992977][T23381] ? setup+0x120/0x120 [ 411.992991][T23381] legacy_get_tree+0xf2/0x200 [ 411.993010][T23381] vfs_get_tree+0x123/0x450 [ 411.993027][T23381] do_mount+0x1436/0x2c40 [ 411.993049][T23381] ? copy_mount_string+0x40/0x40 [ 412.006715][T23381] ? _copy_from_user+0xdd/0x150 [ 412.015269][T23381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.015283][T23381] ? copy_mount_options+0x280/0x3a0 [ 412.015310][T23381] ksys_mount+0xdb/0x150 [ 412.015326][T23381] __x64_sys_mount+0xbe/0x150 [ 412.015344][T23381] do_syscall_64+0x103/0x610 [ 412.015364][T23381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.015376][T23381] RIP: 0033:0x45b81a [ 412.015391][T23381] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 412.015400][T23381] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 412.015414][T23381] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a 14:36:54 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x4}, 0x8) r0 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x5) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x3f, r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) set_thread_area(&(0x7f0000000000)={0xfff, 0x101000, 0x400, 0x1, 0x8, 0x6, 0x3, 0x6, 0x5, 0x3}) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x3b, &(0x7f0000000140), &(0x7f0000000180)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x180, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x12c, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9d1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x410a95d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd76}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xf4f0, @mcast1, 0x8c6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4bd}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4000}, 0xc001) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) 14:36:54 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) 14:36:54 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40080000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x220, 0x1, 0xf, 0x100, 0x70bd25, 0x25dfdbff, {0xf, 0x0, 0x6}, [@typed={0xc, 0x1c, @u64=0x3}, @generic="73768232a5fc83d2ed2f4a73cf06efa76307ffd9185e22d85da806deeee76e0e09be443095e98941e463864b2db2af60eb16c92d6a8c6fe34effbcd2249f0f5967ddf4b3981487ce579ca48a836dbb3e09b63b54aa9bede3c2c95ad5601b77c2d104900d725f01ac82eeae8cab4343d5256684d427664e079b0a9d8b7a059fa7564a1b8b688c4d576f755876903b151a7167a533069107ae11afb6254f26f1b3efe687ad6865c76989204e6851323e9937d0109e42c1c535ffb317bca0ededf4ea0df7b40620c77177f37f43c1fd720940c1546645f9ee6541ab1c0b139393694c98c891579e6c11145f34907c59fc466d2e59831a36baefd7", @generic="eea021940bdfdd89df35a036a588bb7adc4bef093da616b649f32e52b7181aba3aba62b96fccd74cb7fb68cae9786a360f52724867878123de7396b80fd73344923b239d9bae8fb2f16aefec077626c89542af07420ba11b25271f2a45828c878ad62dd970d6a8aa439cd2ecc315f906e8879fe30420699ff2b43603385b57b2ef834b605657a8630a78f1be049608b39509e36821bde224278233e2f6912f6375", @generic="a01185c83a1eddc00888f4c2861dae071b07665f22fc4f2009d2070fa2f3eab1311f8f27fd1c679ef27210a414691a4087a4c8a6accd8a7a40cbec4ca01a19572fb97397ddc01a459933ac0b947fe1fc51e424fdf9043db6244d5095", @typed={0x8, 0x51, @ipv4=@dev={0xac, 0x14, 0x14, 0x1b}}]}, 0x220}, 0x1, 0x0, 0x0, 0x880}, 0x80) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 14:36:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40001, 0x0) sendto$inet(r1, &(0x7f0000000040)="a458bee1e77c9824a973673e3ebd89adbea03b6e9e17d3bbd48c64eab93efbce0d4fdd2a3e925f5599fc5c6ab539bb91b89dc1f84170c7a76ec20a2b960f4eaea04eeb752d487a4de0d28e63eacf35113c1e3f1085ba385bd73de7898f7db8ee0552f0e90ac8adef99ab92d8767d946994386fa8f1206292bb08c53b1d6b2121df", 0x81, 0x40, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) [ 412.015423][T23381] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 412.015438][T23381] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 412.032814][T23381] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 412.032824][T23381] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:36:54 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:36:54 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8080, 0x0) getsockname$netrom(r1, &(0x7f0000000040)={{}, [@bcast, @remote, @remote, @default, @netrom, @rose, @default, @null]}, &(0x7f00000000c0)=0x48) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:54 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200800, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r1, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6af}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x801}, 0x4000) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) 14:36:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x80009) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x20000) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x0, 0x1}}, 0x20) 14:36:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x103, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f00000000c0)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1, 0x5, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x3}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast1, @broadcast}, 0x10) 14:36:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000020000"], 0x2f) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 412.304255][T23501] FAULT_INJECTION: forcing a failure. [ 412.304255][T23501] name failslab, interval 1, probability 0, space 0, times 0 [ 412.370236][T23501] CPU: 0 PID: 23501 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 412.378309][T23501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.389866][T23501] Call Trace: [ 412.393188][T23501] dump_stack+0x172/0x1f0 [ 412.397545][T23501] should_fail.cold+0xa/0x15 [ 412.402159][T23501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 412.407990][T23501] ? ___might_sleep+0x163/0x280 [ 412.412870][T23501] __should_failslab+0x121/0x190 14:36:54 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x8200) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:54 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x8) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 14:36:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x2000000008400b) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x7f, 0xf0a, 0x5, 0x8, 0x0, 0x3, 0x4, 0x3, 0x401, 0x120000}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 412.417828][T23501] should_failslab+0x9/0x14 [ 412.422359][T23501] kmem_cache_alloc_trace+0x2d1/0x760 [ 412.427764][T23501] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 412.433595][T23501] __memcg_init_list_lru_node+0x8a/0x1e0 [ 412.439255][T23501] __list_lru_init+0x3cf/0x6e0 [ 412.444050][T23501] alloc_super+0x762/0x890 [ 412.448479][T23501] ? test_single_super+0x10/0x10 [ 412.453431][T23501] sget_userns+0xf1/0x560 [ 412.457789][T23501] ? kill_litter_super+0x60/0x60 [ 412.457807][T23501] ? test_single_super+0x10/0x10 [ 412.457820][T23501] ? kill_litter_super+0x60/0x60 14:36:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 412.457833][T23501] sget+0x10c/0x150 [ 412.457852][T23501] mount_bdev+0xff/0x3c0 14:36:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000020000"], 0x2f) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 412.457867][T23501] ? vfat_mount+0x40/0x40 [ 412.457887][T23501] vfat_mount+0x35/0x40 [ 412.457902][T23501] ? setup+0x120/0x120 [ 412.457917][T23501] legacy_get_tree+0xf2/0x200 [ 412.457935][T23501] vfs_get_tree+0x123/0x450 [ 412.457953][T23501] do_mount+0x1436/0x2c40 [ 412.457975][T23501] ? copy_mount_string+0x40/0x40 [ 412.458000][T23501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.458014][T23501] ? copy_mount_options+0x280/0x3a0 [ 412.458032][T23501] ksys_mount+0xdb/0x150 [ 412.458050][T23501] __x64_sys_mount+0xbe/0x150 [ 412.458070][T23501] do_syscall_64+0x103/0x610 [ 412.458091][T23501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.458104][T23501] RIP: 0033:0x45b81a [ 412.458119][T23501] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 412.458127][T23501] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 412.458143][T23501] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 412.458153][T23501] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 412.458162][T23501] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 412.458171][T23501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 412.458180][T23501] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:36:55 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:36:55 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'osx.', '/dev/dlm-control\x00'}, &(0x7f0000002500)=""/4096, 0x1000) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8000) sendmsg$nl_crypto(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44101}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delrng={0x10, 0x14, 0x801, 0x70bd2b, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) listen(r1, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm-control\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000014c0)={0x0, 0x1000, "8745a1da2b7156282c83c1e4428925dd975c169ffd8845948fc0e494994f058366a921946d4644c938be2bca61a89a0ad85e0eebc66d0ab4574379dc93712d032e35a6afbc945fcb31578caa8cbe8d34c5644706826ff1ff73e86e5a379e4aebf58397ef06b1e8a672b40d3849cd244685218602b9da5b66cba79c695d4a2fc2cfed07a1233833405e197afda3bd7a76deddbdee70d6a0e8509fa6e30b43ca0cfd17824f2f84e5ade65433a99e17bbc8a5dfdf0a19d4c1d45c718ba346406a8ca13a7031219b5e1a56f5c6002e93112b2b8d959eeb63f17f1dcd61b7281fd0bc1662705df769dcabe8868142e5e3c55c3790b6d551e1ac5627bfea37c4f104ea7c180c4a0d12ff7727f10dbf393c2f0742029575cdcf375674d40cac730450d2157538986bae622cdf0e60fd7f8736f49d5143ef5d00a5fea7971c2581743230c0220bb7cc8c0898e928435e191ddecbb1c775f5abe1ca10d44fc9d421421d59f91ec935ef515d9ff78c344f8e928709e7c0925fa2b65982b1841541671ed49355954fccd86a9a1cb445df5913de5f0a42708494042a213de975702da051c7738e7baac7219159170b20dd900ffda6659ba50eee669fb01735031b4c520e5295323a919f0b4c114d8325c536d1e4df5f13fd5bc536d4e06082eaf717c055e7424c75abc432d77784a7d9738e78b274f129d775a2c4885fdce5bbf4b99151943e2c0df9a22aef6ffbcb96d46b1574be727e540d7ac78ed899cca4bdf2b5deb0176eaf3c99a1a52e4b345c929cc141561dc7e3c043014625344a881e203c8abcfebfb75810d0b9536b1a39b7ea8aaa321468716b8b7c749fdad10c7b05190686651052a1a1660109f69495340b5e461fb4b60fbec7bd35e6ec60db21ce9e9315edb3085500a6e67f9240dc4e77ea0129adf263801639e31ff15f2d2272ca40e28d40e920402863f653957620fdec2d858cd7d5822c371290cc007a7b142e59e99be9339415a04f4623cc423b641a7655d7b6b83c4a7966b3dcf4208f238000a6ae4c1a9e7efe6a153f7afce79bd53bcbc61f09641c9ad3bfc8244ebd7ed143be7109ac26a426a9354630196592d14d1a3a1d0c171377ecc4cb6c57391aac80015facef862e1625a92f8f93a4eb86c60adba5034e27fc92244b199514bbbb91fd6c7f3841b7acdef20dbbcbca030401e6f48f768caaf17d0f7b2b05707cdc8f95ae2d75bb789d7cebc7cbdeccb541480dc967a5c86f719e577ecba042a70faf19352aeea729762061c5fbc0d9a156d587b33ff6f8b3014ce4272a5d02d0ec1c32eacffd1a4da3417b081aa28b3b90a90c9355b5decb21f373caa25e4b413f09867eaaa10b727e95b1885935ca09a7b663d05c7c9336ccfad1f7a7e284a383ef0aaa6d068415b513826722d479a202e00be81fd1aea3a91fa8ffb4eb2a87ec9cae5942cad185adf4eacbe801dfcc7c78a85a17189a8c44d6c16b4a4b66b7a124e24c74aeab235f893947f1328d0aff8bdf145c08b4bd03f6862c1986aa65416e09575151c781fe7417cc258c248c6e2f832744f5da05400cbad8c9b0855c55993f12018918b7996179db11ff7086f19a0113033aef82077616b86b88d18194f2607b79a43f6a149fe98cdb5e3c03e966cce018ea32a9709b55ab4e1ae1152b13d3476a9707c96c54b8ff60e2488d7a1e309a5b3b8997c1421b4c1596a8a542160e1de6f65745cd2bea0860d66aa9885fbe3c8e6969c8a7658212647a03689dbca416d8b17c391d4c8c12d4f6596ea5ac9cfc0eee1dbdf8d405e294454744e3e46e4bd24011d7069f733d75d5e816b57228862fc4f708983ec0eb4664160e266513928eab2d3bdc8bf98dae86b0802ef6fc9905b1f9258a13652d6880560e0aa53a2c2ffb87b32718360029012180a00c342960b56d6254be3c3b1ae20af6cf2da18cd46a9a00af7653ebf12e4256aa6fd35d1f199c90a35d2ce6324a1a1d06f2faae03896906a8b0a5a54b0f7457489ecd067fc7cb3cfd39eb0222ef19f794e7d24c1959a1df8862a91077191de517110763bdf741f9477ccfe304d15e241d0fcc5d0f17b42614ac09e62be24be9ee50df76c3af66c8e325aab5a8a27e7959a195e82b3692dfe9092a7dd23d1b593d246fe30dd1647e860173b76fd7c6458ad8976cf9293bc0fe73dd1f852081d7edf077c301b00c33ca7a6a159cc01728203bf1d3283a36769e4ac61920106ebdc48936700e22e1fa35ad83a16f3229336f38a1699f89c6af380c7a8802e12358ef158e5afddd9e31d2cf17ebeb53890e1d4f6676f3323b1b563f8a253df9ae876e7887b8a46ff7ded770e19d3657e5e47a8cbc480cca3cfc19dca41e18c05419a9e60657b7b8466dfd2fddbe2cf674b5c551f51f574648cab01405108e467b8727170f1741f35fe2eb433a72c0fd75737f572408ecd6aedb5ac057e0e375574fbf1e23d098ff9abb9d2a65756efc63dfdc4fcc591a02197a67cdb18513e4a668df2582add25de0037b3eb47998b352466d116bda7b149ad1d23e01d399b8654164ba72f2a783c0fc0319c0f3b62dc6c3eefc0d5eba58f5d95fb482caec066a9f88de787f3c9103dedb205c2b9424780b7969a00f228a5bfe46c2bf5797c9a0cfe00c34af58bd47bf843def0fcd4926073c5d61609a0fb5a5d1460d8dc0d4693e8145d5953beb3ad359172ad08a5307d5ed820a1664d2aad36ad1fe8f23e7d713da7626c2f906f0c60f7f0a0c9e6fce5fbfe41235533f6b6d85333006c04e7715c2fa7a56d4c5a99d89ed5020f3993d4bb4c9a4e381dcf40e583f2e2ca103531fe352b543228966513887a6892afe925d42bacd26590205436c42d0b084e353ab7eaa554b20e63e16b453d0d4742ddc3b4fb2719b07743c6866244e2c92b6996a58747529d1bd0de14da22106a5f7dd82503118820a5baad4a90d00ebd50217b413ce72d00d2020d9fe096a2a6d6b80c3411dc6a3b6cf71ece7069d2e68b07eb62fe94cade08608e200ba792f2f5d0f2ba778782ed8947d4532615d75304f2014f7b4216211a6437f1f3b5caa4ed7fc897a7219fed07261d81d20314be0f811cc5e23f2183845cde081ed726dc24d1b474c7ce0c64bc0b528d389070ceec1c8bd744e3e1013f1703d3d9d1e1b594a5c946428716d8810e0ffdc13128d1aa120abc33c82495279bbcb7f39dc648386e7ceaca09bc10e5e85802ddda5bf497f183b43481185dea06f02724901fca7f99819fd73c9ac9269b0ef2bb9645e1bf0b504535ec9b38f665728aba0970f29082919c17c7d62007f9868a1a482057bfc479ca17401b081a41747ff0e826ee839e1f303df278dd2279b88a6b08e7e0f14d360e9c4ca990196d3ec2a9c7f36e2bbf7ebc89bc4c8c17a58db20018d12e7949e73e51a6a20b19990805ff35514a2f6120f100413dbbb0780a334a10648b0b8778468f2f2568fd3503cf87a4bc56f59038b35fe3214a3944413a240440937631dfc53812b3883927f3966c299d55515c8051bd6afd920c99641844b2adef0c388ddd93abead59c3e33a1707e49ce122770e2ecd52e61cfd4d259d7dc9ff4c5b9ac245d26294c7fe2594ff37ea442e18ded820567e64c4490ef535a24fc14b1e0f5b1477ca9e723b0639dc7cda57f8583b69cef7414b8f8375af67dacc38137d280c6b76bf9feb67d1d0ef482ead030e5a89566e9b5bb386e78489cfbf07523ce5609e582b4773113e50dc778403abec4f23135b60d20e3eff391079c812ec7c254f5f3dc59685cf5ca57d4207330ac416efa5fe9c757c5b6e3a8d5fde2b16baaa25dd83d421fcdce07fac9fcc74b4317cb8a22f95a82500c0384296a8b476ed10327582ac129bac7645cd1b707467468ec474ccb004cd00d8b19bc438c9247629c0b93c39c1806448b67de0f578b5ed4d0250f3398e1fba9c015a4852c495f3eed63121e58a2ce9ddce120feb8c4c67a2e73e2699ad557d26f81e0743d906f6d653265e67925634874c9253bea90ca7b2748385e552ae523be34def0af4f91903fea6504094c54a4ff4e9443f50bffb4bd5ac0738cdfe70e7fead9408782c1c4a9ed268f379fb22895ace8acc6701eb55e2d46705bdb124006a0940d59ff360f1a281dd0ff0396566abdaa889f11a1695e7cbdda0c5151d37fe4a0047832f5161b764a6af1e1994a36d490fcec664f8adae050411a7489864872f3b1ddc888891667d6dc8973ff8edead4c1cd8b6f6dd9d9ce394b6d8df38796475b2d570806ba74dfdfec629d5d8137a5f1d8dabf378539c4cd18f4c800077d588329a6312c71b5f54249c86270f6957ba60dc21e987e24d56335891f71fc7f0f571922ef6963f6686a5f1c40d4b78dbbb7dd99eecffbf129d638885bed750b97bd31ae6c94858caf42323e16918c52ea318cec16702732ccf9375d911270ed71b2438bab59bd91a80f9b00cb2305e63697d836910bf46af450cdb8c30a18befc1e4c178610466a599e0578f9b75ddce6e398cef72ecabf9ac3289f73ae14ce85a6e09c6e4322015e8a7d8b2ce7ee274679ad4b918adbb826ff0262a501182c3d0917200349584c06304c84b887e840feb43fc8c9d8aba5c1de3fd7d53f32fe649cd3b90895bc391693cfd03ce99905d94f8e371c1ff65f727c5468be0c980e97831cee946a5d62bd98ee15d0a97fb41c24f8ddd7aee514e48beb6fc922a8392c245a83b02fcbf4a78176d13595b6ca9a7fcb81687d2ed7c2186e2c1c19865351f3800210178fb52d6397b8eca4a3f3eb8c36e79bba97d67fe8d052f9b293e79a3df621df05465853b28463466ee182fc5c3f90f24e41fcb741bcf17df21c23ee7a70df2d675f1bc85ce323ec4b56aa12bbc758bf3985caf03ff1b3ca349baaccf0d892e7fb2d7110db57edeac3a3fe12c4f7a097ba18cf0896587bfb13e59bbb4ef1da68dc28ad201a79fe852e5be6b60a70180c592b2cb30ceefda8b8f1f281d4543228ba7a2d82d0ce783d3cea0ca6ed8deecf9e7d8816b658e5ee74e7e30521d2be897dd75a06229a6efc617ae11e664a80e642186367ce4036ae3530aff03901816669146281ad222b68b70c7cfbf9b0caf18908992df2ee03c5bd2cfe26c8d7d48722f10eb6af7a0c899d502b442ace403995515382465760b9f421fc77143368130d6f8d18c9b132c2f0470e8ea80015b95e291bbc893ba3d542edf0d9167e2efa5644a966165dfdc5347fd7dacb135fae295989f201e43e116256ed68436a34ed45c5340c227e0745578686dc58dcee020f2dfa6a4738e8005ab015b0564fa2fa554bc0dea497249f01fa1c33948583e55c461dfeeed23c089dec58040322f72952c385cab884e7b50695d7d619a34b61f37a14f0aa6f4227520b6fb3878afc31f2a0db13934285cddc9b2e5db26c64486435fe5908843f6f158db7ea35864dc93e8e1f93b353f8be97762f632f01ca59120ed641c085f76a9ab57119cfb3b860aec21f2cfdc32bed5ec2054db4fff3f37d81648a0b18391822ace8af601863aa96f80fec715b280939a93e206ff20a16f921541804387b546b297332e82cb0448452d19c325a71388b0d8770a497e7ab292d07c2d5427a164b87d1cb5acd23773dde86ec8abad0e3b555427a9f2b06ee851b451cdc7577b9d83f21c3d279bcf4496780aceeab7e56e2dcad71efe742f13b5203019b951417bb24e896a473b3ea45770f79e212bf885e48fe14cc5be130ae1cb3c5bb6c4f1b50b161c8aeac8a478f648aef47985905ca501e34aa2722b64ac2a8726b0f3e"}, &(0x7f0000000540)=0x1008) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000580)={r4, 0x2}, &(0x7f00000005c0)=0x8) getsockopt$sock_cred(r1, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@ng={0x4, 0x11, "edc5b0945a60d53460acba2af3a4"}, 0x10, 0x1) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:55 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x80010, r0, 0x0) 14:36:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffffff73, 0x6, 0x0, 0x6, 0x1f, 0x14, "2920b313aedcd3afde0d0fd857c57ff098cd9c18f56aa9f9c2385487932e3dd189c1ff2ca2a36aef1b2f974107d8b1c3e653599ff8cd13c9a57543879ad21a2c", "3bfc78f99cdd1a273aabe7a58df1244c7a18d7e8295a72f2a27c6b8e081ba856b6ad30d890fe69c632c74b68b749a4c283478fbf109e422fe3da885a6fa8dac5", "7b507ff213308c61ff8d9ec21b1a8c7b51eb14f1c796e2fabbbfce28f39185ee", [0x5, 0x2]}) 14:36:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 412.976132][T23553] FAULT_INJECTION: forcing a failure. [ 412.976132][T23553] name failslab, interval 1, probability 0, space 0, times 0 [ 413.012262][T23553] CPU: 1 PID: 23553 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 413.020324][T23553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.030394][T23553] Call Trace: [ 413.033693][T23553] dump_stack+0x172/0x1f0 [ 413.038041][T23553] should_fail.cold+0xa/0x15 [ 413.042647][T23553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.048472][T23553] ? ___might_sleep+0x163/0x280 [ 413.053343][T23553] __should_failslab+0x121/0x190 [ 413.058303][T23553] should_failslab+0x9/0x14 [ 413.062826][T23553] kmem_cache_alloc_trace+0x2d1/0x760 [ 413.068228][T23553] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 413.074065][T23553] __memcg_init_list_lru_node+0x8a/0x1e0 [ 413.079720][T23553] __list_lru_init+0x3cf/0x6e0 [ 413.084507][T23553] alloc_super+0x762/0x890 [ 413.088939][T23553] ? test_single_super+0x10/0x10 [ 413.093894][T23553] sget_userns+0xf1/0x560 [ 413.098231][T23553] ? kill_litter_super+0x60/0x60 [ 413.103181][T23553] ? test_single_super+0x10/0x10 [ 413.108129][T23553] ? kill_litter_super+0x60/0x60 [ 413.113080][T23553] sget+0x10c/0x150 [ 413.116907][T23553] mount_bdev+0xff/0x3c0 [ 413.121159][T23553] ? vfat_mount+0x40/0x40 [ 413.125508][T23553] vfat_mount+0x35/0x40 [ 413.129709][T23553] ? setup+0x120/0x120 [ 413.133791][T23553] legacy_get_tree+0xf2/0x200 [ 413.138482][T23553] vfs_get_tree+0x123/0x450 [ 413.143002][T23553] do_mount+0x1436/0x2c40 [ 413.147352][T23553] ? copy_mount_string+0x40/0x40 [ 413.152316][T23553] ? _copy_from_user+0xdd/0x150 [ 413.157185][T23553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.163439][T23553] ? copy_mount_options+0x280/0x3a0 [ 413.168653][T23553] ksys_mount+0xdb/0x150 14:36:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00012abd7000b8cfa2464d8b18dddbdf250e09005d5d6f3ec990e2ca08000100058110fb84642635c54fa4000c000900080ede0d05c74e7bd2a3e90dd88a7c1dc91a01ab85c520891228b3b42f114695a026f9867b2d4b17d51fe3ebe4a71b8148e82db1"], 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0xf}, r2}, 0x14) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'sit0\x00', 0x8000}) [ 413.172908][T23553] __x64_sys_mount+0xbe/0x150 [ 413.177596][T23553] do_syscall_64+0x103/0x610 [ 413.182199][T23553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.188193][T23553] RIP: 0033:0x45b81a [ 413.192093][T23553] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 413.192103][T23553] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:36:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:36:55 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000200)={r2, &(0x7f0000000180)=""/66}) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3ff, 0xb8000) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000040)=0x8, 0x4) rt_sigsuspend(&(0x7f0000000080)={0x401}, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200400, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x501, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x104c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4880) 14:36:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r2, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xb5}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x10) syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:55 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) r1 = open(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200000, 0x69) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000240)) setxattr(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000080)=',posix_acl_accesssystem\x00', 0x18, 0x2) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) [ 413.192118][T23553] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 413.192128][T23553] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 413.192136][T23553] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 413.192144][T23553] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 413.192152][T23553] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:36:55 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:36:55 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:36:55 executing program 3: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) clone(0x2502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f00000000c0)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'\x00\x00\xf6\x8c\x00\x00\x00\x00\x9bU\x00\x00\xc5\xcb\x00'}) 14:36:55 executing program 4: syz_init_net_socket$rose(0xb, 0x5, 0x0) keyctl$join(0x1, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 14:36:55 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) socket$unix(0x1, 0x6, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', '\xe9\x1fq\x89Y\x1e\x923aK', [{0x20, 'ppp0\\{'}, {}, {0x20, 'em0+'}, {0x20, '{vboxnet0'}], 0xa, "d643c2b1a7a2d68dbaa59dae9a7589ced2283099b3b6df0174834d2277020aa14d0990ae3f93cfac"}, 0x4d) 14:36:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000400)={r1, 0x1, 0x4000, 0xfffff000}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000540)=0x4, 0x6f) r2 = syz_open_dev$radio(&(0x7f0000000440)='/dev/radio#\x00', 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000004c0)={0x0, 0x9, 0x4, 0x0, {r3, r4/1000+10000}, {0x3, 0x1, 0x1, 0x8000, 0x52, 0x1, "f7dca464"}, 0x4, 0x0, @userptr=0x40, 0x4}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() getgroups(0x2, &(0x7f00000001c0)=[0xee01, 0x0]) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getgroups(0x9, &(0x7f0000000340)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r5, @ANYBLOB="040006000000000008000600", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="efff0000", @ANYRES32=r10, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="10000200000000002000060000000000"], 0x5c, 0x2) 14:36:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 14:36:55 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffff, 0x40000) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000040)={0x4, 0x7aa, {0x57, 0x4a, 0x3, {0x8000, 0x6}, {0x18, 0x7fff}, @const={0x4, {0xb4b0, 0x7, 0x6, 0x68}}}, {0x55, 0x7, 0x100000001, {0x38, 0x1000}, {0x4, 0x8}, @ramp={0x7fff, 0x744e, {0x5, 0xffffffff, 0x8, 0x7}}}}) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 413.594165][T23592] FAULT_INJECTION: forcing a failure. [ 413.594165][T23592] name failslab, interval 1, probability 0, space 0, times 0 [ 413.651089][T23592] CPU: 0 PID: 23592 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 413.659215][T23592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.669285][T23592] Call Trace: [ 413.672700][T23592] dump_stack+0x172/0x1f0 [ 413.677052][T23592] should_fail.cold+0xa/0x15 [ 413.681753][T23592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.687584][T23592] ? ___might_sleep+0x163/0x280 [ 413.692453][T23592] __should_failslab+0x121/0x190 [ 413.697410][T23592] should_failslab+0x9/0x14 [ 413.702018][T23592] kmem_cache_alloc_trace+0x2d1/0x760 [ 413.707436][T23592] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 413.713270][T23592] __memcg_init_list_lru_node+0x8a/0x1e0 [ 413.718937][T23592] __list_lru_init+0x3cf/0x6e0 [ 413.723723][T23592] alloc_super+0x762/0x890 [ 413.728158][T23592] ? test_single_super+0x10/0x10 [ 413.733111][T23592] sget_userns+0xf1/0x560 [ 413.737464][T23592] ? kill_litter_super+0x60/0x60 [ 413.742423][T23592] ? test_single_super+0x10/0x10 [ 413.747385][T23592] ? kill_litter_super+0x60/0x60 [ 413.752425][T23592] sget+0x10c/0x150 [ 413.756246][T23592] mount_bdev+0xff/0x3c0 [ 413.760500][T23592] ? vfat_mount+0x40/0x40 [ 413.764849][T23592] vfat_mount+0x35/0x40 [ 413.769106][T23592] ? setup+0x120/0x120 [ 413.773185][T23592] legacy_get_tree+0xf2/0x200 [ 413.777877][T23592] vfs_get_tree+0x123/0x450 [ 413.782402][T23592] do_mount+0x1436/0x2c40 [ 413.786759][T23592] ? copy_mount_string+0x40/0x40 [ 413.791724][T23592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.797988][T23592] ? copy_mount_options+0x280/0x3a0 [ 413.803207][T23592] ksys_mount+0xdb/0x150 [ 413.807463][T23592] __x64_sys_mount+0xbe/0x150 [ 413.812153][T23592] do_syscall_64+0x103/0x610 [ 413.816757][T23592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.822649][T23592] RIP: 0033:0x45b81a [ 413.826550][T23592] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:36:56 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) mmap(&(0x7f0000c2b000/0x2000)=nil, 0x2000, 0x2000005, 0x4f42e503b690ff94, r0, 0x0) listen(r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480)={0x0}, &(0x7f0000000180)=0xc) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40200, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000003c0)={0x6, 0x100000001, 0x3, 0x9, 0x1b, 0x4ca8a5b, 0x42, 0x4, 0x10001, 0x10001}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) setxattr$security_evm(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@sha1={0x1, "da12c893fb6032247c17c75202a5a39349520f38"}, 0x15, 0x1) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f00000002c0)=r1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80020010}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="030b0b5a39389f2cb57c56a3630734169eeb4d36b071dce204", @ANYRES16=r4, @ANYBLOB="100a2abd7000d6fbdbdf250b00000008000500b1010400000400020008000400590000000801000000230057f7c0b890f75bd9ab38741388e569e5108df28f9e200d13a3089611b5aa7b31cb2e9709bbf42da22c4994d8b56569e87bc58ab5e0fc6913af78d5ecb38e8b84872f96021c8ad37ae16743abf5e37128f1161d9d64f9f4878843ef1d98fede3ff4088945797357ad984de0784acd1483227c70b38d5e47677baf5e25ff1e4fff67ca4e4527420f3e5e7441831f6cd63f683ed4731ee79f607b63771afe622f0f548192018613a764147acd76b9a09cb6cdedee79082af383b319a7288d4163f5ad6cccc0dc515d00a86e230d0a67d27c512d835c44fd0035452b963232"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) bind$alg(r5, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) connect$nfc_llcp(r2, &(0x7f0000000240)={0x27, 0x0, 0x2, 0x3, 0x6, 0x4, "80ce7a5fbbcbbaf4cb2e03d87821c64f6d84efce433bff054bba7c8ae6c39a60336191f801f535bd7ea6867b906351f15cc63e5dca050c3ce31ea76a637b65", 0x24}, 0x60) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xa) 14:36:56 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x10842) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="d600000001c0b17d75d0267c4f3a8c4243c850e5a93aa91b0636a4e42bdfdc57f50050fa34e712a7f7fc6c07e9ffda5295b7c4f2ded988fef105a6ca335aa3896de18426f0cc759da5c3312a65454571798a80f2ea04aa69f809440564d78c9a42bb4cd0176bf23600846c074fae6558be79a7b6701a7b923eb168d186d29683ecf4d452ee06e7ff4aa239b21b74fdfc418ecfa8cc83a3369c04d80b56b0376612d06b653fe5b28721db8b11f347b7d40a9ba9ffd544c260ac14417987e9fdd1eec3f3b5305eda0ff938f9989d686da104ccd181beec10bd2b94"], &(0x7f0000000140)=0xde) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000240)={r1, @in={{0x2, 0x4e23, @local}}}, 0x84) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000340)=@raw=[@generic={0x6, 0x20, 0x1, 0x80000001, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0x8, 0x7}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xb6, &(0x7f00000003c0)=""/182, 0x40f00, 0x1, [], 0x0, 0xf, r0, 0x8, &(0x7f0000000480)={0x1, 0x1ff}, 0x8, 0x10, 0x0}, 0x70) r2 = socket$unix(0x1, 0x0, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000300)={0xf, 0x1f, 0x1, 0xa9}, 0xf) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) 14:36:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 413.846187][T23592] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 413.854613][T23592] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 413.862645][T23592] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 413.870645][T23592] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 413.870654][T23592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 413.870661][T23592] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:36:56 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:36:56 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5c00000000000000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x7ff, 0x4, [0x9]}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:36:56 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8925, &(0x7f0000000000)={'veth0_to_team\x00', @ifru_flags=0xb000}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000180)=0xc) 14:36:56 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) socket$rxrpc(0x21, 0x2, 0xa) 14:36:56 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:36:56 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) getsockopt$rose(r1, 0x104, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 414.094376][T23621] FAULT_INJECTION: forcing a failure. [ 414.094376][T23621] name failslab, interval 1, probability 0, space 0, times 0 [ 414.152010][T23621] CPU: 1 PID: 23621 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 414.160049][T23621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.170128][T23621] Call Trace: [ 414.173456][T23621] dump_stack+0x172/0x1f0 [ 414.177810][T23621] should_fail.cold+0xa/0x15 [ 414.182432][T23621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.188257][T23621] ? ___might_sleep+0x163/0x280 [ 414.193138][T23621] __should_failslab+0x121/0x190 [ 414.198094][T23621] should_failslab+0x9/0x14 [ 414.202610][T23621] kmem_cache_alloc_trace+0x2d1/0x760 [ 414.208004][T23621] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 414.213845][T23621] __memcg_init_list_lru_node+0x8a/0x1e0 [ 414.219502][T23621] __list_lru_init+0x3cf/0x6e0 [ 414.224285][T23621] alloc_super+0x762/0x890 [ 414.228718][T23621] ? test_single_super+0x10/0x10 [ 414.233668][T23621] sget_userns+0xf1/0x560 [ 414.238009][T23621] ? kill_litter_super+0x60/0x60 [ 414.242960][T23621] ? test_single_super+0x10/0x10 [ 414.247912][T23621] ? kill_litter_super+0x60/0x60 [ 414.252871][T23621] sget+0x10c/0x150 [ 414.256700][T23621] mount_bdev+0xff/0x3c0 [ 414.260953][T23621] ? vfat_mount+0x40/0x40 [ 414.265316][T23621] vfat_mount+0x35/0x40 [ 414.269486][T23621] ? setup+0x120/0x120 [ 414.273574][T23621] legacy_get_tree+0xf2/0x200 [ 414.278354][T23621] vfs_get_tree+0x123/0x450 [ 414.282878][T23621] do_mount+0x1436/0x2c40 [ 414.287226][T23621] ? copy_mount_string+0x40/0x40 [ 414.287245][T23621] ? _copy_from_user+0xdd/0x150 [ 414.287267][T23621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.287282][T23621] ? copy_mount_options+0x280/0x3a0 [ 414.287311][T23621] ksys_mount+0xdb/0x150 [ 414.287331][T23621] __x64_sys_mount+0xbe/0x150 [ 414.317444][T23621] do_syscall_64+0x103/0x610 [ 414.322054][T23621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.322069][T23621] RIP: 0033:0x45b81a [ 414.322084][T23621] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.322093][T23621] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 414.322107][T23621] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 414.322115][T23621] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 414.322124][T23621] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 414.322133][T23621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 414.322141][T23621] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 [ 416.033088][ T2996] Bluetooth: hci0: command 0x1003 tx timeout [ 416.040146][ T1174] Bluetooth: hci0: sending frame failed (-49) [ 416.752685][ T2996] Bluetooth: hci1: command 0x1003 tx timeout [ 416.758831][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 418.112065][ T2996] Bluetooth: hci0: command 0x1001 tx timeout [ 418.118193][ T1174] Bluetooth: hci0: sending frame failed (-49) [ 418.831963][ T2996] Bluetooth: hci1: command 0x1001 tx timeout [ 418.838099][ T1174] Bluetooth: hci1: sending frame failed (-49) [ 420.192051][ T2996] Bluetooth: hci0: command 0x1009 tx timeout [ 420.911905][ T2996] Bluetooth: hci1: command 0x1009 tx timeout 14:37:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) 14:37:07 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in6={0xa, 0x4e23, 0x0, @mcast1, 0x2}}}, 0x90) listen(r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x3b, &(0x7f0000001480), &(0x7f0000000240)=0xc) 14:37:07 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:07 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$KIOCSOUND(r1, 0x4b2f, 0x2000000000000025) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:07 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 424.993095][T23741] FAULT_INJECTION: forcing a failure. [ 424.993095][T23741] name failslab, interval 1, probability 0, space 0, times 0 [ 425.058027][T23741] CPU: 1 PID: 23741 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 425.066065][T23741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.076145][T23741] Call Trace: [ 425.079467][T23741] dump_stack+0x172/0x1f0 [ 425.083884][T23741] should_fail.cold+0xa/0x15 [ 425.083910][T23741] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 425.083935][T23741] ? ___might_sleep+0x163/0x280 [ 425.094384][T23741] __should_failslab+0x121/0x190 [ 425.094402][T23741] should_failslab+0x9/0x14 [ 425.094419][T23741] kmem_cache_alloc_trace+0x2d1/0x760 [ 425.094437][T23741] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 425.094459][T23741] __memcg_init_list_lru_node+0x8a/0x1e0 [ 425.094480][T23741] __list_lru_init+0x3cf/0x6e0 [ 425.125788][T23741] alloc_super+0x762/0x890 [ 425.125805][T23741] ? test_single_super+0x10/0x10 [ 425.125832][T23741] sget_userns+0xf1/0x560 [ 425.125850][T23741] ? kill_litter_super+0x60/0x60 [ 425.125865][T23741] ? test_single_super+0x10/0x10 [ 425.125877][T23741] ? kill_litter_super+0x60/0x60 [ 425.125892][T23741] sget+0x10c/0x150 [ 425.135496][T23741] mount_bdev+0xff/0x3c0 [ 425.135513][T23741] ? vfat_mount+0x40/0x40 [ 425.155166][T23741] vfat_mount+0x35/0x40 [ 425.155183][T23741] ? setup+0x120/0x120 [ 425.155202][T23741] legacy_get_tree+0xf2/0x200 [ 425.163955][T23741] vfs_get_tree+0x123/0x450 [ 425.163979][T23741] do_mount+0x1436/0x2c40 [ 425.185388][T23741] ? copy_mount_string+0x40/0x40 [ 425.185406][T23741] ? _copy_from_user+0xdd/0x150 14:37:07 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'team_slave_1\x00', 0xc8}) 14:37:07 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x1) bind$isdn(r0, &(0x7f0000000040)={0x22, 0x8, 0x5, 0x1, 0x401}, 0x6) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r2 = syz_open_dev$vbi(0x0, 0x2, 0x2) openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000080)=0x8, 0x4) [ 425.185427][T23741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.185439][T23741] ? copy_mount_options+0x280/0x3a0 [ 425.185465][T23741] ksys_mount+0xdb/0x150 [ 425.185483][T23741] __x64_sys_mount+0xbe/0x150 [ 425.199495][T23741] do_syscall_64+0x103/0x610 [ 425.199519][T23741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.215769][T23741] RIP: 0033:0x45b81a 14:37:07 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 425.215786][T23741] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 425.215794][T23741] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 425.224713][T23741] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 425.224722][T23741] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 425.224730][T23741] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 14:37:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3008010, &(0x7f0000001540)={[{@flush_merge='flush_merge'}, {@noquota='noquota'}, {@heap='heap'}, {@fsync_mode_strict='fsync_mode=strict'}], [{@fowner_gt={'fowner>'}}]}) [ 425.224739][T23741] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 425.224747][T23741] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:07 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0x0, 0x2) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0xb0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8000, 0x8001) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000180)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x202000, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xe13}}, {@mode={'mode', 0x3d, 0x10001}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1ff}}, {@mode={'mode'}}], [{@dont_measure='dont_measure'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@audit='audit'}, {@euid_gt={'euid>', r2}}, {@measure='measure'}, {@fsname={'fsname', 0x3d, '\\ppp0['}}, {@fowner_lt={'fowner<', r3}}, {@subj_role={'subj_role', 0x3d, 'lo'}}, {@context={'context', 0x3d, 'root'}}]}) 14:37:07 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 425.422790][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 425.485467][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 425.503101][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 425.538070][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 425.603140][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 425.629535][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 425.644271][T23764] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 425.655079][T23764] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 427.402030][ T7858] Bluetooth: hci0: command 0x1003 tx timeout [ 427.408606][T10396] Bluetooth: hci0: sending frame failed (-49) [ 429.471950][ T3257] Bluetooth: hci0: command 0x1001 tx timeout [ 429.478076][T10396] Bluetooth: hci0: sending frame failed (-49) [ 431.551884][ T3257] Bluetooth: hci0: command 0x1009 tx timeout 14:37:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x36959cf800000000, @loopback, 0xe000000}], 0x1c) 14:37:18 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e22, 0x3, @mcast2, 0xb0}}, 0x8, 0xfe8}, 0x90) 14:37:18 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:18 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000080)=""/80, 0x50}, {&(0x7f0000000100)=""/148, 0x94}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f0000000240)=""/185, 0xb9}], 0x5, 0x0) [ 435.886924][T23781] FAULT_INJECTION: forcing a failure. [ 435.886924][T23781] name failslab, interval 1, probability 0, space 0, times 0 [ 435.940418][T23781] CPU: 0 PID: 23781 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 435.948446][T23781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.958518][T23781] Call Trace: [ 435.961830][T23781] dump_stack+0x172/0x1f0 [ 435.966182][T23781] should_fail.cold+0xa/0x15 [ 435.970791][T23781] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 435.976620][T23781] ? ___might_sleep+0x163/0x280 [ 435.976643][T23781] __should_failslab+0x121/0x190 [ 435.976660][T23781] should_failslab+0x9/0x14 [ 435.976682][T23781] kmem_cache_alloc_trace+0x2d1/0x760 [ 435.986482][T23781] __memcg_init_list_lru_node+0x8a/0x1e0 [ 435.986508][T23781] __list_lru_init+0x3cf/0x6e0 [ 436.006760][T23781] alloc_super+0x762/0x890 [ 436.011188][T23781] ? test_single_super+0x10/0x10 [ 436.016138][T23781] sget_userns+0xf1/0x560 [ 436.020472][T23781] ? kill_litter_super+0x60/0x60 [ 436.025422][T23781] ? test_single_super+0x10/0x10 [ 436.030393][T23781] ? kill_litter_super+0x60/0x60 [ 436.035349][T23781] sget+0x10c/0x150 [ 436.039175][T23781] mount_bdev+0xff/0x3c0 [ 436.043425][T23781] ? vfat_mount+0x40/0x40 [ 436.047765][T23781] vfat_mount+0x35/0x40 [ 436.051928][T23781] ? setup+0x120/0x120 [ 436.056167][T23781] legacy_get_tree+0xf2/0x200 [ 436.060852][T23781] vfs_get_tree+0x123/0x450 [ 436.065372][T23781] do_mount+0x1436/0x2c40 [ 436.069715][T23781] ? copy_mount_string+0x40/0x40 [ 436.074666][T23781] ? _copy_from_user+0xdd/0x150 [ 436.079526][T23781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.085771][T23781] ? copy_mount_options+0x280/0x3a0 [ 436.090977][T23781] ksys_mount+0xdb/0x150 [ 436.095227][T23781] __x64_sys_mount+0xbe/0x150 [ 436.099913][T23781] do_syscall_64+0x103/0x610 [ 436.104515][T23781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.110410][T23781] RIP: 0033:0x45b81a [ 436.114315][T23781] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:37:18 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000180)=0x32) 14:37:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 436.133929][T23781] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.142345][T23781] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 436.150330][T23781] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 436.158316][T23781] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 436.166330][T23781] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 436.174316][T23781] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:18 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r2 = geteuid() fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x207389c05f619ed0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:18 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:18 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:18 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28) 14:37:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="eb7fc86d4f66732ee6617400020441", 0xf}], 0x0, 0x0) 14:37:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ff8000/0x4000)=nil, 0x1, 0x3, 0x10, &(0x7f0000ffb000/0x2000)=nil, 0x2}) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) [ 436.465462][T23806] FAULT_INJECTION: forcing a failure. [ 436.465462][T23806] name failslab, interval 1, probability 0, space 0, times 0 [ 436.531201][T23806] CPU: 0 PID: 23806 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 436.539227][T23806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.549286][T23806] Call Trace: [ 436.552602][T23806] dump_stack+0x172/0x1f0 [ 436.556953][T23806] should_fail.cold+0xa/0x15 [ 436.561556][T23806] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 436.567380][T23806] ? ___might_sleep+0x163/0x280 [ 436.572246][T23806] __should_failslab+0x121/0x190 [ 436.577192][T23806] should_failslab+0x9/0x14 [ 436.581700][T23806] kmem_cache_alloc_trace+0x2d1/0x760 [ 436.587082][T23806] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 436.592904][T23806] __memcg_init_list_lru_node+0x8a/0x1e0 [ 436.598549][T23806] __list_lru_init+0x3cf/0x6e0 [ 436.603332][T23806] alloc_super+0x762/0x890 [ 436.607761][T23806] ? test_single_super+0x10/0x10 [ 436.612705][T23806] sget_userns+0xf1/0x560 [ 436.617036][T23806] ? kill_litter_super+0x60/0x60 [ 436.621980][T23806] ? test_single_super+0x10/0x10 [ 436.626920][T23806] ? kill_litter_super+0x60/0x60 [ 436.631858][T23806] sget+0x10c/0x150 [ 436.635677][T23806] mount_bdev+0xff/0x3c0 [ 436.639921][T23806] ? vfat_mount+0x40/0x40 [ 436.644260][T23806] vfat_mount+0x35/0x40 [ 436.648422][T23806] ? setup+0x120/0x120 [ 436.652493][T23806] legacy_get_tree+0xf2/0x200 [ 436.657181][T23806] vfs_get_tree+0x123/0x450 [ 436.661689][T23806] do_mount+0x1436/0x2c40 [ 436.666032][T23806] ? copy_mount_string+0x40/0x40 [ 436.670976][T23806] ? _copy_from_user+0xdd/0x150 [ 436.675840][T23806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.682084][T23806] ? copy_mount_options+0x280/0x3a0 [ 436.687289][T23806] ksys_mount+0xdb/0x150 [ 436.691547][T23806] __x64_sys_mount+0xbe/0x150 [ 436.696234][T23806] do_syscall_64+0x103/0x610 [ 436.700833][T23806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.706729][T23806] RIP: 0033:0x45b81a [ 436.710627][T23806] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:37:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[0x1508, 0xddf]}) r2 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000001c0)=""/160, &(0x7f0000000280)=0xa0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f00000000c0)={0x401, 0x4, 0x3, {0xd, @sdr={0x0, 0x8}}}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000002c0)={@multicast2, @broadcast}, 0x8) 14:37:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 436.730237][T23806] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 436.738653][T23806] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 436.746625][T23806] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 436.754598][T23806] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 436.762573][T23806] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 436.770544][T23806] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:19 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28) 14:37:19 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20002102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000600)="410f01f964ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc8fa97812ca6f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x2}, 0x20) getsockopt$bt_hci(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)) [ 436.822175][T23810] FAT-fs (loop3): bogus number of FAT structure [ 436.829572][T23810] FAT-fs (loop3): Can't find a valid FAT filesystem 14:37:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1e) fchmod(r0, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xb) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 436.916479][T23827] FAT-fs (loop3): bogus number of FAT structure 14:37:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 436.959080][T23827] FAT-fs (loop3): Can't find a valid FAT filesystem 14:37:19 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28) 14:37:19 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") syz_execute_func(&(0x7f0000000280)="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") 14:37:19 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x1, 0x1, 0x4, 0x0, 0x0, "521d5de14507cb944b470bacab31fcf33d8455f0f53475b4aa77e06fb52b954701f56c476001c3e2f3f584060f4fc5bd6f9fe3a7dbe09d78cd4b183d159351", 0x13}, 0x60) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 14:37:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r1, 0x80000000000000bd) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) recvfrom$ax25(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 14:37:19 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x0, 0x0, 0xfffffffffffffff6}}, 0x28) [ 437.196176][T23848] FAULT_INJECTION: forcing a failure. [ 437.196176][T23848] name failslab, interval 1, probability 0, space 0, times 0 [ 437.283729][T23848] CPU: 1 PID: 23848 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 437.291773][T23848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.301840][T23848] Call Trace: [ 437.305159][T23848] dump_stack+0x172/0x1f0 [ 437.309511][T23848] should_fail.cold+0xa/0x15 [ 437.314113][T23848] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 437.319938][T23848] ? ___might_sleep+0x163/0x280 [ 437.324806][T23848] __should_failslab+0x121/0x190 [ 437.329747][T23848] should_failslab+0x9/0x14 [ 437.329766][T23848] kmem_cache_alloc_trace+0x2d1/0x760 [ 437.329786][T23848] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 437.329812][T23848] __memcg_init_list_lru_node+0x8a/0x1e0 [ 437.329837][T23848] __list_lru_init+0x3cf/0x6e0 [ 437.351138][T23848] alloc_super+0x762/0x890 [ 437.351156][T23848] ? test_single_super+0x10/0x10 [ 437.351174][T23848] sget_userns+0xf1/0x560 [ 437.351189][T23848] ? kill_litter_super+0x60/0x60 [ 437.351213][T23848] ? test_single_super+0x10/0x10 [ 437.379483][T23848] ? kill_litter_super+0x60/0x60 [ 437.384432][T23848] sget+0x10c/0x150 [ 437.388254][T23848] mount_bdev+0xff/0x3c0 [ 437.392507][T23848] ? vfat_mount+0x40/0x40 [ 437.396848][T23848] vfat_mount+0x35/0x40 [ 437.401016][T23848] ? setup+0x120/0x120 [ 437.405094][T23848] legacy_get_tree+0xf2/0x200 [ 437.409778][T23848] vfs_get_tree+0x123/0x450 [ 437.414288][T23848] do_mount+0x1436/0x2c40 [ 437.418642][T23848] ? copy_mount_string+0x40/0x40 [ 437.423596][T23848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:37:19 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 437.429849][T23848] ? copy_mount_options+0x280/0x3a0 [ 437.435075][T23848] ksys_mount+0xdb/0x150 [ 437.439339][T23848] __x64_sys_mount+0xbe/0x150 [ 437.444027][T23848] do_syscall_64+0x103/0x610 [ 437.448627][T23848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.454522][T23848] RIP: 0033:0x45b81a [ 437.458420][T23848] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:37:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 437.478038][T23848] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 437.486465][T23848] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 437.494442][T23848] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 437.502509][T23848] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 437.510492][T23848] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 437.518469][T23848] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:19 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) fanotify_mark(r1, 0x80, 0x1, r1, &(0x7f0000000040)='\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x82000, 0x0) 14:37:19 executing program 3: 14:37:19 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:20 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:20 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0) 14:37:20 executing program 3: 14:37:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 437.844666][T23888] FAULT_INJECTION: forcing a failure. [ 437.844666][T23888] name failslab, interval 1, probability 0, space 0, times 0 [ 437.894360][T23888] CPU: 0 PID: 23888 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 437.902389][T23888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.912458][T23888] Call Trace: [ 437.915770][T23888] dump_stack+0x172/0x1f0 [ 437.920121][T23888] should_fail.cold+0xa/0x15 [ 437.920151][T23888] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 437.930542][T23888] ? ___might_sleep+0x163/0x280 [ 437.930569][T23888] __should_failslab+0x121/0x190 [ 437.940362][T23888] should_failslab+0x9/0x14 [ 437.940388][T23888] kmem_cache_alloc_trace+0x2d1/0x760 [ 437.950246][T23888] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 437.950278][T23888] __memcg_init_list_lru_node+0x8a/0x1e0 [ 437.961712][T23888] __list_lru_init+0x3cf/0x6e0 [ 437.966494][T23888] alloc_super+0x762/0x890 [ 437.970921][T23888] ? test_single_super+0x10/0x10 [ 437.975864][T23888] sget_userns+0xf1/0x560 [ 437.980196][T23888] ? kill_litter_super+0x60/0x60 [ 437.985137][T23888] ? test_single_super+0x10/0x10 [ 437.990077][T23888] ? kill_litter_super+0x60/0x60 [ 437.995018][T23888] sget+0x10c/0x150 [ 437.998836][T23888] mount_bdev+0xff/0x3c0 [ 438.003080][T23888] ? vfat_mount+0x40/0x40 [ 438.007419][T23888] vfat_mount+0x35/0x40 [ 438.011578][T23888] ? setup+0x120/0x120 [ 438.015650][T23888] legacy_get_tree+0xf2/0x200 [ 438.020345][T23888] vfs_get_tree+0x123/0x450 [ 438.024868][T23888] do_mount+0x1436/0x2c40 [ 438.029208][T23888] ? copy_mount_string+0x40/0x40 [ 438.034161][T23888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.040404][T23888] ? copy_mount_options+0x280/0x3a0 [ 438.045611][T23888] ksys_mount+0xdb/0x150 [ 438.049860][T23888] __x64_sys_mount+0xbe/0x150 [ 438.054550][T23888] do_syscall_64+0x103/0x610 [ 438.059153][T23888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.065046][T23888] RIP: 0033:0x45b81a [ 438.068944][T23888] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 438.088556][T23888] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.096996][T23888] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 438.104973][T23888] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 438.112945][T23888] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 438.120916][T23888] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 438.128892][T23888] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:20 executing program 4: 14:37:20 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:20 executing program 3: 14:37:20 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0) 14:37:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:20 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:20 executing program 3: 14:37:20 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14) 14:37:20 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0) 14:37:20 executing program 4: 14:37:20 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 438.363956][T23905] FAULT_INJECTION: forcing a failure. [ 438.363956][T23905] name failslab, interval 1, probability 0, space 0, times 0 [ 438.424371][T23905] CPU: 1 PID: 23905 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 438.432395][T23905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.442635][T23905] Call Trace: [ 438.442664][T23905] dump_stack+0x172/0x1f0 [ 438.442690][T23905] should_fail.cold+0xa/0x15 [ 438.442715][T23905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 438.442742][T23905] ? ___might_sleep+0x163/0x280 [ 438.442764][T23905] __should_failslab+0x121/0x190 [ 438.442783][T23905] should_failslab+0x9/0x14 [ 438.442809][T23905] kmem_cache_alloc_trace+0x2d1/0x760 [ 438.442830][T23905] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 438.486536][T23905] __memcg_init_list_lru_node+0x8a/0x1e0 [ 438.492189][T23905] __list_lru_init+0x3cf/0x6e0 [ 438.497055][T23905] alloc_super+0x762/0x890 [ 438.501485][T23905] ? test_single_super+0x10/0x10 [ 438.506442][T23905] sget_userns+0xf1/0x560 [ 438.510781][T23905] ? kill_litter_super+0x60/0x60 [ 438.515729][T23905] ? test_single_super+0x10/0x10 14:37:20 executing program 3: 14:37:20 executing program 4: 14:37:20 executing program 3: [ 438.520665][T23905] ? kill_litter_super+0x60/0x60 [ 438.520681][T23905] sget+0x10c/0x150 [ 438.520701][T23905] mount_bdev+0xff/0x3c0 [ 438.520716][T23905] ? vfat_mount+0x40/0x40 [ 438.520736][T23905] vfat_mount+0x35/0x40 [ 438.542156][T23905] ? setup+0x120/0x120 [ 438.546240][T23905] legacy_get_tree+0xf2/0x200 [ 438.550928][T23905] vfs_get_tree+0x123/0x450 [ 438.555448][T23905] do_mount+0x1436/0x2c40 [ 438.559798][T23905] ? copy_mount_string+0x40/0x40 [ 438.564755][T23905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:37:20 executing program 4: [ 438.571002][T23905] ? copy_mount_options+0x280/0x3a0 [ 438.576211][T23905] ksys_mount+0xdb/0x150 [ 438.580461][T23905] __x64_sys_mount+0xbe/0x150 [ 438.585144][T23905] do_syscall_64+0x103/0x610 [ 438.585166][T23905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.585179][T23905] RIP: 0033:0x45b81a [ 438.585196][T23905] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:37:21 executing program 3: [ 438.585205][T23905] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 438.585219][T23905] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 438.585228][T23905] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 438.585237][T23905] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 438.585247][T23905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 438.585256][T23905] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:21 executing program 4: [ 438.672602][T23919] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:21 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:21 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$rose(0xb, 0x5, 0x0) setuid(r1) 14:37:21 executing program 3: 14:37:21 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:21 executing program 4: 14:37:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:21 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:21 executing program 3: 14:37:21 executing program 4: 14:37:21 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0xf17, 0x8000, 0x100000001, 0x200, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r2, 0x8000}, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 438.976863][T23935] FAULT_INJECTION: forcing a failure. [ 438.976863][T23935] name failslab, interval 1, probability 0, space 0, times 0 [ 439.041932][T23935] CPU: 1 PID: 23935 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 439.050009][T23935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.060078][T23935] Call Trace: [ 439.063387][T23935] dump_stack+0x172/0x1f0 [ 439.067772][T23935] should_fail.cold+0xa/0x15 [ 439.072388][T23935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 439.078215][T23935] ? ___might_sleep+0x163/0x280 [ 439.083082][T23935] __should_failslab+0x121/0x190 14:37:21 executing program 3: [ 439.088026][T23935] should_failslab+0x9/0x14 [ 439.092538][T23935] kmem_cache_alloc_trace+0x2d1/0x760 [ 439.097920][T23935] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 439.103757][T23935] __memcg_init_list_lru_node+0x8a/0x1e0 [ 439.109404][T23935] __list_lru_init+0x3cf/0x6e0 [ 439.114180][T23935] alloc_super+0x762/0x890 [ 439.118608][T23935] ? test_single_super+0x10/0x10 [ 439.123553][T23935] sget_userns+0xf1/0x560 [ 439.127889][T23935] ? kill_litter_super+0x60/0x60 [ 439.132832][T23935] ? test_single_super+0x10/0x10 [ 439.137776][T23935] ? kill_litter_super+0x60/0x60 [ 439.142719][T23935] sget+0x10c/0x150 [ 439.146534][T23935] mount_bdev+0xff/0x3c0 [ 439.150782][T23935] ? vfat_mount+0x40/0x40 [ 439.155124][T23935] vfat_mount+0x35/0x40 [ 439.159292][T23935] ? setup+0x120/0x120 [ 439.163376][T23935] legacy_get_tree+0xf2/0x200 [ 439.168070][T23935] vfs_get_tree+0x123/0x450 [ 439.172590][T23935] do_mount+0x1436/0x2c40 [ 439.176941][T23935] ? copy_mount_string+0x40/0x40 [ 439.181897][T23935] ? copy_mount_options+0x1ea/0x3a0 [ 439.187106][T23935] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 439.192662][T23935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.198908][T23935] ? copy_mount_options+0x280/0x3a0 [ 439.198929][T23935] ksys_mount+0xdb/0x150 [ 439.198948][T23935] __x64_sys_mount+0xbe/0x150 [ 439.198969][T23935] do_syscall_64+0x103/0x610 [ 439.198993][T23935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.220141][T23935] RIP: 0033:0x45b81a [ 439.220156][T23935] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 439.220164][T23935] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.220178][T23935] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 439.220188][T23935] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 439.220197][T23935] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 14:37:21 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:21 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:21 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$vbi(0x0, 0x3, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:21 executing program 4: 14:37:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) [ 439.220207][T23935] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 439.220216][T23935] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:21 executing program 4: 14:37:21 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) clock_nanosleep(0x7, 0x0, &(0x7f0000000040), 0x0) connect$rose(r1, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:21 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600)) 14:37:21 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 439.451559][T23962] FAULT_INJECTION: forcing a failure. [ 439.451559][T23962] name failslab, interval 1, probability 0, space 0, times 0 [ 439.506519][T23962] CPU: 0 PID: 23962 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 439.514545][T23962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.524613][T23962] Call Trace: [ 439.527925][T23962] dump_stack+0x172/0x1f0 [ 439.532276][T23962] should_fail.cold+0xa/0x15 [ 439.536899][T23962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 439.542722][T23962] ? ___might_sleep+0x163/0x280 [ 439.547593][T23962] __should_failslab+0x121/0x190 [ 439.552538][T23962] should_failslab+0x9/0x14 [ 439.557055][T23962] kmem_cache_alloc_trace+0x2d1/0x760 [ 439.562442][T23962] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 439.568272][T23962] __memcg_init_list_lru_node+0x8a/0x1e0 [ 439.573938][T23962] __list_lru_init+0x3cf/0x6e0 [ 439.578719][T23962] alloc_super+0x762/0x890 [ 439.583149][T23962] ? test_single_super+0x10/0x10 [ 439.588100][T23962] sget_userns+0xf1/0x560 [ 439.592435][T23962] ? kill_litter_super+0x60/0x60 [ 439.597407][T23962] ? test_single_super+0x10/0x10 [ 439.602362][T23962] ? kill_litter_super+0x60/0x60 [ 439.607305][T23962] sget+0x10c/0x150 [ 439.611142][T23962] mount_bdev+0xff/0x3c0 [ 439.615398][T23962] ? vfat_mount+0x40/0x40 [ 439.619743][T23962] vfat_mount+0x35/0x40 [ 439.623905][T23962] ? setup+0x120/0x120 [ 439.627982][T23962] legacy_get_tree+0xf2/0x200 [ 439.632667][T23962] vfs_get_tree+0x123/0x450 [ 439.637182][T23962] do_mount+0x1436/0x2c40 [ 439.641534][T23962] ? copy_mount_string+0x40/0x40 [ 439.646482][T23962] ? _copy_from_user+0xdd/0x150 [ 439.651353][T23962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.657605][T23962] ? copy_mount_options+0x280/0x3a0 [ 439.662813][T23962] ksys_mount+0xdb/0x150 [ 439.667067][T23962] __x64_sys_mount+0xbe/0x150 [ 439.671752][T23962] do_syscall_64+0x103/0x610 [ 439.676370][T23962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.682267][T23962] RIP: 0033:0x45b81a [ 439.686166][T23962] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:37:22 executing program 4: 14:37:22 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0xb, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000240)) syz_open_dev$sndmidi(&(0x7f0000000340)='/dev/snd/midiC#D#\x00', 0x7, 0x400000) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0xc7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r3, 0x1, 0x10001}, &(0x7f0000000200)=0x8) write$eventfd(r1, &(0x7f0000000300), 0x8) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r5, r1}}, 0x18) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x10000, 0x3, 0x0, 0xe31, 0x7f, 0x51, 0x7, 0x2, r4}, &(0x7f00000002c0)=0x20) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000000c0)=0x300000000000000, 0x4) [ 439.705980][T23962] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 439.714409][T23962] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 439.722477][T23962] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 439.730455][T23962] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 439.738446][T23962] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 439.746428][T23962] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:22 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:22 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600)) 14:37:22 executing program 3: 14:37:22 executing program 4: 14:37:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:22 executing program 0: syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x5, 0x80) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) sendmsg(r1, &(0x7f0000002780)={&(0x7f0000000040)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)="afb5d5bf022b30a915ee51d99f55988868b16d32cfb88a5cfacafacc11decde38367542907d015cfd194354dde7755c3b4642d04a87dc3e35c2f756c2d5c488b71c964059a8cf9dc9b30c96f4c429c30cf96a707c705bf99e999ec7ddded0d45ea3fdf962bb22ff2bd356f9d992abacb310f0f50a9b03bae7d1e1324789b01970b2bf71a21efdf960fb6c0e49269cb44f2779a384a0315b274a3bbee1b442958b9ee3cbb76e535831b87c2874d483f98276545cb28d40f06dc0406610074632a56ca2c5f8bdfd812fb4c2f700d458094aa2683696059ef57c4fb", 0xda}, {&(0x7f00000001c0)="44328f6cf5429213142491f33e1817178134bc67e3b06658db95fb2e3406153e7c805ed07de9a37d5e0097deb6f0a164ad49e5eda54f6867ab980605f42af455d53c2218cba2027755933333a5e84af08064cb42eed79fdc13f5cc65567c2e453d9418f2c1a8176a37ec08b6955309ca9ee8dceb7a68eaa838fde4ffa6b46fe2691dd43f4799da310f028ad83764da3aba667d02d6ed2c6fec055c0fae33ebdbc6d2b83457b1354c39c395175889f9d4c5c15dd381a96ad86eca24bfdfe9fce9ef08a532f9a9994cf08fe5d6eb7577ddc0a09b307e25300992be1722acef388034ab9d77aff39656e65631e97cc7c1085075570fb56122edeea361a62b46b7cf03136c0daf68747b3a6efe6c57c221306d8227458950bb0af5269c487123c8e108f97c165847d9675c2bcf8c20abf51bb243174c46c764d2b988d3ebf7df03c841d0ded1c61f7da73ec7d0fc813929747d93aba5ed177733e6b53ec20df98f8290e303252a3a7e5163d16218c2a25e64bbe756dc28180db7ff803e67a8fc1bd8b6789892c0396b16d8e212d2507f54c47bf18685ac7a6893bb6bfd55d20375b9089ee9e456fff4fd84bcd7f144fc12623089871d625b5ab3101d1fc58cc5b7551c503327378744f6d14b6654894f363e8520d73cd901719f0c89787ec3695265eb068ada101451e238847b4c924a89623bffdcac86009c469294d350fda0405c0ae8808307cf8211cc84b3186710d8219a4705e3a8e7b27791ece2a22846dd655ac63b168245c7a1407841230bf8711120a121e25c2470ae766307d49382ac6a7edc99e178a65344aacc841f1b68ec4848d67a04552f80d697968ccb952cce6da60d00a0e87f2b8b5777a97dda241110b74d4be7d5909359e75fff971fd7e0dae41ab7d4c6cc966bb7975ef4574961c8219c663ee129a116aedee707fd44d429009e0a5228aef2be26ef9ea33d1df3f51dd3e0d7bcf6dc07f251222d6e734150f6497c48c67ac691a018d4b4199690553ef93cad8f222f7df4b54a0c09f832a05c5a5f1fd5b43280a19661b0e39ea30ccb680861c83c833de795942a807d264f34f434345ebc4cd60a28ac2cd9f674051e67bb022c72a7f1dbf143930263f9c829407afe8c4134a20776c3ce17a0239e06f6f6b93cb24e5a5f589bee134379a5bcbd18d0d6f27b5604a84d839c548afcdfd6eb4f429b9441e80c73af66d338ef5bb4e4296cc9abba449503e38eb65d3bf0ce528af1a38a20b2f3bf1aa0a306190a3364a42eaff8f084b7ec204314f2921dfc67fe9b2a9e50f48a8256d35b12a298006e2c5d5fd0e0de7fdb684126b952bdac43f7699fe2d87364b1ab9ccc9f84d821f80a123a473fd9556ae4cfccd8fd374d25a461d431c512de7f7db1346e46ced68cfde7fa38085f06889b8b5dbcad92e2df0c9a3e47edeb9eeb34b45857acaab54d5e61bc3908fabe86d92793df57d8bc12968fb86f5df429ed39f1904c9155518ef3897168793c4246cce239a17fe8017c5300fee0402b80f5873769060ea490d106ce8d9487dedba52e399ca5b4a5996a9ed173390debd8f84a23dcb195e56059f31fc5ad61c59b24dac03ef4d33761978c111f413ca726382b2a6c1cb7012ce5d4cfb845ca99f417ca1311b526ba2b16c0c89e5d6e538b8c7fa2ef7e716eb7dde0a5ee6f491d78aa9dbebfa35a791305c35bdd3568766a4a70950f93605fbd4c2b77952b3a4f1de18bd0addd56d22408cd9ba6932f9ed8ec89bcb0a7bd18ef21eb70f73fe85c70d2d7c712fd90e334146d268911e6e7470e85df6086bd4b9c3407bb8cfc6edc8a412851a84e757f8a8c09543dc42c5a1cecf44d69e3d6a05404d810554a1075c8de06d082e68a8b92ff1e15b9ef5c2f874e4fc515d9fdd948215208327e82d68d30d825db76d277adf2994352ca7b1d730625ab60ebdaa9d9cec85b1e4a43359705d14198e1d0fca1628665c7b78953092e273eba061e14b16024cd45c148b26bf44fcc4e0a22adf8e621861e12a52234e22a0e8cb772e4d3fcedb244f46216a00f28d32cec5e485a07207b392f575690281071f7afff0f5d3c728d06987afd794ed926f34b842fb2483ecf02b5dd2e0f37822fd6c7e78a36c8367c939618e78bf82f9eae42c5b97fedbd160e483373dec7a632d9b59691516071ccf769ef65c2b050ab99b2436a8f949ea79d6570d38d36def5f12c279677959f439c7c9d81c400bcc125661a24c6f965ac421b5ceef4458f3a3fc8b461178fe6194ec14f63b722daad82c26be0b955bb9050206a21c2c1e4307d872087c50b53567d5ac43aa44c2db88bb7c496bb705d81cb7b3e6c23d1f7628e2a37218b94ebf8ce40f3cb99d61160df3aef1f91056023ae85edc9a7f32cb9d25cafb37ffeb4ae1ba6f180c7631cc6b3415c0c4e72cd60ec51df3a0eea320485c1d1bea14e26e6299bf5f37b6be84f65cae660a7ea4e91cf4240a136a5784542aa4db0148617f614cd4ed145da4a93e5fd8213a1f690d4da01e9a4740a9a1f1d20b17d966093ac865865ac1d7c8665d6332ea99615bc4f025fdf5ab032465f3ffa1101b7ba0b33d2d7b48db419068cd347ff4b9e453045d7cc1b766e4ebc6c69e27f0946b2695dec2b77cdc1cb0ca138d0abe87585b56f2a35a896723d023a333f0e0715c110488dbefcf562eb138d7ff206ab14cf60901baab4e0269999969b6257199a9481b3cbdbf0074b29a1794819b5c921a9aaa4e82b6f7b19e99b2739dd143840e30d93a1305c7af97f19072fa4d45ca51842067997c36586ed0e7cb18dea35da17cdecaa2f87773fe02ccbe555be722028b3ee9db2eefe22a2a9a35583de98c1cbb7935318f4ac968571c64f64584596350d3508baf083b46fe8d74b58e1550f8ea9d5c93c1889b39cdec70b7b680b84b7dccddcddaef5d42eed7d15d5438ce608a3c3e87c5c59a88a5939abc429c449f58a0ee9b005c4c53749dd53bbd23513d5c1c4dbf0b4a66f9dec6baf2f9cfff703c878a5209e569567fee656ce61fd49e752acd91a9a6a47c2e89bec77aa9e9bb369adadfd918a2b41e004b9a6897e41b313fd0db82b79e1e35abffdb6861e120041c3ce28cae54cda64e041fd7acc5908c2f866378f279df3961de9a4becd8dfc745db30c511f3cdeb0968e502b9a68f86fc0613dd167b1b4a69a337524a6a638989867e89cab483643baf51d7749070c21822e917d88d4340289dd45a36f9e21ee661940e19c9fc23e4423ff17d7444be429dcfa3bb8e6d1359c18a76430c8ddee9526a9772674e6a16389dc3a0a5aab9d0568d1d02961bd7d5348fb36ea76349a7205291e92fe21cf9be4f8743e4a61eb9edb38814b9e10ca2fdad6ce732ba4a99cc6c49428b00abc0a8c60ac335f8baf4ed10accbcd31bcdd4198577f7120636540bb9744b9d8d212896fe786159a7e73b85628b46a432cdb44bb9f127c372f8ebca282f99c79e4fc4a27cc0ccd07c5d2dee46f68bb1597c9cb0ede6ef520f78ed2d0ece01649f2eca5df8abd38f9e44011cb002b40a4f6b2f8995fb406ac9888a6a151ef8004b4a42fc8b8ebf3a27ec647458efe7d4eab08cd3aae698f3b1b109ad9e0c9772705b3b67f17ee453acb4909776bbdb1bb9c96de8f85bbdf086525dc09f5fc1a5f54de72a03dd3f4795c999c4ae20b607a1b187b9484f5a330d993ab757d0f3cb0a60d3d72794f7b52ec8ed8bfad5b41870e71f003d3d0b735897f459cbbc36ba87e71687bc2bdd01d57973d8de4e47c58fd1c886f56c31ea3c588b2c7f00a1ebc099e2a95d125d00b5c91fd168121cd5f6c7cdecbfc2c256e3b5d1eb8b26517dee0f206f1dee04fd8536d4db7ecf9e37b409fff33e7bb8cf98f5034e8d9c8cf3af40d36a12eb30d6a4bb5107c87915c34d3b1b4107974786f84bf1ffad3b2df5eb5325d513133df37dc69543958f00db5b0b47f882aaa1bf7beabb8d3e3d3cc239cbf2894d773fa0b6a917413dc6a98b088d45e025bf0ce0c709689de996f7bacc5058bd1492c4b55f46b39b910711754c8f815d4ea98378df2e3182615969ed4a5ba7a4309256675490c8cb35dfa527ce933e197a973219a495e22d6c97757657b40b1e18158157588173ef9483a207f02300bdececf4bbf06aa01c4f05c32e67f25ba4c0ffc6dd8841c15dfda9615e6814e2dee04789929a28cf48effb103da592abc561fd0d23428291096dd6c561481deaf73d901aa8a721fc996fa780a9f4bf96609f71db437fe7c60e1b4a6fa7c1835958e20afd360df8c70a7c1416a3e576d119ba68f0ef6e34d1538af3df60c39f9fdec73bd6afec6890be722f579e2b20adc4b94e7a1d1da9d90184c9ef963ed57be06f3dc94e18a3d6250f3e2b49b9d3ea3d8cf84eaa24c82618a09ea04625fbdaedb954fc8d3ee9b0c9ba8a085dc08e8c0dec0de4ab6544a28972482e539ed62f518bc98507185d3d67d8cc51158209fa2f975eeadece352c59e848b22f40c49d037ad50508a9b541124e56299854d74d039b2b338985892f4e3c060d64dfeeaba4f41b33d476c2f9182df0756cbf3beb0973d8fcb85b88b3c91ea3148125c493e8026d7166ba37db5dc5a3904c495ea4a6221b92ef211af9dbe7b76d0f7bbc458bccd15c179b0b13460fbd353041a42db76b400ab3002dca301c99e90d6ab26391dc7cbfd3a53f1f5c79db70cd6fe40ebccdcb385be5c0430f8d11670ba82a13ec40711e131320f8679e10bd9ed611408ecb9f146e0a6aab9f9e25027984d414f2d5d37f47f615c7d353ce938c994bd1ed01f6487a53d42c4658ba66646808870fb78dcd5f9620d1e0c7ae0b671f90607dc9cb693bb12f9f7b2d81575aa2c7e91fefa33fb2e836d316efe0027f7f9882b2963e8b654f5d50d31a60cc7528d6359cad1fa413b8b60b90a8a6f458c08693dc364a8287643f8e2ff7d31743fffe5566a0a5f2a14d3db52060941a6b3530e2abfe84c4c9e82d266fe168aa8170491c909317d68259c13649e0aae5d402d661058b93aee4595c6811ef701c9e4523820efef4d3a5dbcf75ba2c2dd68f9f1577c48feaa0025536488d323e3cb9eb5adb4b4de774df7de259b3b60eba5bcb3e8ab35d1bb49efad92e13b10eb87f22306a2398c8d62166d27428b3b5c9e8ef56eece5ac5c2ed7bc76952c7332e572b382a9828d7a634e2e4929f76af58918416cc405d31abea096f2256aab745493d9b70cfbb931a82df8854afb959cb112d8d0575183d4e637a0e4e73b48f26287b59863c0693cbc94f00270b5e22bd8c04b4e321aa91ca09585a3f7dd9d7fa922fefd81ea5bb529ae5a2a766fb49e89a4cfa2decc58b84c0d67a969e6813c35a30d2335c81038c6e7f2a4075c50a00ff59be4db7bcc7a05b0c8810734fee0fc5c3ae7a5521be6825a75275960164dcdbda302cf5e6faac2e2d8e99945d40aefc5332fe7a3200505a3a30930d30c38b86178f01fe67e0d795f976bd416a231d351810c95785ba3350a90e203dd0e73ef92350e7d563a37bd64e310390c19dc2339b52e8ca4b1a98682d9a23e32d38019e3b39f5f76460338bf526f420b0ddbb01bb98020cb17c44be0a01d7c06668561c5b7e293b6fcf0125ec8b27f3d4bcd24fe5417fda499784447942e2a241481bc0734c4787334f0d1f9e7c477fc5c48726948bc39baf77f1602a2a3b072ce43e19228f6da2e90ff703ca841dd4e853a38b61361a1d90043d6df6a990867e6a9243f3b384ca9a0d69dcccd0fe5bd5918028d68e5afad660da59121819b91a4346cf4c568ab09fa3", 0x1000}, {&(0x7f00000011c0)="36816c6919a7dcd92f97cd9bd89cfa6be3aef92978ace42c35defcfef7ca398861a07576db44fbcf332094153d62305730c09eec50f8200c791654eb339e8cad121f0faeed85831ca65ee5ca374856a5c4eb2fbe982c6249131777b5ec1dee9e75285622", 0x64}], 0x3, &(0x7f0000001280)=[{0xf0, 0x117, 0x4, "aa2f6b39863f464c6028661b3f98391589ce1ee7784dc5a1c10446f168f760b3dba99da4c1a6d310da9f0c85ff0ce294aad56f9f47f89de56f5fd984f004301bbd2f1e550b3c61cc21cd5b61fad04c80e5be722e7cb4925f28360491d78c1e33d72eb364d11967ac325ade68b77c451c4416a5930e9c79ef8b5d66d6b8dcf3db5c7e931e85ddb9b0058ca06a33b35295f29014d575be2575306cf23e2b6f0b9d7db652b3f4d7071b5c58209973740282170dedd2dcb6609260008b654a63c9d6668076db9dba1deadd5bb6996fb967a40f8cfb16bbce87ce37"}, {0x88, 0x116, 0x7, "8bc85fb4499c45e0776576e53e5949706c947f95478d49780646571f32835819adf1087cf914ec23b66e39272b9044ce4ca05197099dd11a5cb6c44db877e6700d170ac9349b05647f1c3f99fbf174786cd13f148e9e5cf53874b29a30c5c2e2d70dda81ee954ad092657916f851cc9beb1f11a3"}, {0x28, 0x117, 0x7, "8e89faddcdcef738297e62b41208930003491399"}, {0xf8, 0x29, 0x0, "5e8c3265065be40123db6a8574352373a02005b9b210a155607c7d00945dee59c2d6cf2df8042bc85f3f64f608b08de085d15ade152af124ab61958d901c04890082a030c58f3b2a2c6d6a67321a6125acf8019fb12c1417c13e360fab87d221be53d2ca631158376edb5920bd7b618f133b1c68a28e4c16371e7c71d159943882c11c51c1b573448c40433fcfb8bfa7fa345da9c03c9c8d292a85e6c66ae7ca7d95c66cadcaad5e8904b9e863d76dc825d3f69134b0271a663cadd6c104852ab00da4ce1a532c06534812261328c286e72dd4c306f1073174231043d3c8f0a38037d5715f58ef9f"}, {0xf0, 0x19a, 0x2f, "4f9c9fd214e8a021df168fbca638c2aa1d2473e10250df2fc48f09becd2b795ea4405360fd5f5a8aa550e1a2bf7610f614dcc322bbde77d1e1ddd41835054be28a6354fe63d03b8227e4640e39352bf77cd6247f8ac94d09d639499fa515aecd3f7fc7889343234425f5bea34016867d6bdd19a361a869c2fe1cc4b1d2294789888688a460198490c918df4566ef103faaaaa96f57b7f0e6d4dbab467093f9082247d34517a68da2998f2528700ffb63de277ae9dfc4f5a02e0ef75778ab823b3499e471dc5dfec886818f3db19c55457e4c6dfbdda123bc005ece"}, {0x58, 0x11d, 0x1, "45ac1b9f951edd3fff05f4542a914a6bff593572cdd8260968f6c1baf29b7e9e6b1df8a1e91c3f5610eaa1035131283a1cd08b07287778d739bc80691976027a5f8952eb95"}, {0x1010, 0x117, 0x5, "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"}, {0x10, 0x107, 0xfffffffffffffffa}, {0xc8, 0x11f, 0x100000000, "8b02965401e09498e8fb8289551ade6a5332ccbd1b042529d608d105cb5811dffc7b4684ebdfefae31fc58e3576afb1a7c2a3b80c4954b3881cf2647053088d682a261019a7f4a508de7aed8fbd75a24b470030d571fc6f11fd0cc402dde2f92d82fc927e0cf68e1ad157058cef22f691ba9851f178810a8a8b9ba532a27d4d4f7e3f4e0a440f789563543ee1fd2bcb29c5dd742169a30db876c9d273600ceb8b7275bb87499f3ce6512b5ef6be395fe3241b3f0"}], 0x14c8}, 0x890) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:22 executing program 4: 14:37:22 executing program 3: 14:37:22 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600)) 14:37:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 440.044178][T23991] FAULT_INJECTION: forcing a failure. [ 440.044178][T23991] name failslab, interval 1, probability 0, space 0, times 0 14:37:22 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:22 executing program 4: [ 440.132542][T23991] CPU: 0 PID: 23991 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 440.140579][T23991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.150642][T23991] Call Trace: [ 440.153945][T23991] dump_stack+0x172/0x1f0 [ 440.153970][T23991] should_fail.cold+0xa/0x15 [ 440.153991][T23991] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 440.154017][T23991] ? ___might_sleep+0x163/0x280 [ 440.154039][T23991] __should_failslab+0x121/0x190 [ 440.178553][T23991] should_failslab+0x9/0x14 [ 440.183071][T23991] kmem_cache_alloc_trace+0x2d1/0x760 [ 440.188465][T23991] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 440.194325][T23991] __memcg_init_list_lru_node+0x8a/0x1e0 [ 440.199973][T23991] __list_lru_init+0x3cf/0x6e0 [ 440.204753][T23991] alloc_super+0x762/0x890 [ 440.209184][T23991] ? test_single_super+0x10/0x10 [ 440.214131][T23991] sget_userns+0xf1/0x560 [ 440.218466][T23991] ? kill_litter_super+0x60/0x60 [ 440.223423][T23991] ? test_single_super+0x10/0x10 [ 440.228374][T23991] ? kill_litter_super+0x60/0x60 [ 440.233329][T23991] sget+0x10c/0x150 [ 440.237258][T23991] mount_bdev+0xff/0x3c0 [ 440.241605][T23991] ? vfat_mount+0x40/0x40 [ 440.245970][T23991] vfat_mount+0x35/0x40 [ 440.250132][T23991] ? setup+0x120/0x120 [ 440.254212][T23991] legacy_get_tree+0xf2/0x200 [ 440.259386][T23991] vfs_get_tree+0x123/0x450 [ 440.263902][T23991] do_mount+0x1436/0x2c40 [ 440.268280][T23991] ? copy_mount_string+0x40/0x40 [ 440.275034][T23991] ? _copy_from_user+0xdd/0x150 [ 440.281046][T23991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.287325][T23991] ? copy_mount_options+0x280/0x3a0 [ 440.292556][T23991] ksys_mount+0xdb/0x150 [ 440.292573][T23991] __x64_sys_mount+0xbe/0x150 [ 440.292592][T23991] do_syscall_64+0x103/0x610 [ 440.292615][T23991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.301582][T23991] RIP: 0033:0x45b81a [ 440.301602][T23991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 440.335648][T23991] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 440.344177][T23991] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 440.352179][T23991] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 440.362129][T23991] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 440.370618][T23991] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 440.379561][T23991] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:22 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:22 executing program 4: 14:37:22 executing program 3: 14:37:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:22 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) getpeername$llc(r1, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x10) r2 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000000)={'nat\x00', 0x98, "ea60266d39b760a90b5c21e7c65f7f58a7af9e1d6f5249519228f211edc8472a2f7bcdb8198ab27a825fff008ecf6d88fece170afd31035b9ab38d398f7f9758494a60d4e7c81e0cc3eced968a7daa434e505d1513d53fda6a16fed3c1047de301300d0bd96f4ef1b280e235ee1f527d1410d9b6e2713e35f84851a4a48b8573ff2c8612abc1665a5de80d80f55852bcc90db079f275bf98"}, &(0x7f00000000c0)=0xbc) splice(r2, &(0x7f0000000100), r2, &(0x7f0000000140), 0x4, 0xf) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:22 executing program 3: 14:37:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:22 executing program 4: 14:37:23 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) vmsplice(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)="e9f62d91afd701473dc5b0bf7d09237d0b4c5e7dbeb24b6269adff10e4028836e87060efac2f7aad6d407f0fdf0d9b2e5896edd909e9a9f272661aa335ee4766e15620dd00eafa544cbf22314b4f395dbe2781bc5bf8ce747f03fb80ffee909d64345a1f0112d089ae414dda78b1386a55b46c69de36b37905a6e44559da88e654342c67606b405c190e179fc09248feae14078cf3c0fbdea6a684201e5bfbaf0f68c59fd0ad90b4ca9cf97e7b92d2dfb5454b879f94602977fa0cb1a50bfc", 0xbf}, {&(0x7f00000000c0)="ccde6b41cd227d476b149d43601b438867f9e9bbec5f26a1dd455b2f9fea14cf66624c7039335ef711b80c479c7aca1ddf9c7f5edd53621d96f3c5418e7b6749ad5f32262545fc7c7c44fad5491313141d0266a7baf528e105a849d33e666b2a1e1b2f5b0f22a57f482feb6b6f255e1e712ea86357d666e2d973de441f511ec47983d83c2a5ce39916075b8fa4df20d980eec161df5adff4cf782a6dcf184663afade8416aae0ff7a7946a6015fdd61c95042b5d34b84f0dc1a682275055daa7fdbefb0628c566ceee0e74d5a840ffdee6a7eabf6b41ebe97ba09d8eaa52fce017", 0xe1}, {&(0x7f00000001c0)="4d356d263edd6a69bccf96d887d262bd9b263e48473cccccf0e8f28b8525f1b59234eb7b77efb2d518080c362fbd90ec2403119c99e828ad1c16fdb4c79df2310c9103b226504487b5b296d535c0bf347db928b749cd8219f7166d40dc77826250ec8024136ff3a02518dd499b73021922a71bc5e03ed5efd0cd4a8427554c64cdc15222eca65f860f12f57352dae35facaf15969970fa99f55f26ca0bf6dc319e949cf1c66eede9529b0d4e8d84fe97198f4f17ec4397b44f8ed54d6a30c5c2a91c1f8fb44c814deada64a4e16d5f33a4d45b0e078c96f397fe6e360b4134a60aa1f8cf1ca0b41e56a9ecc88107a7a5f99b2b817124fdbc3b8a971fbce691e414b7000d1ac7f0d7ec687a7e9c735af51acd3969a63dccfa062104f1f888e5334649678c22bfee0537469c5ff4635ba42e98dbd0c0d0ca3abc6c3c399d9029d1483d11293b5a7b70accb2b0440ba5ded0fb33787d344ac3f36c51b5c75066e50e848552235c56054f9ad5bb9c77c0ce38cc8e78cd5b97af0d3ecfaa92807b5d03c9fee86d97e81360a1455b27e101039c3f462306847d5ff7124e25bd59f4b1c930aa7264ea6b79614c07c06668a54ba8501b133e48baf7c64b9e5baadbfaa24dd150ccb5be718e0c762a2f34fd1d880b7d1fe2437fd20c0b4550583c010c86f564a54a43df3f80619f51ddf65b3a58b7c7183d242fae4d36f746d664b5943d201dd344289cdb3a19c5c63170e7e48703ef3abcf864534c0ef32cc292b85b5c5a32ac4e0fd119ee1f8dc3d99f524e619eb96572833a5e73e5a12ed9a1df06a846a9567c9de35a6727bbb4b22e0874f941234268dc9d9e925c3a8ac42676761ab237dd976643dad690fcd9ea22ed8c30a7627909c5e0291513dec38e1dfb8329f1778435e7c888e92f8df222a67b9f3d9d34d3b886e012c9e4c07c81d4f70411dcac6a78880acce8bb207f9171c95d3c8d5bbc2f0f4d0bfafac8201597ee8eda5a70526c5a2d72bd4954203802eafd8cdcbf8daec0a31d6e9ad12e7c9499c35a6410af4eacb978330d3a9c9585ea370751e6be0ee14388dee6540bf28d542e5441f19624a4030e4376e7cc2faeb4af15d6151f421852081032f72a9ce48d340f18d5d83601c07921f9a54d7ad968ab95a9aff38cc6c940435e0661348db29caf1bbe46574c8e7c33de847da6fa2c595641f9517d8eddbf2e1fc12db0809726b644c13424155b9b0d58d3d2648b6c15d7c795ce680b43038b48a13be962b130b0954deb3b35c4c07c997da4b2d443b5d6138f348042f47c34aff3418bfba918a3c17e57677e2ea72d869780c08d8ad5e51d1024e7acd2ceb0551cd636f1e8be5bc102bdef7b55425b85c083bc8d58acb7a6d8e92fc7e1dc7fec08feb2b87e37f156dba7eb36b8b67e1fe03c565d95ad5f99aa43a5c31a197f454b5059ff7a9c00380c5922f94cbcfa1aee24626b32afd6a45d14c46d5efac48f1533770ba966ece726e1d50089e014965d165f99f2054f8c38b82bb5d3dc84774a0d797be5ff910a4eea476bf659a1e2afd4579fc81b547623eb6a86fadba33b255ad25c8e697974154d8a0a5a17d8e3d602ae98652e3aa58f7e2c8868a7aa0075a6651ce6b8701a63d3de49252123090c7acb4ba122df79fab07e758438b62db8574691eaebfc7f79fbc263ad5ba3f064b57f9470a259d703e723f50cb0f368016ba7370395981ceab79b2b77b95fad2ef709247e1955ce3a1c73cfa47a563a595e91a810829e3f2b1ed0f840cb0c0dee3b953e57bbc5362a843edb59729b4e9c62115d61b78a0c0412dbb08002c49fc4ecd2134cb7196bf42b68600547a7c23af3bc40fa1cfa4706c96ef1e01c4418bf5d4651f93633ac64d5a2781df88af5c4d9baf96d5c69503b8754d52e16d9bf13df8363b2ed5187c85dcb8af4c53005eea261bbce1c5d561c489f6d853e529af74509970b943f9e835755dc127a4ac00e72e72bdc6437008dc57ffd019a914f4df07fddb88c52101df09aa789787f296a41088dd8503e8db0520d0ce1b8173a9b5f4172eb412de5d0e78aa022cb7b752e253616cb36e72b0b37fc8f900a09d73a65e7035cdb5d2ddb52c2de3ef2f200e91859ca552ebe93a9754238901103c3df0c22e55de6962d63ab51d564857aff5f7a273e46fb7d338d82025d7286f932cf5cef9c2346c49a30ebbfbe8f4067d175fbdebac1a8782c19d3a6cda260dd7855f78114fdb1b3d320368140ce6ff85d076215c489fa8d0f54501c6b2e9c086b221b374096bcf613a3e14a7eeead5c251f6dcf0dffc3155dd0eb471847eee02e2a411da45b94c0ba6ae0b5ee6859cd67ce7e50a2fde87b66705857dfcc2710a7e66e1ce9311bf07fb8a97b53c98611db5cc76c55dd4986910a555c90f13b5b2f0dc1e0d0992cc652791ae907e894f33c957dbbdfec64b533335ae1e4b7fbaf5177ccbd9b34f5dc769927b055274a1a8f7daf82ddcbcce5c0f1a99be7ff520c0e8bb4540aed24a8b95427eac671563ecc2b25ae1dc15a660019361eff211875efa4df1e97d0a0c2811ab1870f1e75ef0a9e7683f331cb53bf51cc073767eefd96c87f105cd41766b2389da34b38089b26c6f79f91979be0dee2012ed21bca6de698ac906d705f30a793833b75ddc9ea94cd337898f810c8fa367f91da81b33d1111e1711bc5192f1979494b5c5fffb12b21e69207b145dbd773c9d295fabc627cb514c059d92194e04c22c075c8471cd58191577a45aa7c3c071d7ea96aa34525bae02b2f332ec14eeed5e05166214139c17f7daefcf672d2ab08886e363b2fea819f04b7641bf3389a8937045f02cbbdd46ef89a0f7bf65a3c1924b1ffb889587fed8d3b5a1ded03b19c4125506e8b765f94323c5b1ba2590b6124cc8e9890da1b6c98995eff4046f793d641caac8d9404dae5d9cec7cbcdb917312719285d29708589d0ce8ee93f02149a463a59efd6bf2239758b92bb10377ac6435c4bcc6a32f9dcfd883db9548a43d6935786c9cd60bfdad758fd82be3995e0bdfcc6fca9e1bcdfabdfbcbb09d5f62e112af984a31cf0ac42b43d4538ed2006fdcd2d780712a2fb8fb975190c1df50aa105f31979eecad95a445630e940588dff01d0a24ef0b8d1ee373bce101d519c6d46c6d8549389ee2ae2588ca23a35ee3840464f6b8aef13c933cda0ddb350e6f0c80392fe68d232029fef827390e268f32b6fbaa22be14839a5fffbbef3a77cfe380183e62fec436a84e0bee7590e3d3250bb9d99383064db69217e1b73e4690d5171c52657c73c74fe04227391e9789e4d69fdf560c2761adfab3e64f5796c586123b7cad8f35345adb44feae8adfc899846686b8b032d16aa244c1f38124147999b07f78fd1079e57ee4dc28aa942f7abdd767e9c7f57bb882b7ead6fc0a50f23ebd18b2075a00167336c0cc5ed2d960018805d223d4d806a2aff8dd6906b4ef658444efeb244931baa53fb0d3cc7267b73e9a2168f3849a9750dc46c7bce6bb8ec657f826941da0f0035f49faf2c1e1083e7ea4604a5a3440171f5fb85923e27f16161421ce6d50f1f9524a795f6e1ad2a805803292c1b2424dfcea65168313a48453c43736b8dd4222bf2cc7250e7917d274ec65b1b8699563fadcd495f9353a1e55f08b5df51c1dc041923fc52af48816c56b55c8ea090f14cbcfcd8edd7a10927d254695c7596d5f56a7e2a2b6c00fa8c37b8563ebd639ab8017739d35cf823bcb7ffbd4f88225c7d47706ceecfd03a652354287a669d9825356660eb0da439717b497259267343f937b4a0e7be3771054210aa567e9040727e11603367ffefff3f8f6ba2c913153b26f89cd3c79ac2c28738dbbfccc0d4fede4ed3d02ebd35314a61f16681373c33376a5d29cb32a596473c62052196ba0a1beacdc05707a53704dae25759e0894a5f1602735f6ba00884044daca04a282ba329b2470cd4c6a46f22dc837061651e102724506a01ec9735e52561a2c9a242494468efa7ae79d1bad8b475fdef160869e3ab719fe9a30d704e1c7f131f72b9c77a0aed1ab2eb7fc538f75f2e901374ddaf65cc19375bbb43b3ac9302758284f911fb18636d94e0bc140bc0c3ae1282110fb47c340885bcf4f86498a8a9a077f13bd97a4031a550ccfa90ad786ac01bc72eef0f2877a23ed23dcf9d28c1b1a8eea120f958e1ef4bde3573fff422e02b5b2c1df9dbae585b7a42bc724ced5f24734939e47d52a2ba5268407a07ab1e97898781db8bfc23a3cdb9b9aceebcb5e9a2f80f5c5da70430b6ccdc636c6502b6c0090853c07f980269321872b184e00710ef814169b7bfef073648d0c84a9e2338eff0d8b270ce68cafe5b263cf57f398a9bf5800956676c199f36ff70a2ff96d1f87077002b965417cf7e57ca0f511bf3ef75e9a9915b045f8d24e18e32b4a7615d70ec9a45333372fe650283536fe21b3f079706517c87fec72f3a7724a175517b72d2b9e094e3a7073f825a19ddc04f5a6f57dfd5fde4b5aac7b66a84adb99bed8e88b2c1ae0c161979313e79a78d18900cb6a0319f74833b9a3533fec72c2718dc8d0a536e1704347421539eeae1a284ff7ae1ff6b105b378234a4a96aa694e02809b4a7c7c61e7ad2a707afd0540dfa729f8fb56d9efd4002e02022a5edae43efcd93debc464161134b03bcd780d8303c7043b06ec791c4d4e185c6b0070fbdb348dc3c8a3727d2e605a19d497c620cc01f85f7a208dabc54ec5d7928a693d7b5b0c2aefcbe987ba468862aad0b71afb8c78eb5629b2efa16d8484359a031f652d5454999df08ad39c53bb65e67c113947dc160f9a2665f71d573f86180194f8f71a8f2e8b27d1428c1f41976eab9ba6b1a8123b24fbc5b8d2d61602237a3eadc0f3172d37e22d229ead5dd4e652396daa93b9e3163350d7897c151ee752c7e6c15fdfbece3383fdeacaab683c04e12214ffa9f342a3b000537df76110bf156f1238377bc5008bfd03aee45115bd27e5a684b69f894c0af284b11c7bb9772ecf99b0721e44fdcbced3bb1d1cb949ecf3d48af732a9a8bb551177df3d822ace62a081eac1be91a4e3721ded4eb334049a220ab7ef6dc9f684cedb0c034c2f3f3e85c1bb9ab7fb2946943991352cbae93340367c6efb37b74ef00cd98e17d0489f3894716c7cbdd476cc85d285a7a9fb347cc9cf5289105518df21fd9d98757c1fc56ee8fc9b490b175bedae321ec1c0edf88d8105f0241b403a964f3a048d32a316b462777da1f2ab3473cc28c162729c475a09c77330b57c3b82d9a74afc2a48374fe6ed1b4519a100beb314409a4341562776a83dbaa576a45d15c3be54bb0e4eb208f72db216a925f41ad46505660bec0f9816c620ad0763abf8c0ead4950f71d39e9660eae39e056c4b944c4378f9399dca696778b76f2112a890de2ad6b5c37ac1d9a2eceffe6b4a668e58ab79c511bf779bc6720ac72ebcb397b8013684366d873450557621f449d911432bd66836811894898cfc57489663f01011f9e60d7e2141d31149ecff2bd9519b9ad30fa4749a5ee5980b228f29f1d3f5a38530c2409173c4063fb673f9f59464b9427d1824e9098a460f5add3280399b5c3d1cf9237d4def78de61c99c401ff21f89bf1c020b8c2a6c436030b8a8672be1c8a0f19bf3a6b8fe0352cff6e8c0245c3671254d5e8113813d37f93f45cb15d4933b5ce55602d00efd3196e5f4836f59fa6db760ee2df3f36ae9803cf63e4ea3b327ff033dcff9f4424bb5c080df13244240a22bb7b5c9b1c26d1b1b8b33e713", 0x1000}, {&(0x7f00000011c0)="195b989deb75a13acc7be494c04ceab46d6d037d53ec427b63ab764d6e1a8cfe483b3d9c516f0d75120ec955e0e7dd09ec0c10805b47fbd210c4938872fb7019a99f5c92555acf1266b31d39fd04cd7004b0cae98e675a63", 0x58}, {&(0x7f0000001240)="7b6afc74918f3559ef897c7e407d78a407f93da83b7a2fff3cbb8a0e927ffc42c4a3f8c73fd3bfa104b38ca3936e68adf385907e5375917884a6c7cf6da22a58f03abec1538e6e8749ffe310e5023d501027164569c0ee7db70d16e3", 0x5c}], 0x5, 0x2) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x400000000000007d, 0x103a, r1, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 440.584896][T24017] FAULT_INJECTION: forcing a failure. [ 440.584896][T24017] name failslab, interval 1, probability 0, space 0, times 0 14:37:23 executing program 3: [ 440.657830][T24017] CPU: 0 PID: 24017 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 440.665869][T24017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.665882][T24017] Call Trace: [ 440.679375][T24017] dump_stack+0x172/0x1f0 [ 440.683724][T24017] should_fail.cold+0xa/0x15 [ 440.688338][T24017] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 440.694167][T24017] ? ___might_sleep+0x163/0x280 [ 440.699033][T24017] __should_failslab+0x121/0x190 [ 440.703985][T24017] should_failslab+0x9/0x14 [ 440.708508][T24017] kmem_cache_alloc_trace+0x2d1/0x760 [ 440.713900][T24017] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 440.719728][T24017] __memcg_init_list_lru_node+0x8a/0x1e0 [ 440.725378][T24017] __list_lru_init+0x3cf/0x6e0 [ 440.730159][T24017] alloc_super+0x762/0x890 [ 440.734585][T24017] ? test_single_super+0x10/0x10 [ 440.739542][T24017] sget_userns+0xf1/0x560 [ 440.743879][T24017] ? kill_litter_super+0x60/0x60 [ 440.743896][T24017] ? test_single_super+0x10/0x10 [ 440.743909][T24017] ? kill_litter_super+0x60/0x60 [ 440.743923][T24017] sget+0x10c/0x150 [ 440.743943][T24017] mount_bdev+0xff/0x3c0 [ 440.743958][T24017] ? vfat_mount+0x40/0x40 [ 440.743978][T24017] vfat_mount+0x35/0x40 [ 440.753863][T24017] ? setup+0x120/0x120 [ 440.771133][T24017] legacy_get_tree+0xf2/0x200 [ 440.771155][T24017] vfs_get_tree+0x123/0x450 [ 440.771173][T24017] do_mount+0x1436/0x2c40 [ 440.771195][T24017] ? copy_mount_string+0x40/0x40 [ 440.779415][T24017] ? _copy_from_user+0xdd/0x150 [ 440.779438][T24017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.779453][T24017] ? copy_mount_options+0x280/0x3a0 [ 440.779474][T24017] ksys_mount+0xdb/0x150 [ 440.818354][T24017] __x64_sys_mount+0xbe/0x150 [ 440.823051][T24017] do_syscall_64+0x103/0x610 [ 440.827657][T24017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.833551][T24017] RIP: 0033:0x45b81a [ 440.837452][T24017] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 440.857149][T24017] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 440.865570][T24017] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 440.873542][T24017] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 440.881518][T24017] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 440.889488][T24017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 440.897459][T24017] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:23 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:23 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000200)={0x0, 0x0, 0x3ed, {}, [], "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", "d9ff7c04394c62858e6be854deb9228e6caabc6a52a664a6831c1aa0938f9ac336235c5b91d55abf528dac86b4504196984186fc8ce2f27f4c26c7faba413ee8a0d3509267b026502f260c09a8948608f83c1233f8dbf3f75c2e356d1c676aadbe4aca1d64be3fa28319ec158e474c7701fa5d89bee2b286504ad8b8bddec345427ca0cde9081b8f4d2178305192bf6cc3a5fe727f33765151c9d980cf2b950862588e09e8a9b0e8f042da65758532b017273ab5c9368681f5a813063933b2d3b66321eeca947d9fd5fb127f37365ccbc3d25a08b158fbc53c0da82f39770b79dcdf7fc8e1384521b6bf84d7ac9e9e0825d3d7b2c70421eaa17d01745a66eaae8e2d2effcc4601a0ba81d3c00d064a5cb07cc860da9f928573dcc5f4272bcdf9f877db1893288abf5315aa5abe439b0240203283a2a5a587ddd967d617429a711c10cc235ec42b95e4f610b11c7a1122beeea4544e50f5fa174cc1d29a168801d0095b05431399a671adb3a2ea92df76271ef9153405a231d261055f6e02ee511b538f5fdfc2cd4bf0c40d0b30dc3b2d678f97c03cff222ff86c2ffc0364df7a29f6a5547592a054e5faefe60cf04b28cbff36c69ece6547b3d28e6000a47b11e94122a61c16a1ce8da5e40c161201645fad91c565718176bcf1b452a94f7a0283bb8129c452a2e0ff25918e5541a143aa54b80395b2382d0fc38fbee206b08eb155fd5c8373a38af9aff1c3a24fc81f0694fb569920f8555a9687310b06c6086d8935f71e75270e65341b7b1cfcf142b7642c856a1f43de75039d681031ebe56fb3ca52af97e4804bf7252afa56d439236159d633667293adda449fb31730eb223af3dda0b0d68465ffa19f8bbda4f5ab8d74aeaba8b91dc28b4d473184551699837a8aeb8fc5f4be7fe8bab0af988692a14f1b42d2411a71b8bfc84d6ec4db01b721ff70624f52560476d790896cd7b63c299d306989fc831a680c4d779e0973951d9a85de70e9609fe81ca84d1b7c0c46cbe089ce9df118665da1eada5844e0007b7ace8000cf98342206e469bc3da7812d015c3aa3f4aad9a560baeb4a049c385da0ac459a2870ea28044314b6c7b5eb0bc69209f498330db62bf654227f822883c5eb17bfcd516c15bf6868d18adac792e74f193a641c0e6355f32776ce22362c0ebdb040f99dfada4a07af3910b846659157d08285fd4c6b8090e40463665160251d34072d15809a51a5fd73e167eb9ace7d333649612af3c9cb59b79d6d87a607d735670d336de60c8acd879537cc061d309017a3ce265600fd4a20b5975ec4ade06d6726108169db425e9183caa50c6f50665d669e18d711ee198a3de112416db0ca0ffaaa36bc529e2dedc5286cab52a02710434b66fe561f969e37d09ba5aaa257198db625718e7d2608bfd378c0b879f1b0f83bc731256bc4e3e6334dd6a394fd8f89ef99bfb15105141603d3fffc6f118d4dfbfe4b29a8be269f09d79227dd33d7823e1719cd3df8b9812c14eee8366d8d7cbf05bfbf0fe26a54455cf0573af2fa3a89ae9db997946b2022da39c2c0f5de50bc2cb8bc50b73deb66b5a3e804fa5b7c35ef0f0dcf59030bf762a8fa46158a61c39db2a5586b06e06a9de2b943a5429b7e7ca60fc5bd9c6e01990c11271a14dd10d0d5f63d75b2f648011eb5b41410629af3515056d1834416f135f8145301140054211cf37249b4bdbe83ad2026eac36640b863ce920f35cb55c0ed156ae7d186f87eeed6f4438748a2f797e1661ccfc33320af06b81d30d820b7e87de4718b4676eebefd42010977f478311bc94306fdb29fc2aed79c9a235deb060c1efa12a457a60d29ef0e87ab216d84dbe0fbeeede31bf376c43b32e6d4b81cf67a25efe89cb804a8953c9a82a78ebc68373c26b1e10ca329cb2012d6735e4d92dee7a4132f0e57a4e19808597f7be6075a1e4f3ae431fcd1077ef3d7727c36f2f9938e89ec1a0662f1d886337a27931105e3dbced95c1b0d29f6e0a7fd8532d27e095eaae1d199373b8bbea52ea7c9c16813b2d7ea1adca577866b3dae927686369a0daf0673e2345a35ea957716522d1b8017959aa5c61a6653b19f588c00e056704bed590983bc862f7dbc715c97237d781a3e6d0408bc5e8a7b534fbf2827f909eaf619331df9276eb58f9dce9756e40a820db051301d8ec5ccaf8464c8977830e21ed4c38ddc39157dac65cb9bd11b18a44861aa453a16b436f457730eaceb234654ec393b8a15fb0bce8c7f5b740f08db15592a352ab0551012426008ad182f78ede20677680cb1545fac16f24a2168d63ed3e1605cb9f79cdb597beaf895a7194e850ddabbf8a688cb699a5969c97bd1a6a3b958fe1b73059a21625e009f82a2e18d986cfd787e3b3d9854c024cdb8930d479b682ea35cad98dff068bfa0b8d0df90a76b94e362ed21e0979771e1b2d0fdbe13423b38652c4c3e715c68b77d43b44840fe322047be4f8211d0a522f1efc89469cf4059f53117c98284b2375a89eb1463427e6f54d27c7204743d375ba4dd476989ef7d6b84a6c596e2ea57f90ad62ecd45a36743838a333184ef823b9622d738921feb6fe0d26d52e006b8ed9f9cc64f813a7e9efdd9ecee5574c8bae67a759b3ff3a745d42b8574fc3fe59b4e52031827772cbacd058a737bd1f11f2d2a8da4b54e04a7d4b14bb3221044330c2ee5e00a4f6a40a3be49dd56cbf38395fc6979849ef62a8d5c838690d48fb9636e5ea861ee3bb5f5ac29decb953cc53383ed31c1371d8b55af9ce5e79f0c71ccc21b9e3f4ac7abb52c14c5f8c2ddeff3b5108d787213d73a5f9e16899004703cbc17c5763414be99a774d182624b934b1c11634d282801efbcd4b4e44eaf819bd09a2da10acb179a5fbf9244ecc6ea327305f109b905db92810fe98aabd7450aaa51299ee4246800fbbd17c3fe6b6f8ea57cf4e7abf718e3dc163412da60ce29f02c5af4184f692c522f05755e7fd32c0ca1cf0cdfc4f9f14c9814154e7eb3b100ae929567625dd572f91ccae04a68a8ffa33435b63df86a5169530bf302d33e02ed1a80ef648154397de7843e29e97c6dd82a1b2104a134fb32578a42ee39d88136a503999a02f819dbdefaa0dc6bcebd9894d211434bc8380d318ce4c5b4b3158a6499cee972eb01c58f300807e3b0a0a37bfaf84163860ea8ffbd8d6af63d79c3ea4871199ba2a4f9f880520cd616e0756fc391a81959bb09d2d222e4ed74d9b57d60c6a6643f881195d9b107428ee36b025b446678b07a502751e4a496c9c31b7185ed1cf2fc7318a75a6c5ea842c9be9465d64a51b53f6d1a807b7cae23d6e57a2708f3b66765ede6d935cc4f96bd5afb9a4e0d8080f5d4b3b8adb908be4170e34d7b34977664510c514daa2390f869388212d2e6039a08dc0722da543ed6cce8d89df9c0829d82ed428d2f98f6153a7f3a6c5e4554c28c5ded3d2cc98543bd59649abf027a20e987cc52fdd5b44d1c7598abdf6f2d7e8dd81ee03b2bbdd2d6c00bffcc115052ac88037d03f3df40ba3fb39d76bd2436b5e8a0753c13119581aecb6539e522cfecffcab011fff2a7f247893e9ba6f8252a89cc100b6f447488d75efe479ec68399d5680fe81771620a77b57e51fb13db6ef834e523d405aa81ab4c23f01ca5c53f48e92ed4974bda5094e499c456529b89a1375edc9a655a8e34c87995e4f82911ef7ccb0ec8cb353a33a24f09e2723c19d23589b7672030ebfc066665a8e03f88189f7e97eb7cc4327a9d5357c618864ddcb82993b5cee222081ca67bd3e2c0b2cbdb729169fabbcbb494d0b5dd9c99d195c7a35c5989226f2f988ad58a9783c701bc6c1159d52713c9382994b14e1335ffd64b06aed562e0b1dcfb08b4e1279a57b96848e32a61070b7649f73662b9a6b87c055042f5cc5b3a2e181fcaf7a11d3a27ca5eb880eac09ccfd0076ee054277642b8eaea80284cf6e1244094c0d404252aa97bda2ddd095be9a14a0fd6d3b425b92ec49b2dfbc6a3469ef03cfdd96a9e003bc8d474a9267ca48e87762a4ec4fdd6532412100ec59905fe3467fb4b930af44435f37bdbca52c67193ee9f02fce31261b983a181b39af949b4496a83d1f2843ccc464b8c3347406ddf16223066d9fd441461af9736b868ba455339312da74816d1d67f8c7688de67f730124fda32465721b540df36f2bc88861d428a80abca93f2f316e31e0a7da60a557f6b367faf7575cf9a460b60456dc00a15a020864d816e96a73f9a62c4afe10c4fe904a27993bd87b9f64adfa870097ad4e5a6e845ac9e4758304c96a68d5d738c84ff0b775393e4fc3e4325368ed2818fcadcf4c93f8e9f379d9ee5a2c0936e124dac230565d439ad039d155ab5b29a62835bb8a3bd21a3dce73a7a41bc5c1573b2c10b143d4eda6af557f1e1de73a946164e8eaee85317ba03564fd8a1a52c8d25d5601a00b4796803b228500e0f597239d764f3fa792ae5abf868194b45c824d87b06d8a810d1f0cc38806a308985db62784f08d2dc603b002b1a512c1197efc3d3650625b036300ec13f02744bf059233f57fe541fecea7a12d942c66af95a5c5db53581fb132302df2471e34eea940884d6fe4761f194ccc0a8b49c33d891637cd8afe0363c78c947b7094082c4cc01b4e0140bfcb74284aadfb05e4ea613a67a6e8ca205276ac75fe5217c18f5f75485bb7889ac680c0f077c4eca402195c4cab23fcfed6301174f7be0aa757496ada5658c4e48fe9ab50f145e51ec1554083bd8bef3ff167038226992608654b690ede9d572f5cfc42a9127c2e84c53fd6d8c904799d2d43f07f9377318356500914aff0996dbe157715e9bca9b1de62c265f9092b796a625ab4f3e060a8842a28f777c41a07c857a1748dd0ef1a7b3d39f5f4fa32de5ec6e0199311886930ce382cec7a93c182c11fa6087b09563ebf2550752b8b7d7c16e9d140c23f70fd57d2c4fe1f201c746a05749209250fa711bfbe1821b12a81088ca852863f9f06d09be0bc4ee80b7b6c9ef52261e01709414a733fb3735c03c9679776767367c9030935245017f951c0b88d2dd8b2bd198612ed43530ed5846ae17704dea0ed555c1b64a1733ad6695a29c7a142ac2b6c45d9b4f1ff849d502f4e495b88567cbc1fafbf181845c3b5746bccfc9f7efd413d8b59b653c6857f20d0850c8b6946adc1ed96156cfd5380a72deec9cf7068748b2adb55065decf89e5f486b9517d35806988df024eb45b728e602590fa631ffbf5649a8bb9907be67ad2092abb819aedc9212e0e37f7449ff0c45071d2bdb22032b9e3e9c85db5812fc422b196bfeed524c9bafa4c31e1bd6c66052e5768bf34aef832278902d2b812d8d7b3511bd5d5d3944aea54f772e410b4e4d6557591df31dc2312ea9fb7e7c48a2e549a6af1cab754fe31505722abb6a953b92dd22fd7ec8d4987c7fc92b91eeaad43c0da1666a0e504d27c91deed136fc024ea1ee766b93d8efaf86aeadf5eea538354ac8783c5127b642af50118879fc34517d30ddf6775697e238a84a51fa6a2f0450fe4cb675e7013eee9d1630115859e93f6b500a0e88ca125bd393921c159cd466d7b1ef65812419eaedc693ef409e40b3d928a89a5619df64ecbcbaab0c9b8f181b7d58be34d6ffeaf6040110cf9cb1208d5985b56b275a70acb84a6eafcc38a0822b3b27db8ed7fa43e0df28e5fed4cb4a61bfc835a4db2e2d80668bca50c38dfab61c3267573c806884dcf5bb5e5a4f8cea97533e3ee1739e4e1e6aae5fd5ce9827462"}) 14:37:23 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:23 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f00000001c0)=[0x0, 0x2], 0x2) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x2000, 0x1}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@empty}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000200)='eth1mime_type\x00', 0xe) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@timestamp, @mss={0x2, 0x2}, @sack_perm], 0x3) [ 441.109526][T24042] FAULT_INJECTION: forcing a failure. [ 441.109526][T24042] name failslab, interval 1, probability 0, space 0, times 0 14:37:23 executing program 1: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 441.207195][T24042] CPU: 1 PID: 24042 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 441.215221][T24042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.225279][T24042] Call Trace: [ 441.228599][T24042] dump_stack+0x172/0x1f0 [ 441.234600][T24042] should_fail.cold+0xa/0x15 [ 441.239202][T24042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 441.245029][T24042] ? ___might_sleep+0x163/0x280 [ 441.249898][T24042] __should_failslab+0x121/0x190 [ 441.254845][T24042] should_failslab+0x9/0x14 [ 441.260374][T24042] kmem_cache_alloc_node_trace+0x270/0x720 [ 441.268227][T24042] __kmalloc_node+0x3d/0x70 [ 441.273953][T24042] kvmalloc_node+0x68/0x100 [ 441.278464][T24042] __list_lru_init+0x4a6/0x6e0 [ 441.283245][T24042] alloc_super+0x78d/0x890 [ 441.287672][T24042] ? test_single_super+0x10/0x10 [ 441.292628][T24042] sget_userns+0xf1/0x560 [ 441.296964][T24042] ? kill_litter_super+0x60/0x60 [ 441.301907][T24042] ? test_single_super+0x10/0x10 [ 441.306848][T24042] ? kill_litter_super+0x60/0x60 [ 441.311799][T24042] sget+0x10c/0x150 [ 441.315617][T24042] mount_bdev+0xff/0x3c0 [ 441.319872][T24042] ? vfat_mount+0x40/0x40 [ 441.324212][T24042] vfat_mount+0x35/0x40 [ 441.324229][T24042] ? setup+0x120/0x120 [ 441.324244][T24042] legacy_get_tree+0xf2/0x200 [ 441.324262][T24042] vfs_get_tree+0x123/0x450 [ 441.324280][T24042] do_mount+0x1436/0x2c40 [ 441.324302][T24042] ? copy_mount_string+0x40/0x40 [ 441.324329][T24042] ? _copy_from_user+0xdd/0x150 14:37:23 executing program 1: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:23 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:23 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="ac030000", @ANYRES16=r2, @ANYBLOB="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"], 0x3ac}, 0x1, 0x0, 0x0, 0x4}, 0x50) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x67, @dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x3, 'lc\x00', 0x20, 0xfffffffffffffffc, 0x45}, 0x2c) [ 441.324351][T24042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.324376][T24042] ? copy_mount_options+0x280/0x3a0 [ 441.341748][T24042] ksys_mount+0xdb/0x150 [ 441.355828][T24042] __x64_sys_mount+0xbe/0x150 [ 441.355850][T24042] do_syscall_64+0x103/0x610 [ 441.355879][T24042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.355892][T24042] RIP: 0033:0x45b81a [ 441.355907][T24042] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 441.355915][T24042] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.355929][T24042] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 441.355945][T24042] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 441.371584][T24042] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 441.371594][T24042] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 441.371603][T24042] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:23 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:23 executing program 1: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) sendfile(r1, r1, &(0x7f0000000240), 0x80810002f79e) 14:37:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) syz_open_pts(r1, 0x0) 14:37:24 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:24 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) [ 441.706120][T24076] FAULT_INJECTION: forcing a failure. [ 441.706120][T24076] name failslab, interval 1, probability 0, space 0, times 0 [ 441.766505][T24076] CPU: 0 PID: 24076 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 441.774533][T24076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.784595][T24076] Call Trace: [ 441.787906][T24076] dump_stack+0x172/0x1f0 [ 441.792268][T24076] should_fail.cold+0xa/0x15 [ 441.796892][T24076] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 441.802721][T24076] ? ___might_sleep+0x163/0x280 [ 441.807586][T24076] __should_failslab+0x121/0x190 [ 441.812561][T24076] should_failslab+0x9/0x14 [ 441.817079][T24076] kmem_cache_alloc_trace+0x2d1/0x760 [ 441.822470][T24076] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 441.828299][T24076] __memcg_init_list_lru_node+0x8a/0x1e0 [ 441.833958][T24076] __list_lru_init+0x3cf/0x6e0 [ 441.838740][T24076] alloc_super+0x762/0x890 [ 441.843174][T24076] ? test_single_super+0x10/0x10 [ 441.848135][T24076] sget_userns+0xf1/0x560 [ 441.852487][T24076] ? kill_litter_super+0x60/0x60 [ 441.857446][T24076] ? test_single_super+0x10/0x10 [ 441.862401][T24076] ? kill_litter_super+0x60/0x60 [ 441.867366][T24076] sget+0x10c/0x150 [ 441.871186][T24076] mount_bdev+0xff/0x3c0 [ 441.875437][T24076] ? vfat_mount+0x40/0x40 [ 441.879786][T24076] vfat_mount+0x35/0x40 [ 441.883956][T24076] ? setup+0x120/0x120 [ 441.888035][T24076] legacy_get_tree+0xf2/0x200 [ 441.892721][T24076] vfs_get_tree+0x123/0x450 [ 441.897236][T24076] do_mount+0x1436/0x2c40 [ 441.901585][T24076] ? copy_mount_string+0x40/0x40 [ 441.906556][T24076] ? _copy_from_user+0xdd/0x150 [ 441.911425][T24076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.917672][T24076] ? copy_mount_options+0x280/0x3a0 [ 441.922887][T24076] ksys_mount+0xdb/0x150 [ 441.927144][T24076] __x64_sys_mount+0xbe/0x150 [ 441.931837][T24076] do_syscall_64+0x103/0x610 [ 441.936446][T24076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.942352][T24076] RIP: 0033:0x45b81a [ 441.946262][T24076] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 441.965872][T24076] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 441.974291][T24076] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 441.982279][T24076] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 441.990270][T24076] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 441.998259][T24076] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 442.006232][T24076] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:24 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:24 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:24 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:24 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 442.424823][T24102] FAULT_INJECTION: forcing a failure. [ 442.424823][T24102] name failslab, interval 1, probability 0, space 0, times 0 14:37:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:24 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) [ 442.535258][T24102] CPU: 0 PID: 24102 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 442.543307][T24102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.553386][T24102] Call Trace: [ 442.556696][T24102] dump_stack+0x172/0x1f0 [ 442.561043][T24102] should_fail.cold+0xa/0x15 [ 442.565643][T24102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 442.571464][T24102] ? ___might_sleep+0x163/0x280 [ 442.576334][T24102] __should_failslab+0x121/0x190 [ 442.581285][T24102] should_failslab+0x9/0x14 [ 442.585806][T24102] kmem_cache_alloc_trace+0x2d1/0x760 [ 442.591187][T24102] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 442.597014][T24102] __memcg_init_list_lru_node+0x8a/0x1e0 [ 442.602659][T24102] __list_lru_init+0x3cf/0x6e0 [ 442.607433][T24102] alloc_super+0x762/0x890 [ 442.611852][T24102] ? test_single_super+0x10/0x10 [ 442.616791][T24102] sget_userns+0xf1/0x560 [ 442.621122][T24102] ? kill_litter_super+0x60/0x60 [ 442.626063][T24102] ? test_single_super+0x10/0x10 [ 442.631005][T24102] ? kill_litter_super+0x60/0x60 [ 442.635944][T24102] sget+0x10c/0x150 [ 442.639758][T24102] mount_bdev+0xff/0x3c0 [ 442.644002][T24102] ? vfat_mount+0x40/0x40 [ 442.648348][T24102] vfat_mount+0x35/0x40 [ 442.652513][T24102] ? setup+0x120/0x120 [ 442.656584][T24102] legacy_get_tree+0xf2/0x200 [ 442.661268][T24102] vfs_get_tree+0x123/0x450 [ 442.665782][T24102] do_mount+0x1436/0x2c40 [ 442.670127][T24102] ? copy_mount_string+0x40/0x40 [ 442.675079][T24102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.681332][T24102] ? copy_mount_options+0x280/0x3a0 [ 442.686551][T24102] ksys_mount+0xdb/0x150 [ 442.690806][T24102] __x64_sys_mount+0xbe/0x150 [ 442.695492][T24102] do_syscall_64+0x103/0x610 [ 442.700090][T24102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.705986][T24102] RIP: 0033:0x45b81a [ 442.709891][T24102] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 442.729675][T24102] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 442.738094][T24102] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 442.746066][T24102] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 442.754040][T24102] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 442.762015][T24102] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 442.769987][T24102] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:25 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14) 14:37:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 442.960265][T24127] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:25 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:25 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14) [ 443.124672][T24139] FAULT_INJECTION: forcing a failure. [ 443.124672][T24139] name failslab, interval 1, probability 0, space 0, times 0 14:37:25 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 443.182935][T24149] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 443.222329][T24139] CPU: 0 PID: 24139 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 14:37:25 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 443.230375][T24139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.230385][T24139] Call Trace: [ 443.230426][T24139] dump_stack+0x172/0x1f0 [ 443.248123][T24139] should_fail.cold+0xa/0x15 [ 443.252734][T24139] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 443.260085][T24139] ? ___might_sleep+0x163/0x280 [ 443.260108][T24139] __should_failslab+0x121/0x190 14:37:25 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 443.260125][T24139] should_failslab+0x9/0x14 14:37:25 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 443.260144][T24139] kmem_cache_alloc_trace+0x2d1/0x760 [ 443.260163][T24139] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 443.260188][T24139] __memcg_init_list_lru_node+0x8a/0x1e0 [ 443.260209][T24139] __list_lru_init+0x3cf/0x6e0 [ 443.260230][T24139] alloc_super+0x762/0x890 [ 443.260247][T24139] ? test_single_super+0x10/0x10 [ 443.260264][T24139] sget_userns+0xf1/0x560 [ 443.260278][T24139] ? kill_litter_super+0x60/0x60 [ 443.260295][T24139] ? test_single_super+0x10/0x10 14:37:25 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 443.260307][T24139] ? kill_litter_super+0x60/0x60 14:37:25 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:25 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) [ 443.260333][T24139] sget+0x10c/0x150 [ 443.260353][T24139] mount_bdev+0xff/0x3c0 14:37:25 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 443.260375][T24139] ? vfat_mount+0x40/0x40 [ 443.260396][T24139] vfat_mount+0x35/0x40 [ 443.260411][T24139] ? setup+0x120/0x120 [ 443.260426][T24139] legacy_get_tree+0xf2/0x200 [ 443.260444][T24139] vfs_get_tree+0x123/0x450 [ 443.260462][T24139] do_mount+0x1436/0x2c40 [ 443.260482][T24139] ? copy_mount_string+0x40/0x40 [ 443.260503][T24139] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 443.260519][T24139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.260531][T24139] ? copy_mount_options+0x280/0x3a0 [ 443.260548][T24139] ksys_mount+0xdb/0x150 [ 443.260562][T24139] __x64_sys_mount+0xbe/0x150 [ 443.260581][T24139] do_syscall_64+0x103/0x610 [ 443.260601][T24139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.260613][T24139] RIP: 0033:0x45b81a [ 443.260627][T24139] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 443.260635][T24139] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:37:26 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020607031dfffd946fa2830020200a0003000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8002, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x10, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x4, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x80000001, 0x10001, 0x101, 0xfd6}, 0x14) 14:37:26 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:26 executing program 2 (fault-call:0 fault-nth:72): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 443.260647][T24139] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 443.260656][T24139] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 443.260664][T24139] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 443.260672][T24139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 443.260679][T24139] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 [ 443.582565][T24171] FAULT_INJECTION: forcing a failure. [ 443.582565][T24171] name failslab, interval 1, probability 0, space 0, times 0 14:37:26 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 443.582585][T24171] CPU: 0 PID: 24171 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 443.582594][T24171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.582600][T24171] Call Trace: [ 443.582623][T24171] dump_stack+0x172/0x1f0 [ 443.582646][T24171] should_fail.cold+0xa/0x15 [ 443.582667][T24171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 443.582690][T24171] ? ___might_sleep+0x163/0x280 [ 443.582712][T24171] __should_failslab+0x121/0x190 [ 443.582728][T24171] should_failslab+0x9/0x14 [ 443.582745][T24171] kmem_cache_alloc_trace+0x2d1/0x760 [ 443.582765][T24171] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 443.582789][T24171] __memcg_init_list_lru_node+0x8a/0x1e0 [ 443.582811][T24171] __list_lru_init+0x3cf/0x6e0 [ 443.582833][T24171] alloc_super+0x762/0x890 [ 443.582850][T24171] ? test_single_super+0x10/0x10 [ 443.582866][T24171] sget_userns+0xf1/0x560 [ 443.582881][T24171] ? kill_litter_super+0x60/0x60 [ 443.582898][T24171] ? test_single_super+0x10/0x10 [ 443.582911][T24171] ? kill_litter_super+0x60/0x60 14:37:26 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:26 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 443.582932][T24171] sget+0x10c/0x150 [ 443.582953][T24171] mount_bdev+0xff/0x3c0 [ 443.582969][T24171] ? vfat_mount+0x40/0x40 [ 443.582991][T24171] vfat_mount+0x35/0x40 [ 443.583007][T24171] ? setup+0x120/0x120 [ 443.583022][T24171] legacy_get_tree+0xf2/0x200 [ 443.583041][T24171] vfs_get_tree+0x123/0x450 [ 443.583059][T24171] do_mount+0x1436/0x2c40 [ 443.583083][T24171] ? copy_mount_string+0x40/0x40 [ 443.583100][T24171] ? _copy_from_user+0xdd/0x150 [ 443.583121][T24171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:37:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 443.583135][T24171] ? copy_mount_options+0x280/0x3a0 [ 443.583156][T24171] ksys_mount+0xdb/0x150 [ 443.583174][T24171] __x64_sys_mount+0xbe/0x150 [ 443.583197][T24171] do_syscall_64+0x103/0x610 [ 443.583218][T24171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.583230][T24171] RIP: 0033:0x45b81a [ 443.583246][T24171] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:37:26 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) [ 443.583255][T24171] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 443.583271][T24171] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 443.583281][T24171] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 443.583291][T24171] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 443.583300][T24171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 443.583310][T24171] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 [ 443.789840][T24189] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 444.049676][T24193] FAULT_INJECTION: forcing a failure. [ 444.049676][T24193] name failslab, interval 1, probability 0, space 0, times 0 14:37:26 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 444.132297][T24193] CPU: 0 PID: 24193 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 444.140356][T24193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.150422][T24193] Call Trace: [ 444.153729][T24193] dump_stack+0x172/0x1f0 [ 444.158078][T24193] should_fail.cold+0xa/0x15 [ 444.162689][T24193] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.168509][T24193] ? ___might_sleep+0x163/0x280 [ 444.173385][T24193] __should_failslab+0x121/0x190 [ 444.178344][T24193] should_failslab+0x9/0x14 [ 444.182861][T24193] __kmalloc+0x2dc/0x740 [ 444.187115][T24193] ? __list_lru_init+0xd1/0x6e0 [ 444.191980][T24193] __list_lru_init+0xd1/0x6e0 [ 444.196673][T24193] alloc_super+0x78d/0x890 [ 444.201091][T24193] ? test_single_super+0x10/0x10 [ 444.201109][T24193] sget_userns+0xf1/0x560 [ 444.201127][T24193] ? kill_litter_super+0x60/0x60 [ 444.215344][T24193] ? test_single_super+0x10/0x10 [ 444.220296][T24193] ? kill_litter_super+0x60/0x60 [ 444.225256][T24193] sget+0x10c/0x150 [ 444.229079][T24193] mount_bdev+0xff/0x3c0 [ 444.233334][T24193] ? vfat_mount+0x40/0x40 [ 444.237683][T24193] vfat_mount+0x35/0x40 [ 444.241848][T24193] ? setup+0x120/0x120 [ 444.245925][T24193] legacy_get_tree+0xf2/0x200 [ 444.250615][T24193] vfs_get_tree+0x123/0x450 [ 444.255216][T24193] do_mount+0x1436/0x2c40 [ 444.260037][T24193] ? copy_mount_string+0x40/0x40 [ 444.264989][T24193] ? _copy_from_user+0xdd/0x150 [ 444.265012][T24193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.265026][T24193] ? copy_mount_options+0x280/0x3a0 [ 444.265045][T24193] ksys_mount+0xdb/0x150 [ 444.276125][T24193] __x64_sys_mount+0xbe/0x150 [ 444.276147][T24193] do_syscall_64+0x103/0x610 [ 444.276172][T24193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.300712][T24193] RIP: 0033:0x45b81a [ 444.304611][T24193] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 444.324219][T24193] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:37:26 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:26 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:26 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:26 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) [ 444.332638][T24193] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 444.340611][T24193] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 444.340621][T24193] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 444.340629][T24193] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 444.340638][T24193] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:26 executing program 2 (fault-call:0 fault-nth:73): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:26 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:26 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:26 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:26 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 444.556485][T24236] FAULT_INJECTION: forcing a failure. [ 444.556485][T24236] name failslab, interval 1, probability 0, space 0, times 0 [ 444.569923][T24236] CPU: 0 PID: 24236 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 444.577926][T24236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.587990][T24236] Call Trace: [ 444.591300][T24236] dump_stack+0x172/0x1f0 [ 444.595666][T24236] should_fail.cold+0xa/0x15 [ 444.600274][T24236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 444.606289][T24236] ? ___might_sleep+0x163/0x280 [ 444.611169][T24236] __should_failslab+0x121/0x190 [ 444.616116][T24236] should_failslab+0x9/0x14 [ 444.620663][T24236] kmem_cache_alloc_trace+0x2d1/0x760 [ 444.626053][T24236] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 444.631881][T24236] __memcg_init_list_lru_node+0x8a/0x1e0 [ 444.637534][T24236] __list_lru_init+0x3cf/0x6e0 [ 444.642326][T24236] alloc_super+0x78d/0x890 [ 444.646760][T24236] ? test_single_super+0x10/0x10 [ 444.651708][T24236] sget_userns+0xf1/0x560 [ 444.656041][T24236] ? kill_litter_super+0x60/0x60 [ 444.660983][T24236] ? test_single_super+0x10/0x10 [ 444.665920][T24236] ? kill_litter_super+0x60/0x60 [ 444.670859][T24236] sget+0x10c/0x150 [ 444.674685][T24236] mount_bdev+0xff/0x3c0 [ 444.678933][T24236] ? vfat_mount+0x40/0x40 [ 444.683281][T24236] vfat_mount+0x35/0x40 [ 444.687453][T24236] ? setup+0x120/0x120 [ 444.687469][T24236] legacy_get_tree+0xf2/0x200 [ 444.687489][T24236] vfs_get_tree+0x123/0x450 [ 444.687507][T24236] do_mount+0x1436/0x2c40 [ 444.687529][T24236] ? copy_mount_string+0x40/0x40 [ 444.696275][T24236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.696292][T24236] ? copy_mount_options+0x280/0x3a0 [ 444.696312][T24236] ksys_mount+0xdb/0x150 [ 444.725766][T24236] __x64_sys_mount+0xbe/0x150 [ 444.730461][T24236] do_syscall_64+0x103/0x610 [ 444.735066][T24236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.740968][T24236] RIP: 0033:0x45b81a 14:37:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 444.744870][T24236] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 444.764577][T24236] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 444.773001][T24236] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 444.780986][T24236] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 444.788971][T24236] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 444.796949][T24236] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:37:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 444.804927][T24236] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:27 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:27 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:27 executing program 2 (fault-call:0 fault-nth:74): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:27 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:27 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:27 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:27 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:27 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:27 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 445.360884][T24283] FAULT_INJECTION: forcing a failure. [ 445.360884][T24283] name failslab, interval 1, probability 0, space 0, times 0 [ 445.561950][T24283] CPU: 1 PID: 24283 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 445.569992][T24283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.580141][T24283] Call Trace: [ 445.583453][T24283] dump_stack+0x172/0x1f0 [ 445.583479][T24283] should_fail.cold+0xa/0x15 [ 445.583499][T24283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 445.583525][T24283] ? ___might_sleep+0x163/0x280 [ 445.583549][T24283] __should_failslab+0x121/0x190 [ 445.583567][T24283] should_failslab+0x9/0x14 [ 445.583588][T24283] kmem_cache_alloc_node_trace+0x270/0x720 [ 445.583615][T24283] __kmalloc_node+0x3d/0x70 [ 445.583635][T24283] kvmalloc_node+0x68/0x100 [ 445.627499][T24283] __list_lru_init+0x4a6/0x6e0 [ 445.632278][T24283] alloc_super+0x78d/0x890 [ 445.636719][T24283] ? test_single_super+0x10/0x10 [ 445.641669][T24283] sget_userns+0xf1/0x560 [ 445.646007][T24283] ? kill_litter_super+0x60/0x60 [ 445.650950][T24283] ? test_single_super+0x10/0x10 [ 445.655975][T24283] ? kill_litter_super+0x60/0x60 [ 445.660914][T24283] sget+0x10c/0x150 [ 445.664735][T24283] mount_bdev+0xff/0x3c0 [ 445.668984][T24283] ? vfat_mount+0x40/0x40 [ 445.673332][T24283] vfat_mount+0x35/0x40 [ 445.677493][T24283] ? setup+0x120/0x120 [ 445.681567][T24283] legacy_get_tree+0xf2/0x200 [ 445.686257][T24283] vfs_get_tree+0x123/0x450 [ 445.690776][T24283] do_mount+0x1436/0x2c40 [ 445.695144][T24283] ? copy_mount_string+0x40/0x40 [ 445.700112][T24283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.706364][T24283] ? copy_mount_options+0x280/0x3a0 [ 445.711579][T24283] ksys_mount+0xdb/0x150 [ 445.715838][T24283] __x64_sys_mount+0xbe/0x150 [ 445.720552][T24283] do_syscall_64+0x103/0x610 [ 445.725247][T24283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.731253][T24283] RIP: 0033:0x45b81a [ 445.735157][T24283] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 445.754769][T24283] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 445.763200][T24283] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 445.771194][T24283] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 445.779182][T24283] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 445.787166][T24283] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 445.795147][T24283] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:28 executing program 2 (fault-call:0 fault-nth:75): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:28 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:28 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:28 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:28 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 446.015952][T24313] FAULT_INJECTION: forcing a failure. [ 446.015952][T24313] name failslab, interval 1, probability 0, space 0, times 0 14:37:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 446.132050][T24313] CPU: 0 PID: 24313 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 446.140083][T24313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.150150][T24313] Call Trace: [ 446.153464][T24313] dump_stack+0x172/0x1f0 [ 446.157818][T24313] should_fail.cold+0xa/0x15 [ 446.162435][T24313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 446.168268][T24313] ? ___might_sleep+0x163/0x280 [ 446.173174][T24313] __should_failslab+0x121/0x190 [ 446.178124][T24313] should_failslab+0x9/0x14 [ 446.182642][T24313] kmem_cache_alloc_node_trace+0x270/0x720 [ 446.188466][T24313] __kmalloc_node+0x3d/0x70 [ 446.192980][T24313] kvmalloc_node+0x68/0x100 [ 446.197496][T24313] __list_lru_init+0x4a6/0x6e0 [ 446.202271][T24313] alloc_super+0x78d/0x890 [ 446.206694][T24313] ? test_single_super+0x10/0x10 [ 446.211640][T24313] sget_userns+0xf1/0x560 [ 446.215980][T24313] ? kill_litter_super+0x60/0x60 [ 446.220925][T24313] ? test_single_super+0x10/0x10 [ 446.225868][T24313] ? kill_litter_super+0x60/0x60 [ 446.230807][T24313] sget+0x10c/0x150 [ 446.234627][T24313] mount_bdev+0xff/0x3c0 [ 446.238872][T24313] ? vfat_mount+0x40/0x40 [ 446.243210][T24313] vfat_mount+0x35/0x40 [ 446.247376][T24313] ? setup+0x120/0x120 [ 446.251454][T24313] legacy_get_tree+0xf2/0x200 [ 446.256570][T24313] vfs_get_tree+0x123/0x450 [ 446.261086][T24313] do_mount+0x1436/0x2c40 [ 446.261111][T24313] ? copy_mount_string+0x40/0x40 [ 446.261137][T24313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.261158][T24313] ? copy_mount_options+0x280/0x3a0 14:37:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 446.270413][T24313] ksys_mount+0xdb/0x150 [ 446.270433][T24313] __x64_sys_mount+0xbe/0x150 [ 446.270456][T24313] do_syscall_64+0x103/0x610 [ 446.270478][T24313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.270496][T24313] RIP: 0033:0x45b81a [ 446.281903][T24313] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 446.281913][T24313] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 446.281928][T24313] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 446.281939][T24313] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 446.281948][T24313] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 446.281958][T24313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 446.281967][T24313] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:28 executing program 2 (fault-call:0 fault-nth:76): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:28 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:28 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:29 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:29 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 446.599335][T24357] FAULT_INJECTION: forcing a failure. [ 446.599335][T24357] name failslab, interval 1, probability 0, space 0, times 0 [ 446.669215][T24357] CPU: 0 PID: 24357 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 [ 446.677252][T24357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.687328][T24357] Call Trace: [ 446.690655][T24357] dump_stack+0x172/0x1f0 [ 446.695018][T24357] should_fail.cold+0xa/0x15 [ 446.699630][T24357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 446.705465][T24357] ? ___might_sleep+0x163/0x280 [ 446.710345][T24357] __should_failslab+0x121/0x190 [ 446.715300][T24357] should_failslab+0x9/0x14 [ 446.719828][T24357] kmem_cache_alloc_trace+0x2d1/0x760 [ 446.725215][T24357] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 446.731046][T24357] __memcg_init_list_lru_node+0x8a/0x1e0 [ 446.736694][T24357] __list_lru_init+0x3cf/0x6e0 [ 446.736717][T24357] alloc_super+0x78d/0x890 [ 446.736736][T24357] ? test_single_super+0x10/0x10 [ 446.750874][T24357] sget_userns+0xf1/0x560 [ 446.755209][T24357] ? kill_litter_super+0x60/0x60 [ 446.755228][T24357] ? test_single_super+0x10/0x10 [ 446.755241][T24357] ? kill_litter_super+0x60/0x60 [ 446.755259][T24357] sget+0x10c/0x150 [ 446.773853][T24357] mount_bdev+0xff/0x3c0 [ 446.778104][T24357] ? vfat_mount+0x40/0x40 [ 446.782451][T24357] vfat_mount+0x35/0x40 [ 446.786621][T24357] ? setup+0x120/0x120 [ 446.790698][T24357] legacy_get_tree+0xf2/0x200 [ 446.795398][T24357] vfs_get_tree+0x123/0x450 [ 446.799919][T24357] do_mount+0x1436/0x2c40 [ 446.804264][T24357] ? copy_mount_string+0x40/0x40 [ 446.809221][T24357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:37:29 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:29 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 446.815479][T24357] ? copy_mount_options+0x280/0x3a0 [ 446.820699][T24357] ksys_mount+0xdb/0x150 [ 446.824956][T24357] __x64_sys_mount+0xbe/0x150 [ 446.829644][T24357] do_syscall_64+0x103/0x610 [ 446.834257][T24357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.840159][T24357] RIP: 0033:0x45b81a [ 446.844061][T24357] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 446.863681][T24357] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 446.863698][T24357] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 446.863705][T24357] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 446.863713][T24357] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 446.863722][T24357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 446.863730][T24357] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:29 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:29 executing program 2 (fault-call:0 fault-nth:77): syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:29 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:29 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:29 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 447.119361][T24383] FAULT_INJECTION: forcing a failure. [ 447.119361][T24383] name failslab, interval 1, probability 0, space 0, times 0 [ 447.152122][T24383] CPU: 1 PID: 24383 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #96 14:37:29 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) [ 447.160139][T24383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.170199][T24383] Call Trace: [ 447.173510][T24383] dump_stack+0x172/0x1f0 [ 447.177873][T24383] should_fail.cold+0xa/0x15 [ 447.182476][T24383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 447.188289][T24383] ? ___might_sleep+0x163/0x280 [ 447.193164][T24383] __should_failslab+0x121/0x190 [ 447.198110][T24383] should_failslab+0x9/0x14 [ 447.202621][T24383] kmem_cache_alloc_trace+0x2d1/0x760 [ 447.208104][T24383] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 447.218636][T24383] __memcg_init_list_lru_node+0x8a/0x1e0 [ 447.224462][T24383] __list_lru_init+0x3cf/0x6e0 [ 447.229243][T24383] alloc_super+0x78d/0x890 [ 447.233674][T24383] ? test_single_super+0x10/0x10 [ 447.238621][T24383] sget_userns+0xf1/0x560 [ 447.242957][T24383] ? kill_litter_super+0x60/0x60 [ 447.247901][T24383] ? test_single_super+0x10/0x10 [ 447.252844][T24383] ? kill_litter_super+0x60/0x60 [ 447.258670][T24383] sget+0x10c/0x150 [ 447.262492][T24383] mount_bdev+0xff/0x3c0 [ 447.266739][T24383] ? vfat_mount+0x40/0x40 [ 447.271079][T24383] vfat_mount+0x35/0x40 [ 447.275244][T24383] ? setup+0x120/0x120 [ 447.279326][T24383] legacy_get_tree+0xf2/0x200 [ 447.284010][T24383] vfs_get_tree+0x123/0x450 [ 447.288520][T24383] do_mount+0x1436/0x2c40 [ 447.292900][T24383] ? copy_mount_string+0x40/0x40 [ 447.297854][T24383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.304101][T24383] ? copy_mount_options+0x280/0x3a0 [ 447.309308][T24383] ksys_mount+0xdb/0x150 [ 447.313570][T24383] __x64_sys_mount+0xbe/0x150 [ 447.318256][T24383] do_syscall_64+0x103/0x610 [ 447.322866][T24383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.328761][T24383] RIP: 0033:0x45b81a [ 447.332676][T24383] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 447.352293][T24383] RSP: 002b:00007fae7f63ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 447.360806][T24383] RAX: ffffffffffffffda RBX: 00007fae7f63eb40 RCX: 000000000045b81a [ 447.368778][T24383] RDX: 00007fae7f63eae0 RSI: 0000000020000000 RDI: 00007fae7f63eb00 [ 447.376754][T24383] RBP: 0000000000000001 R08: 00007fae7f63eb40 R09: 00007fae7f63eae0 [ 447.384728][T24383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 447.393234][T24383] R13: 00000000004c79d9 R14: 00000000004dda18 R15: 0000000000000003 14:37:29 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:29 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:30 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)=r0) 14:37:30 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0) 14:37:30 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:30 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0) 14:37:30 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 448.413855][T24447] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 448.429868][T24447] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 448.449422][T24447] FAT-fs (loop2): Filesystem has been set read-only 14:37:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='\nfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:30 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000600)=r0) 14:37:30 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:30 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 4: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:31 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) 14:37:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='%fat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:31 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) 14:37:31 executing program 4: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 4: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:31 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) 14:37:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='v\nat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:31 executing program 0: r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)) 14:37:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='v%at\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:32 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)) 14:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:32 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:32 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000600)) 14:37:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='v.at\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:32 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:32 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='v/at\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:32 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:32 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:32 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:33 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='voat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:33 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:33 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x0, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:33 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vf\nt\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:33 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:33 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:33 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40, 0x9) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r2, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) r3 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000700)={{0x1, 0x7, 0xffffffffffff8001, 0x0, 'syz0\x00'}, 0x0, [0xfad, 0x1, 0x3, 0x794, 0x9, 0x101, 0xb8f, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x2, 0x81, 0x1, 0x9, 0x7f, 0x9, 0x5, 0x10000, 0x20, 0x80000000, 0xfc7, 0x7, 0x1000, 0x0, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x0, 0x9, 0x1, 0x101, 0x8, 0x1ff, 0x8, 0x3f, 0x3, 0xf5b, 0x5, 0x8, 0xfd, 0x2, 0x3, 0x6, 0xcc86, 0x7fffffff, 0x1000, 0x4, 0x8, 0x5, 0x80, 0x0, 0x7, 0x9, 0x5, 0xe226, 0xff, 0x80000000, 0xd7e, 0x1, 0x4, 0x5, 0x3, 0x80000001, 0x401, 0x3, 0x7, 0x400, 0x9, 0x33af, 0x27, 0x180000000000, 0x3, 0xf1e4, 0xff, 0x3f52, 0x3f, 0x200000000000000, 0xed, 0xf806, 0x7, 0x2, 0x7, 0xf7, 0xae0000000000, 0xc, 0x9, 0x17d0db, 0x4, 0x1, 0x0, 0x20, 0x4, 0x4, 0x10001, 0xffffffffffff0000, 0xf95c, 0x7, 0x7d, 0x2, 0x0, 0x2, 0x800, 0x0, 0x8d0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xbc60, 0xfff, 0x3, 0x2, 0x0, 0x6, 0x7, 0x7ef, 0x2, 0xe9c, 0x1000, 0x2, 0xcd9a, 0x1, 0xa3, 0x3, 0x8000000, 0x100000001, 0x6], {0x77359400}}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:33 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vf%t\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x0, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:33 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 451.611500][ T26] audit: type=1804 audit(1556807853.972:136): pid=24693 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir854897420/syzkaller.F2xry3/758/bus" dev="sda1" ino=17927 res=1 14:37:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfet\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:34 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40, 0x9) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r2, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) r3 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000700)={{0x1, 0x7, 0xffffffffffff8001, 0x0, 'syz0\x00'}, 0x0, [0xfad, 0x1, 0x3, 0x794, 0x9, 0x101, 0xb8f, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x2, 0x81, 0x1, 0x9, 0x7f, 0x9, 0x5, 0x10000, 0x20, 0x80000000, 0xfc7, 0x7, 0x1000, 0x0, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x0, 0x9, 0x1, 0x101, 0x8, 0x1ff, 0x8, 0x3f, 0x3, 0xf5b, 0x5, 0x8, 0xfd, 0x2, 0x3, 0x6, 0xcc86, 0x7fffffff, 0x1000, 0x4, 0x8, 0x5, 0x80, 0x0, 0x7, 0x9, 0x5, 0xe226, 0xff, 0x80000000, 0xd7e, 0x1, 0x4, 0x5, 0x3, 0x80000001, 0x401, 0x3, 0x7, 0x400, 0x9, 0x33af, 0x27, 0x180000000000, 0x3, 0xf1e4, 0xff, 0x3f52, 0x3f, 0x200000000000000, 0xed, 0xf806, 0x7, 0x2, 0x7, 0xf7, 0xae0000000000, 0xc, 0x9, 0x17d0db, 0x4, 0x1, 0x0, 0x20, 0x4, 0x4, 0x10001, 0xffffffffffff0000, 0xf95c, 0x7, 0x7d, 0x2, 0x0, 0x2, 0x800, 0x0, 0x8d0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xbc60, 0xfff, 0x3, 0x2, 0x0, 0x6, 0x7, 0x7ef, 0x2, 0xe9c, 0x1000, 0x2, 0xcd9a, 0x1, 0xa3, 0x3, 0x8000000, 0x100000001, 0x6], {0x77359400}}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:34 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:34 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 452.176206][ T26] audit: type=1804 audit(1556807854.542:137): pid=24833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir854897420/syzkaller.F2xry3/759/bus" dev="sda1" ino=17959 res=1 14:37:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfot\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:34 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:34 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:34 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40, 0x9) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r2, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, 0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) r3 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000700)={{0x1, 0x7, 0xffffffffffff8001, 0x0, 'syz0\x00'}, 0x0, [0xfad, 0x1, 0x3, 0x794, 0x9, 0x101, 0xb8f, 0x7ff, 0x8001, 0xfffffffffffffffb, 0x2, 0x81, 0x1, 0x9, 0x7f, 0x9, 0x5, 0x10000, 0x20, 0x80000000, 0xfc7, 0x7, 0x1000, 0x0, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x0, 0x9, 0x1, 0x101, 0x8, 0x1ff, 0x8, 0x3f, 0x3, 0xf5b, 0x5, 0x8, 0xfd, 0x2, 0x3, 0x6, 0xcc86, 0x7fffffff, 0x1000, 0x4, 0x8, 0x5, 0x80, 0x0, 0x7, 0x9, 0x5, 0xe226, 0xff, 0x80000000, 0xd7e, 0x1, 0x4, 0x5, 0x3, 0x80000001, 0x401, 0x3, 0x7, 0x400, 0x9, 0x33af, 0x27, 0x180000000000, 0x3, 0xf1e4, 0xff, 0x3f52, 0x3f, 0x200000000000000, 0xed, 0xf806, 0x7, 0x2, 0x7, 0xf7, 0xae0000000000, 0xc, 0x9, 0x17d0db, 0x4, 0x1, 0x0, 0x20, 0x4, 0x4, 0x10001, 0xffffffffffff0000, 0xf95c, 0x7, 0x7d, 0x2, 0x0, 0x2, 0x800, 0x0, 0x8d0, 0xffffffffffffffff, 0x0, 0xfffffffffffffff8, 0xbc60, 0xfff, 0x3, 0x2, 0x0, 0x6, 0x7, 0x7ef, 0x2, 0xe9c, 0x1000, 0x2, 0xcd9a, 0x1, 0xa3, 0x3, 0x8000000, 0x100000001, 0x6], {0x77359400}}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:35 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfa\n\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 452.750299][T24833] syz-executor.5 (24833) used greatest stack depth: 23032 bytes left 14:37:35 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff), 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 452.948085][ T26] audit: type=1804 audit(1556807855.312:138): pid=24984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir854897420/syzkaller.F2xry3/760/bus" dev="sda1" ino=17955 res=1 14:37:35 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfa%\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:35 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:35 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:35 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 453.501441][T24984] syz-executor.5 (24984) used greatest stack depth: 22968 bytes left 14:37:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x02', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:36 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e2"], 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e2"], 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x03', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 14:37:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 5: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, 0x0, 0x0) 14:37:36 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e2"], 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, 0x0, 0x0) 14:37:36 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000"], 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, 0x0, 0x0) 14:37:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x05', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:37 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f"], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000"], 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) 14:37:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x06', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:37 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f"], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000"], 0x24) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) 14:37:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0) 14:37:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) 14:37:37 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f"], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\a', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:37 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:37 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0) 14:37:37 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0) 14:37:37 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d"], 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x6e30, &(0x7f0000000180)=""/60, 0x3c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={0x0, 0x0, 0x400}, 0x0, 0x0, 0x0) 14:37:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\t', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:38 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d"], 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 1: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\n', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:38 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d"], 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 1: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:38 executing program 3: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:38 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x0e', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:39 executing program 1: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300"], 0x12) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 3: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 5: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 3: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300"], 0x12) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x10', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:39 executing program 5: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 5: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300"], 0x12) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x14', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:39 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000"], 0x15) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:39 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:39 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:40 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat#', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:40 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000"], 0x15) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00000000000000000000002000"], 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:40 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000"], 0x15) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 5: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f00"/42], 0x2a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfatH', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb9030006000084"], 0x16) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfatL', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:40 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:40 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb9030006000084"], 0x16) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:40 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:41 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat`', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb9030006000084"], 0x16) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x2) 14:37:41 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@hyper}) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x3ff, 0x5, 0x1}) 14:37:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5411) 14:37:41 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfath', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:41 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) prctl$PR_SVE_SET_VL(0x32, 0xc260) 14:37:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x541b) 14:37:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5421) 14:37:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfatl', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:41 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) accept4$netrom(r1, 0x0, &(0x7f0000000040), 0x800) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000100)) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f00000000c0)={0x10000, 0xc170c, "e21d5cabac62e21d2e23a65e3f631f5fe638f3f9f9ddad09", {0x100000000, 0x9}, 0x100}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) syz_read_part_table(0x1, 0x4, &(0x7f0000000400)=[{&(0x7f0000000140)="1e6ada1aedcaed1368c53355cf168cf1479e05d1e83ed6b6ddc04c2bff159037bf03ac0c6ebccd1f47b0b18c46", 0x2d, 0x6}, {&(0x7f0000000180)="89c7d24987dd43b0d6add3ff1e8f692f8810338fe9cb2614e7a2a1e9e873f649ebd2b477b9366c6953813eaaf87def2622d1d7c4133c7c26334121c19e38dd97532481bd6fca70a15e1b4b4b03cd7b462ff624aa84ea311a2ff2c183aee73b61d2bff96513b4f55ce91ff9321a6c9c9958670638329110cf6fe0818003bc99e71890c0e8c819fbffa4100faa6d6336a967133daf274fdcd6a585d23b33ed78", 0x9f, 0x1}, {&(0x7f0000000240)="77fb5098c3baae166acf30e36a1be32b9a27d4b6f6d75db0dca69f5d414afcc53d635b53f4b9d42aa5548d9c12bec67482defcca53581faf89cb12b9cf99e65e0576fbcd3cc2ee0d8ada7a6b6b766f11565ba43ae0f25a1a069fdaad3f0a833635d2319b1900dfa2a196246c2e2033a720b990ef4208205b860a08dde090e09a42d11b175c972323e280a2dc92799c0f", 0x90, 0x80000000}, {&(0x7f0000000300)="cf3eb1e317ee2b06c5d2560000ca4a49b55f28a7cc72abd18822c8562bd7809a4b97ba4fe42d4acdd22c68b88c9fc38c8b23eac713a01e9ce40782a7cbdca5b231ee7c7afaf21d216f4ff7c38d81c23f96570f177608a3b0f73092cbc2ac59bb11d7de28d440ad0f84b5fc9cd22509b54d1afd0e33e6522d589c6b020caf4b8fe10c6e524355122a0f7f85a22d7d9ce17026e58d6b9bf7b9956ee5ced7d730d552b66fb940e16dd3c1421b29399012a982a9bfc3440071a177e6399aae1c29652ca55242e8ca3d50bc", 0xc9}]) 14:37:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5450) 14:37:41 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:41 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5451) 14:37:42 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfatt', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:42 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='vmnet0vboxnet0\x00', 0xf, 0x3) 14:37:42 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5452) 14:37:42 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x5460) 14:37:42 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x401, 0x40) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x10800, 0x0) connect$rds(r1, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfatz', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:42 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8901) 14:37:42 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:42 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = shmget$private(0x0, 0x3000, 0x18, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000280)=""/10) r2 = accept(r0, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000240)=0x80) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f900e6ce558496f75ea67d903c3a0dda3d66f31fe08fbd43784614575d2709f636168a137cd4776cf20fa9f349c486f9950f0f6e261364642573abd961cb6130867d7dca43738f54b63a42c8a2ffcbba4e5a8c8a3b799767a76372a13c0ffcc7892da48fd8a65b8aebde246bf6b2c1036f3629ef02819044de6d0655a4a2f36b69e4cc", 0x83, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, r4, 0xec, r5) 14:37:42 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:42 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8902) 14:37:43 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 460.625133][T26544] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 460.644548][T26544] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:43 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x30000) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x71e04ab7, 0x91, 0x3, 0x7, 0x2ab}) rt_sigaction(0x3b, &(0x7f00000001c0)={&(0x7f0000000100)="66450f38db74cd2dc462fd1773ec95640f1f00400f95080f495017c42178ae50da2e64f3440fbd6f9366450f72d200c483bd48be8400000000", {0x1}, 0x80000000, &(0x7f0000000140)="c442d5901c36410f01dd67470f72d7e2c481e351b1ff0000002e3e2e2e2e66420f3a62570000f3a70fa36800410f1aa9da64ec3bc4c3fd7977adb80f03be05000000"}, 0x0, 0x8, &(0x7f0000000200)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000080)={0x0, 0x0, {0xff, 0x1, 0x3014, 0x7, 0x9, 0xf, 0x2, 0x5}}) [ 460.681913][T26544] FAT-fs (loop2): Filesystem has been set read-only 14:37:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 460.748772][T26544] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 460.777185][T26544] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8903) [ 460.818818][T26544] FAT-fs (loop2): Filesystem has been set read-only 14:37:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat)', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:43 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8904) 14:37:43 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8906) 14:37:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8907) 14:37:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat*', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:43 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:43 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:43 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e24, 0xffffffff850c4dc5, @ipv4={[], [], @broadcast}, 0xff}, {0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0xbabc}, 0xfff, [0x7, 0x1, 0x3, 0x406, 0x0, 0xffffffffffffffff, 0x9, 0x1000]}, 0x5c) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x890b) 14:37:43 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x890c) 14:37:43 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8915) 14:37:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfatB', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:44 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x281) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000500)=0xe8) getgroups(0x2, &(0x7f0000000540)=[0x0, 0xffffffffffffffff]) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000700)={0x2b0, 0x0, 0x3, [{{0x6, 0x2, 0x5, 0x4, 0xda5f, 0x8, {0x6, 0xfc, 0xe000000000000, 0xa4a9, 0x6, 0x3, 0x0, 0x3, 0x7, 0x400, 0x5, r2, r3, 0x8c7c, 0x400}}, {0x6, 0x7, 0x7, 0x5, ')[^:em0'}}, {{0x4, 0x3, 0x7fffffff, 0x80000001, 0xfffffffffffffe01, 0x7fffffff, {0x6, 0x895, 0xf8, 0xb9, 0x1f, 0x3, 0x7, 0x2, 0x4, 0x219d, 0x1, r4, r5, 0x5, 0xfffffffff28d1975}}, {0x2, 0x0, 0x18, 0x81, 'mime_type[J#bdevvboxnet0'}}, {{0x6, 0x1, 0x1, 0x9, 0x6, 0xc00, {0x5, 0x4b2, 0x8, 0xfffffffffffffffc, 0x400, 0x4, 0xdd08, 0xffffffff, 0xfffffffffffffffa, 0x6, 0x10001, r6, r7, 0x8, 0x2}}, {0x0, 0x5, 0xb, 0xa0e, 'wlan0)wlan0'}}, {{0x2, 0x1, 0x6, 0x7fffffff, 0x4c4, 0x3cfc44bf000000, {0x2, 0x100, 0x8001, 0x983a, 0x401, 0x20, 0x1, 0xaef, 0x3f, 0xffffffffffffff9e, 0x8, r8, r9, 0x3, 0x7}}, {0x2, 0x9ff1, 0xc, 0x4, '/dev/media#\x00'}}]}, 0x2b0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:44 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:44 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x891e) 14:37:44 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) sendto$llc(r0, &(0x7f0000000040)="ff4a5534f735366d5463d17579a9e4b5d21c76af1f2878dca9a2b45c8afad6ff93a79539152633e111ce741f2efa5daec36d9d966765f960d2b1d61031ca0ae44c2adfd54681e3ad96716e", 0x4b, 0x8000, &(0x7f00000000c0)={0x1a, 0x11f, 0x5359, 0x5, 0x10001, 0x2, @broadcast}, 0x10) 14:37:44 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8940) 14:37:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat|', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:44 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8941) 14:37:44 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x12478a9b) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000040)=[r1, r1, r1, r1, r1, r1, r1], 0x7) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:37:44 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:44 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x894c) 14:37:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat}', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:44 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:44 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8980) 14:37:45 executing program 5: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:45 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat~', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8981) 14:37:45 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x401, @null, @netrom={'nr', 0x0}, 0x2, [@bcast, @null, @null, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 14:37:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8982) 14:37:45 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x8983) 14:37:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x7f', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:45 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$SIOCRSACCEPT(r1, 0x89e3) dup(r1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x162) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89a0) 14:37:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89a1) 14:37:45 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:45 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e0) 14:37:45 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x200080, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000280)={0xff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r3}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x5, 0x2, 0x3, 0x8, 0xfffffffffffffff9, 0x2}, 0x20) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000001, 0x40002) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000140)={0xd, @sliced={0x0, [0x10000, 0x7, 0x100000000, 0x80000001, 0x7f, 0xffffffffffff14db, 0x7fffffff, 0x20, 0x574b, 0x5, 0xfffffffffffffffb, 0xfff, 0xfadf, 0xb5, 0x80000001, 0x42, 0x2, 0x4f48825c, 0x9, 0x3ff, 0x9b28, 0x7f, 0x7, 0x3, 0x3, 0xa5, 0x7, 0xdd, 0x3, 0x4, 0x2, 0x4, 0xece, 0x8, 0x869, 0x1f, 0x0, 0xff, 0x80, 0x7db6, 0x1000, 0x7, 0x6, 0x1d6, 0x3, 0x9, 0x100000001, 0x8e91], 0x7}}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000002c0)=0x1) 14:37:45 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x80', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e1) 14:37:46 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:46 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = open(&(0x7f0000000280)='./file0\x00', 0x2400, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f00000002c0)="66b02b704569c1a79afa0285cc9d65cac756c3e97676fb2752cc0f3417c01634354077729eb89920e4770e1bf5b32295e7f11e44d49107ee656ba90aac1cdc793501c1d5b91d7a46e1e4b66d0e9993e97ac61ae94d69df70beb055fc3002763898e9f2411c", &(0x7f0000000340)="436deb7e29c03aae1018a87f7700a28756567fb86d730e8c6a1e699257271c31d66fa5757d13a6885d3b8b953d6bc6132ea86bb21253c3cfb82dc28296e0096f7835fd99d9ac977819535ffeda2a02a3a60e02c9a60b4da59160e8d02c85fb726459111a72f2cc3cd5c36c6c29347c9b2cd79830513fc7472f3ca5cc21fadabd2f78eaaa2869c7fa11a1f2360e52b6c56661cc5758f0b9ff", 0x2}, 0x20) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000040)="ef4cf437cfc754d8dc9d8dfdab327c189d0853bdb5650d11e422310e87b39451cb49a40fd99960be11aa83f5d727481b065cca5c0055fca2a132281be6374abd655bbe02c585ae516cb750b5cae17b1e2a6938656d058d3a68d91ad56503c0c03e1ad1c0c9e0358eb4f72e428d4a4017ec0aab16bf2fac3c1f3c1a9eec0872b188", &(0x7f0000000100)="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", 0x2}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x8000, 0x0) 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e3) 14:37:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x81', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:46 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:46 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) 14:37:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:46 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) socket$inet_dccp(0x2, 0x6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000000c0)='&GPL\x00'}, 0x30) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x8042, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x40, 0x8001, 0xc41, 0x570b, 0x0, 0x6, 0x10030, 0x1, 0x3f, 0x400, 0x6, 0x200, 0x0, 0xa5d, 0x1000, 0x4, 0x8, 0x50000000000000, 0x5f, 0x0, 0x0, 0x8d8, 0x7, 0x8, 0x1000, 0x7, 0x4, 0x100000000, 0x7ff, 0x4, 0x3, 0xfffffffffffffff7, 0x3f8, 0x7, 0x1, 0x800, 0x0, 0x100000000, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x7656, 0x4, 0x4, 0x7, 0x9, 0x6e189aec}, r1, 0xffffffffffffffff, r2, 0x1) 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e5) 14:37:46 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 0 (fault-call:4 fault-nth:0): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x400) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) bind$rose(r1, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x8480, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000100)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000940)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x1fb) 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x40049409) 14:37:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x82', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 464.287117][T27757] FAULT_INJECTION: forcing a failure. [ 464.287117][T27757] name failslab, interval 1, probability 0, space 0, times 0 [ 464.349798][T27757] CPU: 1 PID: 27757 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 464.357838][T27757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.367917][T27757] Call Trace: [ 464.371234][T27757] dump_stack+0x172/0x1f0 [ 464.375590][T27757] should_fail.cold+0xa/0x15 [ 464.380208][T27757] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.386040][T27757] __should_failslab+0x121/0x190 [ 464.392532][T27757] should_failslab+0x9/0x14 14:37:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 464.397049][T27757] kmem_cache_alloc+0x2b2/0x6f0 [ 464.401923][T27757] getname_flags+0xd6/0x5b0 [ 464.406442][T27757] __x64_sys_execveat+0xd4/0x130 [ 464.411401][T27757] do_syscall_64+0x103/0x610 [ 464.416008][T27757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.421908][T27757] RIP: 0033:0x458da9 [ 464.425820][T27757] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.445433][T27757] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 464.453856][T27757] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 464.461833][T27757] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 464.469820][T27757] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 464.477793][T27757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 464.485772][T27757] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x4020940d) 14:37:46 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002000000"], 0x30) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:46 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc0045878) 14:37:46 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffc, 0x2000) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x37, 0x12, 0x8, 0xd, 0x3, 0xffff, 0x3, 0xc6}) 14:37:47 executing program 0 (fault-call:4 fault-nth:1): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:47 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc0045878) [ 464.833182][T27998] FAULT_INJECTION: forcing a failure. [ 464.833182][T27998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 464.846441][T27998] CPU: 1 PID: 27998 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 464.854429][T27998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.864495][T27998] Call Trace: [ 464.867804][T27998] dump_stack+0x172/0x1f0 [ 464.872161][T27998] should_fail.cold+0xa/0x15 [ 464.876766][T27998] ? lockdep_hardirqs_on+0x418/0x5d0 [ 464.882063][T27998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.887888][T27998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 464.893374][T27998] should_fail_alloc_page+0x50/0x60 [ 464.898583][T27998] __alloc_pages_nodemask+0x1a1/0x8d0 [ 464.903970][T27998] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 464.909704][T27998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.909728][T27998] cache_grow_begin+0x9c/0x860 [ 464.909748][T27998] ? getname_flags+0xd6/0x5b0 [ 464.924991][T27998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 464.931247][T27998] kmem_cache_alloc+0x62d/0x6f0 [ 464.936124][T27998] getname_flags+0xd6/0x5b0 [ 464.940648][T27998] __x64_sys_execveat+0xd4/0x130 [ 464.945593][T27998] do_syscall_64+0x103/0x610 [ 464.950193][T27998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.956093][T27998] RIP: 0033:0x458da9 [ 464.956109][T27998] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:37:47 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) syz_init_net_socket$rose(0xb, 0x5, 0x0) 14:37:47 executing program 4 (fault-call:3 fault-nth:0): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:47 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc0189436) 14:37:47 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 464.956116][T27998] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 464.956130][T27998] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 464.956137][T27998] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 464.956145][T27998] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 464.956154][T27998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 464.956162][T27998] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 465.040323][T28012] FAULT_INJECTION: forcing a failure. [ 465.040323][T28012] name failslab, interval 1, probability 0, space 0, times 0 [ 465.062238][T28012] CPU: 0 PID: 28012 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 465.070240][T28012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.080292][T28012] Call Trace: [ 465.080320][T28012] dump_stack+0x172/0x1f0 14:37:47 executing program 0 (fault-call:4 fault-nth:2): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 465.080354][T28012] should_fail.cold+0xa/0x15 [ 465.080384][T28012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.080411][T28012] ? ___might_sleep+0x163/0x280 [ 465.103229][T28012] __should_failslab+0x121/0x190 [ 465.108179][T28012] should_failslab+0x9/0x14 [ 465.112693][T28012] kmem_cache_alloc+0x2b2/0x6f0 [ 465.117562][T28012] ? ksys_write+0x1f1/0x2d0 [ 465.122082][T28012] getname_flags+0xd6/0x5b0 [ 465.126598][T28012] ? do_syscall_64+0x26/0x610 [ 465.131287][T28012] __x64_sys_execveat+0xd4/0x130 [ 465.136248][T28012] do_syscall_64+0x103/0x610 14:37:47 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x7f, 0x1f, 0x1, 0x2}, 0x8) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) [ 465.140853][T28012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.146748][T28012] RIP: 0033:0x458da9 [ 465.150650][T28012] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.170259][T28012] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 465.178683][T28012] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 465.186661][T28012] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 465.194633][T28012] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 465.202605][T28012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 465.213456][T28012] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:47 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0xc020660b) 14:37:47 executing program 4 (fault-call:3 fault-nth:1): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 465.289614][T28113] FAULT_INJECTION: forcing a failure. [ 465.289614][T28113] name failslab, interval 1, probability 0, space 0, times 0 [ 465.317431][T28110] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 465.362317][T28113] CPU: 0 PID: 28113 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 465.370375][T28113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.380447][T28113] Call Trace: [ 465.383764][T28113] dump_stack+0x172/0x1f0 [ 465.388115][T28113] should_fail.cold+0xa/0x15 [ 465.392739][T28113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.398569][T28113] ? ___might_sleep+0x163/0x280 [ 465.403439][T28113] __should_failslab+0x121/0x190 [ 465.408397][T28113] should_failslab+0x9/0x14 [ 465.412917][T28113] kmem_cache_alloc+0x2b2/0x6f0 [ 465.417782][T28113] ? save_stack+0xa9/0xd0 [ 465.419515][T28181] FAULT_INJECTION: forcing a failure. [ 465.419515][T28181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 465.422121][T28113] dup_fd+0x85/0xb30 [ 465.439195][T28113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.445266][T28113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.451505][T28113] ? debug_smp_processor_id+0x3c/0x280 [ 465.456992][T28113] unshare_fd+0x160/0x1d0 [ 465.461328][T28113] ? set_max_threads+0xe0/0xe0 [ 465.466106][T28113] ? retint_kernel+0x2d/0x2d [ 465.470696][T28113] ? trace_hardirqs_on_caller+0x6a/0x220 [ 465.476373][T28113] ? cache_grow_end+0xa4/0x190 [ 465.481148][T28113] unshare_files+0x7f/0x1f0 [ 465.485654][T28113] ? __ia32_sys_unshare+0x40/0x40 [ 465.490703][T28113] ? retint_kernel+0x2d/0x2d [ 465.495300][T28113] __do_execve_file.isra.0+0x27e/0x23f0 [ 465.500851][T28113] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 465.507092][T28113] ? __phys_addr_symbol+0x30/0x70 [ 465.512114][T28113] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 465.517836][T28113] ? __check_object_size+0x3d/0x42f [ 465.523041][T28113] ? copy_strings_kernel+0x110/0x110 [ 465.528327][T28113] ? strncpy_from_user+0x2a8/0x380 [ 465.533451][T28113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.539701][T28113] __x64_sys_execveat+0xed/0x130 [ 465.544646][T28113] do_syscall_64+0x103/0x610 [ 465.549238][T28113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.555122][T28113] RIP: 0033:0x458da9 [ 465.559018][T28113] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.578628][T28113] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 465.587048][T28113] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 465.595026][T28113] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 465.602995][T28113] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 465.610970][T28113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 465.618942][T28113] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 465.626940][T28181] CPU: 1 PID: 28181 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 465.630617][T28110] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 465.634927][T28181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.634934][T28181] Call Trace: [ 465.634957][T28181] dump_stack+0x172/0x1f0 [ 465.634979][T28181] should_fail.cold+0xa/0x15 [ 465.634992][T28181] ? retint_kernel+0x2d/0x2d [ 465.635011][T28181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.635031][T28181] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 465.635055][T28181] should_fail_alloc_page+0x50/0x60 [ 465.635077][T28181] __alloc_pages_nodemask+0x1a1/0x8d0 [ 465.655005][T28181] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 465.655033][T28181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.655056][T28181] cache_grow_begin+0x9c/0x860 [ 465.655076][T28181] ? getname_flags+0xd6/0x5b0 [ 465.662673][T28181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 465.662695][T28181] kmem_cache_alloc+0x62d/0x6f0 [ 465.662719][T28181] getname_flags+0xd6/0x5b0 [ 465.662734][T28181] ? do_syscall_64+0x26/0x610 [ 465.662756][T28181] __x64_sys_execveat+0xd4/0x130 [ 465.662775][T28181] do_syscall_64+0x103/0x610 [ 465.662796][T28181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.672037][T28110] FAT-fs (loop2): Filesystem has been set read-only [ 465.677733][T28181] RIP: 0033:0x458da9 [ 465.677750][T28181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.677758][T28181] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 465.677773][T28181] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 465.677788][T28181] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 465.805013][T28181] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:37:48 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xcc, 0x1, 0x80, 0x2, 0x1, 0x660}, 0x6}, 0xa) 14:37:48 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup(r0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000004b80)) recvmmsg(r0, &(0x7f0000005040)=[{{&(0x7f0000001040)=@un=@abs, 0x80, &(0x7f0000001480)=[{&(0x7f00000010c0)=""/188, 0xbc}, {&(0x7f0000001180)=""/38, 0x26}, {&(0x7f00000011c0)=""/42, 0x2a}, {&(0x7f0000001200)=""/108, 0x6c}, {&(0x7f0000001280)=""/210, 0xd2}, {&(0x7f0000001380)=""/217, 0xd9}], 0x6, &(0x7f0000001500)=""/130, 0x82}, 0x81}, {{&(0x7f00000015c0)=@xdp, 0x80, &(0x7f0000001900)=[{&(0x7f0000001640)=""/53, 0x35}, {&(0x7f0000001680)=""/209, 0xd1}, {&(0x7f0000001780)=""/97, 0x61}, {&(0x7f0000001800)=""/251, 0xfb}], 0x4, &(0x7f0000001940)=""/251, 0xfb}, 0x7}, {{&(0x7f0000001a40)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001ac0)=""/44, 0x2c}, {&(0x7f0000001b00)=""/205, 0xcd}, {&(0x7f0000001c00)=""/132, 0x84}, {&(0x7f0000001cc0)=""/125, 0x7d}], 0x4, &(0x7f0000001d80)=""/141, 0x8d}, 0x64}, {{&(0x7f0000001e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000001ec0)=""/88, 0x58}, {&(0x7f0000001f40)=""/48, 0x30}, {&(0x7f0000001f80)=""/15, 0xf}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/42, 0x2a}, {&(0x7f0000003000)=""/41, 0x29}, {&(0x7f0000003040)=""/218, 0xda}, {&(0x7f0000003140)=""/47, 0x2f}], 0x8, &(0x7f0000003200)=""/219, 0xdb}, 0x2}, {{&(0x7f0000003300)=@tipc=@name, 0x80, &(0x7f0000003580)=[{&(0x7f0000003380)=""/170, 0xaa}, {&(0x7f0000003440)=""/13, 0xd}, {&(0x7f0000003480)=""/201, 0xc9}], 0x3, &(0x7f00000035c0)=""/109, 0x6d}, 0x6}, {{&(0x7f0000003640)=@l2, 0x80, &(0x7f0000003800)=[{&(0x7f00000036c0)=""/215, 0xd7}, {&(0x7f00000037c0)=""/10, 0xa}], 0x2, &(0x7f0000003840)=""/201, 0xc9}, 0x5}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f0000003940)=""/72, 0x48}, {&(0x7f00000039c0)=""/165, 0xa5}, {&(0x7f0000003a80)=""/14, 0xe}, {&(0x7f0000003ac0)=""/52, 0x34}, {&(0x7f0000003b00)=""/4096, 0x1000}], 0x5, &(0x7f0000004b80)}, 0x2}, {{&(0x7f0000004bc0)=@nfc_llcp, 0x80, &(0x7f0000004f00)=[{&(0x7f0000004c40)=""/149, 0x95}, {&(0x7f0000004d00)=""/65, 0x41}, {&(0x7f0000004d80)=""/134, 0x86}, {&(0x7f0000004e40)=""/128, 0x80}, {&(0x7f0000004ec0)=""/14, 0xe}], 0x5, &(0x7f0000004f80)=""/131, 0x83}, 0x3}], 0x8, 0x100, &(0x7f0000005240)={0x0, 0x989680}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000005280)={0x0}, &(0x7f00000052c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000005300)={0x8, 0xc, 0x7, 0x2, r3}, &(0x7f0000005340)=0x10) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) sendto$inet6(r2, &(0x7f0000005480)="cf57b58655ee4fe8bd0c6e540fca8e46b34079b5a755a73583867c200fb4c79d4345a840f05a98fd3ff1cdc44dadccd85d265bd2a903e80ff1291f0660eea24b9bc8e49fffa1f49bfd3f8249eb6b94e70a", 0x51, 0x4000, &(0x7f0000005500)={0xa, 0x4e20, 0x811, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffff}, 0x1c) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) sendto$x25(r4, &(0x7f0000000040)="9df59b3464af921db46c076da25405fca5c0c07615c6b87434b6e33111bc8e8e80e9731820908275c49c4f8a75eef93b2e6ab281d4f4dbf2d680d88a9e2c1710a38c4bf0af75c38d66c3de3ea07a11acecfa725e2636d891efd17690ff0dcadb5f5aa526e232254c4f759b10c658f881505b662306ff1e731e166f24d4f6780abc1c2e34468e3baaa583151c8e96b34e9f515ac709bcefd7316fa3486aaa9c7757ffbc0f1bebcc6e036856b8808d4e4dfd4e29c88797e656cb858f5a8c9654964a710e25fdfacfe6ffd672ee91573f51afddf9f713e9f6cc136c6f5281c7e07e3321215d89a037b17fe49d0f13407f364f8454760e5e0d8b7340e5fcc711364f6201d55b39f5610382f540e284f62e91c2c8c63efe511ae6894c66b88443380b499448737cfdee59b8181c43568e34ebe65eab816922aa6a96c9d073d1ae0c186abd5c750368e611b57c17d0704bba18834405510519afb02a9faa05aa5fcadda4d7ed2c5fa3ef0984b9160fbe67b16878bf630e0254548010d61f5769fdb9aa1f61b51148ad30aada185d8df4e06c9bdc0381d39d8fe335924dd4e5d6c1ab618f5a356304e44e43c9c2b07926bbfdb0835b9d8e5c3a95a1bd322e4b993d78e880160056596de5b84bc65c137a6c175ac5a7cf3137ea7cfc9ec68c040e112e79e00fd0900023bea235a95d600b3e5b0aae265b0921cc6eb5d287202b6f568de22d98c68fc17e80725d144fc8a386ef033ae940f4ac11d365e1db45bb65e4601f407b344b75112fd0e7948ccaff0b46eced39edb107e3f6b87a4f6b88abeae952b9333a9a531e0d7b0594bd37190f82428164ad58f823099149915ea80e272d570d1f7869019836641d310c4c5ab05b6f9e654e03f3181823bf68ea28cc4df53151ebd7849e84ca191c606095466339e814d1e38a0623a0072bb2a2fbb90cf0102727f43049601d4af9718b7560e86d975b01b95b99dc753d153f53af87f1975c0b29817fc18186e5175842f5a392bec944e73a065677e103cebbeb310af376d377f4dc15c07294227fb4e21b9bc260cdca3bd6da4df0fbf012d8f1c80ba7b6b30a6b3677f4ee3b711d2840a1b9bea48a3156604d26a7d54bf8ec6edc5ef81d3974490f3def7bf8d33b53cad712a43510fd397247346bdd433d57e70e92e0897a0d0e9676513e95759c185f7fc82b2038d60ea948f961a981bcea918448505ee44457c0e64d59268c868a73e39f3db9f01fd45d76bb1b7ebfb083e9908f92bca504e6d8ca00e171d13cdbac41b70039dc90fc6d41a649ee60e3edd33243527ca3a57147e6f2ec35568442831246732474542c79f94af81047e9a37736d42ac5116f492d19ff89e5faf62c4f121638590f1c6e3784d4150196bb36afacf25c3cde2af9f882b38722bb1b2b48df11768e52d6f8c779a4a4a7276f549ab9dc4624ef28ff9edabf9b33c4b2c252188309583a0ea7fa92b18a8ff8a34c73dadf31a625a131adbabb0c60211255ffe9487652e2e1437b46276c779699c858d9e8411e161fceca736af30e13ed9bb7f24deeeb38a06918b842c0f467fcbd43cfd6560d4dd19d9d6ac779d306960bb2340b375398ce844c6cf821be0867cc45d8c7ff5df96b541fd287ebec66543d4ee99cd67ea9def198e0aef799eb20a864582ba053f30fcb97c15fb3c5f3f5a024ed41c595fe0852c93f0afc7e7fe7e2eb913a74ca3293cd967a92805c2d78f5efd1e6309a6376bd4c203117ada562e1541b600c6aaafbf3f3d6089e2f1ef71ccbf60f2c4451af0e84ffa6548e4d6ebe2601eb0287b579cb2911d9c2eea099fbc9faa149de7ff1e25b38b634d949030672d90a1a6563639027bb13376fa650e641176c9efaea0cdb3803319c102edcfd860adcbf49cad6be593bb8bc8ef74b7ce3f39c480ee851f5a8176365e320ecdf63c29a03a1f5a3d7e00da77e3112903d5ffc8d7ae03fa432eac4129cc5cbf305e8112c2971c8e1dec23ce7f0f4fa5b32a3587dfd0f5b33de9b543e652f29bd3c4ce1c925508cb87567e91f436c360380282d834cd82901b8139022083581de87256c3d9faada56c8391798308805095bc68acff364ea06f044519611400db161867f64a2d69e4a4f884d02a2e9e9810e220b1c99e9fba76934991ff7ff120bca4f0f488cd0eac3f6f577ecdcaa1290f1d16d741076dbe2f3c4730aea09d84310319e25665b4ec81ffb5bc19c2ecf7553188812632a82d29a14fbd115ce2bdd00923473a97c25e4055eec8b54572c5a25dd98806a1120c39e37fee05fe4fe4be535bf3ac03837e8f0cf67b2972a96e33ef7e7cbf23daf9d9d6991973676d55e04173e2e34a0817051eca5d072bdd821f3ee31877f0b530c5d24eaa95f878ec2b40b8c999b142e29fd5206474c791cc5742e99cfb55ef1f5d02eaaa913ab69f3474ffe83919aaac79f23da0af50fcb8c91bb31a49138795ea33432395738f0d14f338e8a2dedd03e25c3cc3c8377954b004b2256e34bb58fe22f36449b8e0992e6664dab6f8df8c63e2a944de4ebf5b32fb890d5de8ad83d8d36ff736a5b92f57b830be13f4209a9786e57f4661781ce33e218cfc0cad20c15402d736f4291b1ca6f79957d0e2676c5701d9a0133c547a8f6a260b8fa2b346804044019a1c6ea8126c99a08208bebecaf11c0ce007df914dfd609183f2a194429869c8be12d9c551801023156a040c5597dc907ddc7bc9f1b84dc291eac5da8551e42e0a19ad5a7fdcaf0d14ae1116598dda63756d20aa6a8a7d5a8846624d214b56c2a6d66fb2937c89c71aa02c9d5ddd528db253ca75343dc7963d03edcb1633577d0c103d075a3e85a16591a5721df1c222e52942275a7b18c998820aeda7901326cad34d197e11448a76f042af7cc4e7ab1d29289ba13e99a84998eb1dacf4c9d8265ca7cd89cf63080b8e0a176a4ce30fb6f65edbc0653ff452a48faedc904683474c9e354b246baa55e1521946242cf5c59c4a0d3d68b127e78b58faa5e8f149a133e9096b83f2e30a2bd222adff0e0ea2c31b7bbee9bd911e4027fb060b9fbc9a6438e2ab3053d64670849159feb23cb5b5681b5de2a652db3283b54c12a929732bac74fd38f2d584f03b2bb95e0729a0cfcbfb3407e3502f20d804864783d8b35a1b84065e2670ddf6c56f43ac64d96c050a5f31102bbda2148a03367750c9fb18340be9172101ae54090c85733a834a8e2f7bea62b68656966777c0b887baabc15482d01404da0c8b21d00e0c04eab8872a9ff30b1c9a79965d459a27562251ac6dad9b9967a342e602dd5b5da42ac4ef25c380a418769f91783d5a8dd2669eb41b4214a9080ec15686ebeba0687dfc9bfc92e770829065aeef851caa7de5e66ebaa072181fa9f773ff4ba3eac74ff8fc76e48278d1db909df4a582a535b3c7d22ad3ac7d0db1b1b8d7aed075420124b7477704282c50837731d8a42135a655c0c20f02e74a8745429edac715b2bc65d7a63bef134472884836cb7c0d5fa1360f77de57cda87558edefa2f5a24473d082fb698166efba737f9b07f7bd6522ec45ca6bdf51334117a610ef9b0307cea666d225b426d9b2fc642e9e6e699144ace7e8af58997fcb2477bcb1059b2c0d27cc7bbf0d4d6e9d106ed8432b64cebbb12849be0c8cc2274a9623bb22fcb518761c1191db533fa4b730b12900b2caa03b01e67ff216457e183513863f2cb0c78fe0db65cd2d62a090dc443e7c0ec7234149b56ab43c0af990a85e6c4a04458b1f1f0a6bdf0bb06942e2919c306db2fd9ca0c9f0b3f580dd59aaa56ef275a4ecba16adeb38dc6160564167b43f2708995db2ec929b7fd27241d590780cd1270b32afde0f67c41f3202ae4d44c3c86f63f04ed111bfd2064eae6a6ad4ba8a0c0274517b26c8156ec6b570d8f5be955eeee8197596a9d54d362af810e506a9ea2ad85451285e85b41e839b6b6cf2343c7afa42dbcf6ea70c5ea3279fe7ec7583421478d31ca74bf99efc0c8c43088973df674350720d33ce4c83d5ce1bff804e2ab0cb778ade383a744bd4995a2273c6a020aa280aa8fc64ddf8c03d369c4b36152e6a8dd0e2a89cac147face43ec6e75c88d463bb89d1f76f3bb2ac523a80e98fba7bd9a875c0d6749fedfde893a026a7277cbc95f536bf035f45bfece9d49887dcb2644a94cc6c107ed1e80ffcd4dc4390c568b29440eb32c6ed2d4354a7a4f5354a55c4132e004811316abd127ab71d79fd404017877e16b5f1e9e13f8b0868606733639a91ada6eca31ffd89e03dd3d49f252793d5c7207f8d2fa97af0a683963f8089cec625c0ad5cd0b5064c504ffbaa53641fa90cf95112662272b4f09242a08ebae2a32984a6e9e30be54c16c9418c473aea5fb1527cdbbf71e54d0d446252acd1e8fcee31cc1eedc5c954b32a708b2746ec1179421a5cb4246d2a426d16f2dfdc3182bf6132275e9ba03d9fe2fd1719d66a5273c113c130a27f5ac40f29048370f8f86f07de0405c7c7093c9aa7f439e63547f8211ab39910e548c89cc3490e97f924eb6634006ec09fb484d399b3325650ea4a84459258172cbd9c6c247c3b25eff6e17c0f0b1ba9522bcaf63eeab509f01e2790f06f9db4b167f5d62c74591f5bd7f0b0f9479e2a5ef28895092a67e7591b7f0741820202732edce7ea728a6e0405362d71d7416ec07399f44672c22bf9a14877a63dd4dd963d4782efc9a9cb282edb0f979e6729fae218e0e123b24e9cf8f1c7ef11cead85f14e8b1acca31f50591666c345c16e17343be56dd7f946a726331939dd03e47fb38f8b8ec1a385dc902ffced85b9b668a9a54cafe2b23e833de15288d20f4b11337fa45bd023c11263e16fdd9004393bf33a3b42797690a4c734e2ed9c2ff5580533fd662f8f081e6fbc33f5a41dbb84abf8e946eb43b7946df2d43671470b1bd5c9b33e1794150efd865ef3f27696de040a25408827c507d7662d3ebb6d463a3bbb856218933adad692b77eee583164e80f2d42e91a5e561adb4006b934880ee78a55576d750cb3c52bfdd929920ee75f627dbd53351ebeef37fd0a9f2aa6066568df3e9c46e549f9f969a900eaf7585d4ab1702009c142a6358101818f96b4f34a895814974cd03a9fde7aff0f489dc3c5232a4fe446e5277995e3f2ef3c6ebdb7c214fe51c81cdce6d0661a920a30cff37b35d235b32ed989811f43a83c6b693bf7ed3ead94e1bcb2883c7bdde49727fcc120a31b1e10c3b66e3b8d11e98639479c8dff5b6f9d93090101cb61e95a0b3fa4789d666b1997b1d690b9d87ae5d7090fdc16c7853a43cf350b951ce738abb8c6ca57fe0e7772beaa1034a4f5f1a2133329d40920bd66ef34214483245f76d663899bfed872c2f7ad6b180f4d7a2d84d2665171138331810f406579d43c83bb241899c3d5e6fe4971803130cebc73cb86e9e8891505a06b470816487cc1d15ba7c9f39646f3719ae9c946c5ac5f4e236735d94f659943573ed89fabde993d9843b3b00bf0685f41d1607d0182676aabbf95a4bde85c2b44fb7d3551bfaff8a1fe44e71a4b6955449d1e3af828477852e344dfad6de209e9212f767d931e845a1d1baf7d3a9dd384919a0b2963d5d5b3178dd3b26b77372a89a40ceb392db22ea5648745f285c0ac32de05bfe19ce996be662c1332fb39949f5c5a6041148b13b8f29e555ab32b9658171ad02e1ab85014a6fe19006258d29c4a246dd0e92bdd55bca074bde7f259dcd04149db2983643c8308a41d482f06ed5188d393e97306cbbdba1905718615b770877", 0x1000, 0x1, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000005380)="9cbf98ee0d059cf35a13405439421e76ef2481930d1c7c163bad6f173d3c361e1543e6137ab89850e93ae0f05dd6c4bb1486c9d60c2419befc90d32db1065d304ad3970c091e430d2cfd5d05c883463b5818ea8f96fac52b43a335b56638a5e7da6703ebcc1524da354acc70f127c922bbb21d35a9e82155a76d2d7ec4a43ce42e94298d3d93abe11b8b81409cf5d35a85768f47399bc3e09c14bf5a5ea2a60a7a56ff47d8ea064eac12a8c173dedfd58d55d092f07547a2d7360fea26b1af4953ba648d62ce29b0a95c2fd23d1715823d78d8d179e18ed3c6ef7499951f2177b18348eab758147dff27eef98d23c2cab8961817773ef5a3a1d7f281e5181eff") socket$inet_udplite(0x2, 0x2, 0x88) [ 465.812992][T28181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 465.820971][T28181] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 465.918266][T28110] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:37:48 executing program 4 (fault-call:3 fault-nth:2): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:48 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) recvfrom$inet(r1, &(0x7f0000000040)=""/133, 0x85, 0x100, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x189) [ 465.958693][T28110] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 466.008105][T28110] FAT-fs (loop2): Filesystem has been set read-only 14:37:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:48 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x191800, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0xfffffffffffffffe, 0x92, 0xff, 0xa7, 0x8, "e1f39aa7239aa5a5db28187a870909d94eb9f2", 0x7, 0x1447}) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 466.064504][T28240] FAULT_INJECTION: forcing a failure. [ 466.064504][T28240] name failslab, interval 1, probability 0, space 0, times 0 14:37:48 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000540)={0x7, 0x7896}) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000480)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r2 = accept4(r0, 0x0, &(0x7f0000000100), 0x800) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000140)="410260c1de571d9ed390e27669bad035ebd541858ce82d0fe1b6a08d889a8166a14b7e4c9cb431fae5f4c1b70984024b3d605a9a31c1c28aed66330cbd70b138edf26128a8cb051f6479501bea7f2f8b2ab57eed75e55d630d79af5cc7df9491e8f64d60b9d59e6cc6fd8c2ac7daf47d6f837680f460b8e0104c6d31263d9ac8751694f2a6ab706ee137cbb3ef8fce4e17f26fdfef83a12ecd663daf4789bd3f5f488508850ed513d7124f503c71804fab5e") r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x88000) prctl$PR_GET_SECCOMP(0x15) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in, @in=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) accept4$ax25(r3, &(0x7f00000003c0)={{0x3, @rose}, [@default, @null, @default, @bcast, @bcast, @remote, @remote, @rose]}, &(0x7f00000000c0)=0x48, 0x80800) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000004c0), &(0x7f0000000500)=0xb) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000080)={r4, &(0x7f0000000340)=""/100}) [ 466.131089][T28240] CPU: 1 PID: 28240 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 466.139113][T28240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.149168][T28240] Call Trace: [ 466.152475][T28240] dump_stack+0x172/0x1f0 [ 466.156824][T28240] should_fail.cold+0xa/0x15 [ 466.161433][T28240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 466.167250][T28240] ? __should_failslab+0x14/0x190 [ 466.172294][T28240] __should_failslab+0x121/0x190 [ 466.177256][T28240] should_failslab+0x9/0x14 [ 466.181763][T28240] kmem_cache_alloc+0x2b2/0x6f0 [ 466.186622][T28240] ? save_stack+0xa9/0xd0 [ 466.190963][T28240] dup_fd+0x85/0xb30 [ 466.194860][T28240] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.200933][T28240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.207182][T28240] ? debug_smp_processor_id+0x3c/0x280 [ 466.212653][T28240] unshare_fd+0x160/0x1d0 [ 466.216987][T28240] ? set_max_threads+0xe0/0xe0 [ 466.221784][T28240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 466.227250][T28240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 466.232711][T28240] ? lockdep_hardirqs_on+0x418/0x5d0 [ 466.238001][T28240] unshare_files+0x7f/0x1f0 [ 466.242510][T28240] ? __ia32_sys_unshare+0x40/0x40 [ 466.247549][T28240] __do_execve_file.isra.0+0x27e/0x23f0 [ 466.253113][T28240] ? copy_strings_kernel+0x110/0x110 [ 466.258404][T28240] ? strncpy_from_user+0x2a8/0x380 [ 466.263528][T28240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.269778][T28240] __x64_sys_execveat+0xed/0x130 [ 466.274730][T28240] do_syscall_64+0x103/0x610 [ 466.279328][T28240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.285231][T28240] RIP: 0033:0x458da9 [ 466.289133][T28240] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.308739][T28240] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 466.317152][T28240] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 14:37:48 executing program 0 (fault-call:4 fault-nth:3): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:48 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002140)='/dev/autofs\x00', 0x80100, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000040)={0x3, 0x0, 0x2080, {0x10000, 0x1, 0x1}, [], "ecf1938668083a17cf212ed7d697fb1cf0b55f950c54c996e18dbca0b55a5ffeb10ee34e2a69d146947d59438fac934d7d91b13fe1772c8305c1b4b6c4be0a34da92e61840438e0c5977f5aba575933a264255f29855441eef712cd28454eb7ea2f2be1bfe2113ab6d37db08bad1d4ce8febb65046fc4a563523eabb6e7dec85bff65171f04f1d481faeeb013e229336c2fbbef4e5e1f38389113e7de80f2994afa5e929b76fa5778b057666e181386a3fb432212c142d6c4fa0ecd30a79c18c9b4418585a6e3f121c3c87b5315791d09e17647e29ec46c99a1bb866be4c16e75f8857f907b1e08863b523d15bc5a8259ca20cc87fe566c8ffbd8d432c31810161e3f322297e1e28e8c42c07eeb0234373b562790a655edbf7d7283be3e8a7304039eea53fcd096353d883afe643751cf7db9f2594925120fb9576139bcba5f1553714c7ca69ad299f61060e2814cc5b17ee3ab7f1889063677f12ba5a28ac8c0c019346125c48a494393218086253e6b2134a790f37a6b8adeb4797043ab24d8a642334bb91ac8477bda9d73ce15752c834cba5e4cd115236f2a29dad25ef3594e7814a938e8edc16887b664aed48e05752aa6e5e48b5a1a7ad1aba4a8ac4a908b81205111057aeda9f8061a4e6e20030dc5bd77739c7bb36d113f3ffc3580847033d35d36a46742d8fa958e77836c4a23fc4761e8b29b5726996166b03e942ca417d35e1f96d6fd1d80b47358fda3394cbf042b09bc21e10abb9212fdbb2372e0f57303e937ac87c30dc67872bab9656d179dd91694a9ef8e9d7947f6e227963fa677eabba4903d59457d4cf4304491244d2453b2fe7931973e010e33c44b94dab75a3bf2c9f60859556e85255459d416c979f9bdcf32a3250dae773686104f5956174e2e07d3a35072fd743978730df3ba305abe714b2452c746d95461631e4ae4d0ce872da6ac92c9d481240601678e9da199fd8ad7e4e435a00ba356cead3166ea98f71f422d982b6d48b1f595495be0958015b678cd2c55befdf906ba2f6824d4c269482e66921d3511592fa1b0406f72316c6eecf866b0d9268100de5698c687ce5c302b5bae8d07797a46d28f7fd62a9490f66bd10beac15c0f61b7577ad244ab0efaedf5b9861eb79c1ac514e938d811c855d15e334979ab39e130b1eaecb808f72f2ad541bbb335a2893be1b70c2e664128249c063d783065144652c0666fcc45a58cf57467bcfc10780b76eaf247f091e079637add13ad1f98586d63011d66ca4404603b600c02ae88458df94bbf607330179cfac1bcaa2e989dc68f3036e6f5811b3134b3b9c8261a22e201e663f9479d641eadce6f870bfcd6c180b30ed76e87d41b7805b63620e1c1ffe1d8f7de13529a20e201aba0e3e6de3b9b9f2c4e9aee0df4a7b9c97d036e334d7c227321937e6b9d80cbe807705c88e0385508bb2a5a3045802d25780b0f1653813fac7c49b65aa62d4a21a025c4d75e0090274baa0be415d901f50fca3f74c52d3849b8477abe4b16e8b60aed2c9f4548cc860ec63f98aa48d8d7e13e962b64ae224ea0cb8276417eb322736436b5e0098a5a4e0d1815422ccab0d13e084d9311c4817988678687b1168abaa733eafc6c5e0631383e684c7131458667d8fdc57500ea23fb7433930da4b802f4d61e752471367b05137d70e2781ea0ea7339c213b383f9d56eb2b27f35c1ed9c61befd996c2256b34d95bd641c4384db65c0fd8afabcbca6912b0929268cecbc31211b46092725e5f705fa93df75e52956f4c1f5cbe9eacfe60250bbee931dee768c7e324cf0fa5f3a2b0e57654d1c1d71c4077de9fef635f23f147b3028d8dec9bc47ba6bd8a39b9bd3e2c18a92e395bb1e333e96203d0212d9006b87ffee16846eecea01fab30075e140684c0a1f2a9edcefa4cafde27da337ff6b120f68f20cfcb43b35e09ad0f6de24ce763cacba36b625b6242efb3468f9212cee26b032f56fc875667f8074666d401dcfce16c57c58c425347fde87098cab95eaec7f77a88ae8a22d19d1531649754ec0da5a8c30c7d58152d7779339af73ae5ab873c530d60a28737fc99f5264371a2c21d265a7e899ffe15cb4473cb1008a87c9532d33c3340ea86186f0ab01566935393b64f1cf2a6705699a65fd8400bc4089a47db72d84022ca2df6bdb27471465b6b93801589e6496363897b348c8ccc6fc5908f44354ca7cb15d8e1a0db72a317649baa0c9ae20b249ec0635bcc5f47d2b76da63f6a9c26ae4cb2b000770ba24f5035c49d1db1f5d339e216c03721c40437a7bb37f0534bd76184cadf8c82c909a1a6808507df3d7b23a413b9cfb7ef02652719184c6c5ed7fc907287ec22321fde0ffb7ba9cf0cf1eb70b22b17428d3cabb3364c19180ab43360e2fb3d5846dcc1b15930d291ae0cdd553c967b82871343e914220c16fdb90e49fb88bcc3e6f3be68c02c3e7cea9fcf83125ea154da4d6d916409454f7f62294e2bf792241c01e213c2af94844e8dc5cfb243e1efb11382e018376f39b9d807eadd36e7678daf16427b77931379616883e2e9da67ce653532ae6fef1fa96fce9762d70bce5104bc7ced9e1de4f773957fea91336dda71e228adbcc1fa747d82fd30c2040957a5254ddcf35ec65ac55a4a13d50c36f5d42d379e8c80428005782d85c6a5ae7595c60fc4fbafcef33b3bc0a7bc273f8456978e424501ae9cc8b4dd6252e6e8601e3bc1d8fc4c35ce62a71ebd028ea4a231004755e94949efb721f2cfc7319b022e2f54a1044765c8e9db0e9362f2ef783c6be281257386f0b8baedc31ee363e552dee755767d6f58ed6d55d88d9b8aa651f6edbebdb494e4e3a616eae65f7d51bbb9c557f14b99967c4b9ae7f5b0f0d3e4f85d9b7039b755eba2f7334998cdfd57bc45ec968f846731523b84d571cc1314eb694fdb1a1b4b76fb5daa265b7c2aec8b8fb0380eed3574b3426273e0b34ae7378fb821de086b0fe2a030fff8c6c06d283245a06231510d23e2d671cec912f2ed00c0b433819187bc18fc874753916068ae4d2773c9a5e38ef4611253711d3b265653f948579a09131c61822fca57e9f1429adc270cd23b8817382eb12dbb188be200439873e41a14571f350e31f4f366c5e4739a3f1d289938b306e8f6a03ad6eb8b9158923d2a6da6ed20e4bbf81ae3ec688804b101145dcea793d5d2654b79f8ffa1e3dc46557ddfddc4b0cda98561f168688dc086d05458410129ecbafc6ff011700a564dcadd2d95244ef7cd9496528e6d02e7c43241df8eafcc1fe04140d067f8ac8d3e767a4dc4409957bfd17cac968d5804ba1bfa0dbb4b7b35ca977ef098f6888e4f5ec3de39f597fdb42dfaf93e4ca52d9530de94e311efaad9424e4169b4da1c0a59f80118bdd95b792934687853c8ace3f90b9e01d7ef15b9c793161d3c461c39747bf0cb6de0a476dab713f570de3fca3088feae94f00a3b39119ffe5bd79c8a5438b9da3d3809d2e06568d55f0af3383e65272d2c6c0305222b055264b51b4495551fff59b55e8c66499ae73b604bce78eb14631460691190a826316a37a17ab5f1bf208d7b36f0a00c52f44cd7b13eed743ae16b6952feaaccb6dbb2b27c77a8c3231f729c2c1bea5010f458d6d23f28d871908813c6343977177702f3f2a07f2004fe7112b172bf289547e567047aabcb52db5fcb3fa9b6be3b6a4a223ce86131e4f31bc9ccf0845dd5e1e48f1e0a9af8aad4e9e66ae1ad8a95697804fa18382812de7bdeed0295883ad7f939424d5c947dd68a8aec7065928343926f1322de57b5c55d5419014556434f2c2a7b90edb6de63ab202b8bad697034d378494eadd0b8fea75ab077646b573f618d28a9ae370e2ba9074afbc0e1261d08e09b7bf45761af747ffd646dd0782cc52e5bfed389b73152cbd299b2bd9d942f92fb54e1954c9792deb75203d24203597609dc02cd29eed2bb364e7c830d958dc0bbcc52459370f09c5d456570b02a76f2cfa511e0762a07693c66f1d5dca24ceb14fdadcfc59174440ce11726e0a07cb3f406fd4dc798d44377fcecb728372ac1ae5af88aa8168b2c75c40aa827a3f70ba90c3cb972e51c0783c960746e46ec3adce8e7c88ece22e0b3ff78ff19026b60c82d5a17b7c2aa9bbf2e4366ef33838677b8c7aa58be6fe14abded1229119b972a2e1ceb120140921eb18035ee3ad7bb7ada53ccf0d3fba8d55885a6a8bdd9010e7a2d41b3caee5134f3c6a5d50b197d9782a2af4fcc040580742f28597ae5b4c394879359399e8a38c4f784eeb573e167cf7ac4552512f641ad51c6b20e726e5c2bdde044e1889c1af064a2d09edaf5015e15bca86626db8e17b4e4586c9f80f9fa317a72bfdcf3a27f716ac215df913664fb30dfcfe065f5a3b08bbc170398b98ce8c232daf1de559c893e584ad71d2eaaf7bd6e55130a3418093eac740edcff9bce336c147fde2b2091c184da55738251d060d9e58148236d1a7169c61dbe7a05c0585816e2e915ed778f761bf65e00474d5f1528d45c0e7e56d9add49b880123831986b789ae8b007c287c7434d87f8b5f00df2eca0d83a30e5517d2c9f6c514d3fea0d9b9668a82e31a1020c1d41946a340202fa9db54c97b017dce455bcbf4161f85d956f175e606b36bece9f8d6a1ec3d59b68db78b7d1b3bd31bdfef725586582701453d82ef16c1fb8686bcbd09fc96deeb3c38147e5cbbe1312b039faf9523e7516e71d64ef8da02614c3bfbed51932ae63fda580f4fe99788443a900aedb362329ab3ffa7604d20ebaafeed9b21355ac5b9a830586fcc41b1c1e1fa317821ab41104a59b19b16d43934c9a852e061a35cb1dd24909042ebfacc24199431468be14ebdaf1443f713b6b131bc28d486eacd5aeeca2d14572ff2cfeb64fd9514f7ea6c4c58fa367f10d89549e2f9ae2c3011e4ff7395a9a4cc737fdde5bb45d2e5fc354dd7e3187c9b030da6dfaddd61cdc3ba6d650282fc1d7c808901745e5a02cacb680a972f6a340054bc14929f6fddf5bba0af62f830c407831426f28dfe3e9a48ac680cb30975abd659cac621762b23a91b960896be7ed5879536eb4baf60cc3d702cda2431c7fbafc385415ee5efec56eee506775154e7150fd08281abccc870789f50943d9e0b69ac0a0ace43d87429dc60506e125b925a0729ca7b6516e261d49994fb406b1ca7c2400fed2088d21c9f620d96f48374b92ec3d9cd53218050535c95fb5357ca8b038814c511166b47446060a0ff0e164e6bbda4ea0760dbabb08b546b6ca20710fd965cba03690af4a1656238e2f31eb495e5b02c1a40b0f00f1f04562d7f22e7022eb51c1fb8664458bbf1548143b9c188ab9f063678afadcf5add92f81714da80d04ed37482d727d9e76170dd3fcf8956df97ac252767a446a12c8b75a4f9df02a086f36c2c08a8cb4f7761cadc3fa19c6e9dc4c150e489349e7923a7df3fa9a1dbd92b6cdf09a79139a8dca1ff0c577ab79c61e4bf46ddccd5ecb9e33e3edfecb1bcbfdb615980fcf5ba8b68597efbdc019162f6441eb1abcc76126998e24e171125605951521b7652f550dc72961f4671d633d571f644f3ee5ae89855cfafb51b156cf739605aa963ac7e93db9c051c0d76c82744b11e46ebc0adc0ebb9143b06dfd945cc1a83dc09fa21ac1e63e90b2e0e7e66447a554e5200790d1c28e85ce7c512d077f18d14a0b04642284b46009760fba7000623f46dffe86738f5ea7db08026f003d29e78fc6f34c2ebe6ff3e7e6563ca5eef237fd31ee081b5d5196b", "dd370c6617dc4ad058e924d6c4bee558d86862567faf68f3fdcdeae580494bfe91850b51ef37207640235fc9aa153a332d37aa72b229691310a254c86b0d570c3fd97be68c2fce1d7eeac15206df3ebbfe75aa05e808a9c401132fd7c5a222088e19ee3947b36235913e1f7885035dd5c1268ec24751772717d8215aa588d0bb23c1c8e529fa65ac3c7f6bdf80379dc038bfaad8faf9f7ea1d9e45481026dcb9a09b6d8e7e9759d3095345c03e068145ef272eee1d70043b8cc8c526291b1b2e06386119b75be8f5fc82d556ac36b4193350c844eaaa9c039e0db34fcf155c711212474a84540dfff77e8660a8229b8887ccaf8329cc68dbd7cafce4969b3969ccd5539088e20c00d49f6a6afe1b7ca9048d271c851c33784f7ad027047adb04103eadbb127103ea36b68f7291205082764132dbacccca198e55fde099f9e8aeb6045e835a13994752e02baba803ba7c33a67ec187b8ba43c277cac4f28cd2abe8061d76555f6a73a040b5cb466267e45873a322d8c1d60a14d0e7c1545e2ec9b5cbcd20fcf02d1926232f9c1242eab47b699f94bb16b448ea7b5f58913cf77822913fa7ceb4855f439c9a214aa189d2febe4c195af5aac36beca15dd16466db964242a54112c1e1ad23e80c98ff4ff19ffd7c55071244814bcc318a72c1a2ac5393ab71a796282fde3b13d05d46dd83b6c3318e364502ceeab093c26688fbe054a1508b8c24ee15f93ab30812a4199fad462aa1e2895b191dfc88c751c42d4d20f61b3cbc366375a09bc1d1be657682051762a129115a6b222ca10d231247418549e0aad81b018c0575553c5fff5cb20da528de5678f31afd27f996fb36c797b3400d969ed289132ce64e8f83d8e4ab134b5d9c25bd5368408b2535159261f96964c5935af937172d749992d68e925c005f3d804966033ebb7bec9aaa694e298ef6502cc389333332acce6538cff7f5edcd9728b07778867272745fc36daa17ececf894ccbd2b3b018b6426602e3a280125048af6b839d8b9cf7e8e9468bb72b368e3a64f6cbe8100b6abb2c21082db6bfd6ca56b9f8146ce248323f639007d1e2352af2690190c213071d2c8e8cdeb08838f6dfc91607bdebf61dc232ed220d80f60e2fdcb7e589bf25334fd06dd619de93b05e65839028254eb90e61ad788944d62e7f6371151eaa98c492fbf9ace0d35cc097740f7d8570259ebd7986829886035b1c06379c7ba6792f8b277dfcb25da5c93b2d14ad98dfd0e52095eddf5e9c006700d29a88a1fcffeb7566614d73a9c40715f2413c66c2b55338bbf3d49615ee29893e3ad551fe626959d65e582d00cb8d7e57ecdf5aafd70c0f20b7ae0fc0b43ec881aeb19c6283ebac22b51038b900ed055a3c7400be84db9858ff8eff3cf45017b24d160fce86b90d07f1d36dc53fc9ebd03b5a8fc600f3deeb989a56daba53b5af0fec4e26845cec5800cfe3c6b3caca5d05384f9c38e43372fc4642d4b28d080bd720d9fc6cbf9dc731f721d556467f4414cca24cd7dc6f69fb230f4495be39c0e88183d952448d7c49d8d4cc6db982cf905fb027d6bf3d22ba0ef6f5dc1592e6555f1130a0a6b8ff138166fb202183a1c7c96c4422ee4bce0c400c2401618c91646ea754ececcb87fe1e20c4c6230826895cab6c0dc22c99da79a211a46188d61b1183bc267b433e8724aee8a3c391086feaa7d197d21cc64fd98c2dda256a96f91fadcf98cf499d6b68e2b59a768aadb822ba5ec5d534c2324bb67502369ca8dbbf5b5a57b234718ecf84f314f8e677e638cdce88316f91ea8ab2c2c7fbf28f137e854cac6470de6af767204d455b3d376713756c7093b6f98f8ea34000969d00b54105ee9ef717157c58932d61f89ba962bdc1d54606197e5d3da01fcb4d4b2c24d80d07f40d7797b1e2e61eec7821d55563cc1b91b81d842bcb09e7502294505262c735033dca016a872ffcabdeb8fe134b074e72e9a62121126d09500e4b974188918772bea9a4162eafe46fc710218c93e60dfb5e68f0776306e33596793b97f73420a0ce1646bb5cfee24bd59853a081a94ad3f4d9c11faab243bfd9c894eb8120f113099ac3022731e705527f3481ef7ea4b955376cca04f32cab5925266a1fba3a4b4b961fb5f57a7c2828edd5328200ad906e384614d5732c9e27115d48273037d207bdfa078b7e504653df5e7e2e5c58bb85288c6ab82b5f05c6f9eec3d99751189348d722388f90556ad3111163d5d176f7e6a614b95cf3351435a1a921448ad25df7ecec226d79fb9b88a5bbfae900d6efa601ee8cad39c49b781e138be818f7e9b8dd67e27ed4b1bd27dcaffe9bab78762a00444f49ad04b7b5d9c80fb7b6ec3a1b9d52f678b388a41318398e607df6dcb9dca36ab46e1e20bf91b565f63a8b679841c543c0c0760526c8ebcfddf36dc378153db1290475323af764d1325003d3186b381adad3d7519191f13fb41f3cd105eadf3638a37396b6edebd6dc5b604143459d8ecb2624c1d271c1c62d8c56e5261fb1c7a9ec04fe43ff58fea87bf0cef55cf50d8946bda696fc0519bf1254985787863565a3baed4cfefc3db71ba248f0816f205291e9b38f2ca922af7c95ead5948da73ab63cfe36926c6bcb8815e876b62b07ce45e9bcfa6e7f77a975fa743882afbefa696c7aaef72b08974d71a55a9d790ec9e28501c2ef2198f868bcbee3486c1b327f6b4ecddd1db5dd3a928f8b9668e77caba59051289799d4fdbcf5b878db031633f0d3c047f04686647b6e646bcf8989a0d64ff61505717187e2a8ebb40ccf2b20e31a65893bb304d12127c4e2ac5dadd4e33e205e326c2fa539a9f4397d95142ae222f8d32a92b726dde6852c097f1a986a93c84381d1e4c7a9d931caa8947200bc9dfd7a7905f6ce4a6d2be16ca0a9f5c19d51e48102398c70da8004f7a7513910863b828d261ac21bef5b69beb81c6af63a21ceee7ae27060d9a5ba96524cfdfb0ed9f94c535ceab83bfa8b8a081352ef1ad379146d095bf64e3e9b8bae246c7d0b0a3295bfaf8b8da87e400e2e0f30bd4bd91d15776142d2aa21c555946ddfb98ee096b8b8ea010bf5860570fbab97da4e6fdf40f39744228925a04fb5eaa1bfdb420a49ec24b75ba4e2949b387d01df89798c32d9476d44116042e87cc35e4c4e5e1990fd9a7971ab8653a67b93dcde0ae71577d75e7d475b281921e60aa28ca907f85dea230bef4547573ff648accf053b22618b00ae0387c32896cded28b92a357da9780c703f421af70e6954f815e366e94a46f95491b282599295b52f380c94b6c5b3523d5f8935b82fc28b388aa2283cb2414547a321da2a9fe75b9001bd280da5bac652b1b41f4349618861bfdd80abbf69dfb3cfde4bbc5323e42851230a2c77cce90a2afb9b239904e4e20314071f5c44c1f423d53ff47573c1ca1dfa4ac55acc83039bd33b90e5a836578348bb89b968258ffbd19a03bcbba1d88610d0cc3b0c8bbd3ca93f50a81e0bc46eba49b171f3521f3b843782539591e98c7e709494da26c912aebed951b26f58500f3d7fa29956572864e3e26ed8fb0f2b9be804db4511f10cd2e181009e81a042ddc1af8232e7d001a7ce125a462a49709f4d2b68f7ef7c0c67f382b2107eb378af3f3aff2b0fef191af617c6398a38128b6ca29c4f282a7c66952eb7406aa85d585ac722e5589be743b2b35d43fd6d5b738552cf6968133e284de3a9aa8fc623c9f0b9df8a72703be37ec7d7cb72350fad5809b1b6381a10fbbfa86cfd29b5b5a3078b3ea14959d4ab0092cafa4e05784e9684356716dde38f3eeebc81dec8043fb929404d3cf3dd419dc1f3329631666d3207dd0652edbbe66d141bc00e80f36999e5394468820b7b34cb0ecc8a78cf78fcef61217eefb7a9c445b052c65f35559b960bf62d09733464046dcf9228e73095f6389c9a625cae7a54de1a60d54d8b6b29087299447a32733136eb40418b84e80b8bb6fa3384f44c695ac757f9c2ea2b8004b055339d6cbaec0f756ebb01c6c8d02899a4818aaf7e9c936a066842f9a0e479facc6f75a47fc714c1f2f7416550a8b145f147d12eaaf2a995e0bc6286a5e6ddd0177b9af150d4a186d338f05937aa31dc0aa1b246da8d212cc3981876969240ab0ad9dca345523e122c51b24a69cd4e80ee98e30a6320655622d8b7907b58c58abeba0fbda9ded61821d0752c4d6ed4069feea7fc84d7337b94560ee708f171bcba22cbf792b047ffe86fb3fd9601b2124e837da69edddfe3be9d9cc6884924332592c4f79e39b9721ce449702af6529f09b8dcaed559bca417256192ba5f5e6e1c8633e6b227108ff2f6e61e579635842fd5edb9932b5f42afaefbd53659feedc625c7bc869ffeecb0d478337eb06a2b7967e25c461c9e6eddbeca3f467b698ee0cce66e91dd759e6931f42b0e7c298bebc94267357065966235d50304e2eb991602efaf30f538c3ef515bbfb20edecd5c23d39e8402f5204a4be83f9436c531bb13ccb86e90b6bb64d613851922e178d5874071d20ca2a8ba79ba0d118cb2971cc5eca5bdb07452b37e5c3ce34ab23d9dfce24d91537965de45aa65d61cf94686cbc226b45ca2a5b0a40366e0baa7b9d6db1e8bafffad61a5ae12cb88c4b2fb7c133e7e3969c81df926dc235acdb03b111911f3e64acb883a112402996b339f82e70a6a70c88c52d57d82a39a9765a14bc87c90facde71f10e650800380daae162b41227491e7e9cb6f17f8b4a78b7dcd8dcf8bf236e2c54be63a13c98aa68734ecac4660b3dc3087b4ef50357f0803e13d7b50c37ff7e663b6cd5f5406eec2c065fbc5a87c6ba5d7fdcabd1e9099d5dcab072c088bcc80cda24b773fb6cf3400f9909e7a938853eb5c02b10fccc079c345c33b55020abd13a7dfb469932dade84b3bc048e6ce95a00bef0ab5c2d2b3defdf487986756551f25f4f223c11ad9a938fe332242ea4c9edeaee21007f8f3f84912aca3e589663dd92a99f93165b283a38e63edee11d9c357f87c98c755a1945f2da1ae9ebfeae6a0c7577c10487ef510c6cbd2cc62fd68bf4d61617d71d37e3ad38f41a43420b8d4548ba50c441fd417c01f5142cddf8ed4e3e691b5a3293183d1dff04485a6775825a041e8eaa11092756dc5aba90fa98566550a2c19b040019b71a02d57e355f947a9bf83dd249a25143d77d3fffaed59d514f5899b1ea8be1f9ee107bf0b54d3d2f1171d8e5ffb94678dbbf7787d6535e5ba3799e238abe345d6ab18f25602a59b492c794ba146b9a45518da9063ff17d2de30932f09772ab26140ae7d30db851ef3ed916bf8c6ce9d258cc12b35b66ad5b701029e66fd8cc7824617732498870e3318e549b417c501714d5aa0fe4c415e43cceaaa3b49c42550608086dc537d650a094b6e727780f4eb6212e1735932edaa923e5dd67be75e682f4c2241330315238e6ac408af406197ebe449e4c4bc4b45465cb61afae2a3600f0eb4738d91907cbb54b11f3c60020b49c8627ecd438b706df223fbba32866bb89133e320dd880fc04dbbac974a6c0c4a2c702d50d8ace241153528ed16c61f0b6ef310d13dd9d8a5d037a149e9d08420d8e17a6a7ccc97a8928b5bddcb1069b4aebcb4639f59bf44de2117255839b68a87597a1af205c0c8248d3cdeb21a77c500b0f42abc6726e52f65ff7f72e05addac44553e96322d8477673893cdeaa5b14951f8e7f1e2156dc0469f508e1b4215de6b5e709b381e0fd95f1cf9daf066834817c4961c05c7d6ea88828675946e373f263"}) 14:37:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 466.325125][T28240] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 466.333095][T28240] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 466.341161][T28240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 466.349134][T28240] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 466.398829][T28249] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 466.401502][T28251] FAULT_INJECTION: forcing a failure. [ 466.401502][T28251] name failslab, interval 1, probability 0, space 0, times 0 [ 466.415370][T28249] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 466.448124][T28249] FAT-fs (loop2): Filesystem has been set read-only [ 466.458154][T28251] CPU: 1 PID: 28251 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 466.466143][T28251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.476201][T28251] Call Trace: [ 466.479503][T28251] dump_stack+0x172/0x1f0 [ 466.483848][T28251] should_fail.cold+0xa/0x15 [ 466.488451][T28251] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 466.494270][T28251] ? ___might_sleep+0x163/0x280 14:37:48 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80840, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x7, 0xffdffffffffffffe, 0x2, {0xfff}}, 0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0xffffffff, 0xfffffffffffffff7}, &(0x7f0000000080)=0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000100)='gretap0\x00') setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0xeb, 0x8000, 0x4, 0x3, r2}, 0x10) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000001c0)=0x1, 0xfffffffffffffeea) r3 = getuid() ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000240)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r3}) 14:37:48 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x801, 0x14) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1ff) [ 466.499160][T28251] __should_failslab+0x121/0x190 [ 466.504102][T28251] should_failslab+0x9/0x14 [ 466.508613][T28251] kmem_cache_alloc_trace+0x2d1/0x760 [ 466.513992][T28251] ? lock_downgrade+0x880/0x880 [ 466.518861][T28251] alloc_fdtable+0x86/0x290 [ 466.523386][T28251] dup_fd+0x743/0xb30 [ 466.527396][T28251] unshare_fd+0x160/0x1d0 [ 466.531741][T28251] ? set_max_threads+0xe0/0xe0 [ 466.536513][T28251] ? retint_kernel+0x2d/0x2d [ 466.541111][T28251] ? trace_hardirqs_on_caller+0x6a/0x220 [ 466.546749][T28251] ? cache_grow_end+0xa4/0x190 [ 466.551522][T28251] unshare_files+0x7f/0x1f0 [ 466.556035][T28251] ? __ia32_sys_unshare+0x40/0x40 [ 466.561066][T28251] ? retint_kernel+0x2d/0x2d [ 466.565670][T28251] __do_execve_file.isra.0+0x27e/0x23f0 [ 466.571224][T28251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.577469][T28251] ? __phys_addr_symbol+0x30/0x70 [ 466.582502][T28251] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 466.588224][T28251] ? __check_object_size+0x3d/0x42f [ 466.593436][T28251] ? copy_strings_kernel+0x110/0x110 [ 466.598723][T28251] ? strncpy_from_user+0x2a8/0x380 [ 466.603843][T28251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.610100][T28251] __x64_sys_execveat+0xed/0x130 [ 466.615055][T28251] do_syscall_64+0x103/0x610 [ 466.619651][T28251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.625541][T28251] RIP: 0033:0x458da9 [ 466.629434][T28251] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.649037][T28251] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 466.657450][T28251] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 466.665420][T28251] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 466.673390][T28251] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 466.681372][T28251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 466.689346][T28251] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:49 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x42ca, 0x4000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0xfffffffffffffff9, 0x7, 0x7fffffff, 0x2c1228ae, 0x4, 0x5, 0x4, {0x0, @in={{0x2, 0x4e23, @loopback}}, 0x6e, 0x8d, 0x3, 0x9, 0x5a8}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x60000000000000, 0x2ffd}, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) getgroups(0x5, &(0x7f0000000140)=[0xee01, 0xffffffffffffffff, 0xee01, 0xee00, 0xee01]) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0x0, 0x2, {0x101, 0x6, 0x0, {0x1, 0x6, 0x7fff, 0x2, 0x7, 0x19, 0x7, 0x9, 0x2, 0x1, 0x2, r3, r4, 0x5}}}, 0x78) [ 466.753812][T28268] cgroup: fork rejected by pids controller in /syz1 [ 466.766536][T28249] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 466.812148][T28249] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:49 executing program 4 (fault-call:3 fault-nth:3): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:49 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000000)=0x7) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) [ 466.855976][T28249] FAT-fs (loop2): Filesystem has been set read-only [ 466.959251][T28378] FAULT_INJECTION: forcing a failure. [ 466.959251][T28378] name failslab, interval 1, probability 0, space 0, times 0 [ 466.976430][T28378] CPU: 1 PID: 28378 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 466.984427][T28378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.994492][T28378] Call Trace: [ 466.997805][T28378] dump_stack+0x172/0x1f0 [ 467.002154][T28378] should_fail.cold+0xa/0x15 [ 467.006757][T28378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.012578][T28378] ? ___might_sleep+0x163/0x280 [ 467.017438][T28378] __should_failslab+0x121/0x190 [ 467.022382][T28378] should_failslab+0x9/0x14 [ 467.026899][T28378] kmem_cache_alloc_node_trace+0x270/0x720 [ 467.032719][T28378] __kmalloc_node+0x3d/0x70 [ 467.037231][T28378] kvmalloc_node+0x68/0x100 [ 467.041740][T28378] alloc_fdtable+0xd6/0x290 [ 467.046249][T28378] dup_fd+0x743/0xb30 [ 467.050250][T28378] unshare_fd+0x160/0x1d0 [ 467.054587][T28378] ? set_max_threads+0xe0/0xe0 [ 467.059376][T28378] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 467.065023][T28378] unshare_files+0x7f/0x1f0 [ 467.069530][T28378] ? should_fail+0x1de/0x852 [ 467.074126][T28378] ? __ia32_sys_unshare+0x40/0x40 [ 467.079165][T28378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.084985][T28378] __do_execve_file.isra.0+0x27e/0x23f0 [ 467.090623][T28378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.096867][T28378] ? __phys_addr_symbol+0x30/0x70 [ 467.101902][T28378] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 467.107624][T28378] ? __check_object_size+0x3d/0x42f [ 467.112926][T28378] ? copy_strings_kernel+0x110/0x110 [ 467.118215][T28378] ? strncpy_from_user+0x2a8/0x380 [ 467.123343][T28378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.129594][T28378] __x64_sys_execveat+0xed/0x130 [ 467.134549][T28378] do_syscall_64+0x103/0x610 [ 467.139148][T28378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.145042][T28378] RIP: 0033:0x458da9 [ 467.148945][T28378] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.168556][T28378] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 467.176970][T28378] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 467.184945][T28378] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 467.192917][T28378] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 467.200892][T28378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 14:37:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:49 executing program 0 (fault-call:4 fault-nth:4): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:49 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x5, 0x3, 0x5, 0x401}) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) [ 467.208864][T28378] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:49 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = dup3(r0, r0, 0x80000) write$tun(r1, &(0x7f0000000000)={@void, @void, @arp=@generic={0x335, 0xe84d, 0x6, 0x2, 0x9, @dev={[], 0x1e}, "cffb", @random="7d2549162746", "2323ef2355f903c2cd0a09577bcca507"}}, 0x26) [ 467.267559][T28483] FAULT_INJECTION: forcing a failure. [ 467.267559][T28483] name failslab, interval 1, probability 0, space 0, times 0 14:37:49 executing program 4 (fault-call:3 fault-nth:4): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:49 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 467.345598][T28483] CPU: 0 PID: 28483 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 467.353619][T28483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.363680][T28483] Call Trace: [ 467.366995][T28483] dump_stack+0x172/0x1f0 [ 467.371358][T28483] should_fail.cold+0xa/0x15 [ 467.372417][T28527] FAULT_INJECTION: forcing a failure. [ 467.372417][T28527] name failslab, interval 1, probability 0, space 0, times 0 [ 467.375971][T28483] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.375997][T28483] ? ___might_sleep+0x163/0x280 [ 467.376019][T28483] __should_failslab+0x121/0x190 [ 467.376036][T28483] should_failslab+0x9/0x14 [ 467.376054][T28483] kmem_cache_alloc_node_trace+0x270/0x720 [ 467.376085][T28483] __kmalloc_node+0x3d/0x70 [ 467.418987][T28483] kvmalloc_node+0x68/0x100 [ 467.423504][T28483] alloc_fdtable+0xd6/0x290 [ 467.428020][T28483] dup_fd+0x743/0xb30 [ 467.432026][T28483] unshare_fd+0x160/0x1d0 [ 467.436423][T28483] ? lockdep_hardirqs_on+0x418/0x5d0 [ 467.441716][T28483] ? set_max_threads+0xe0/0xe0 [ 467.446495][T28483] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 467.451963][T28483] unshare_files+0x7f/0x1f0 [ 467.456474][T28483] ? __ia32_sys_unshare+0x40/0x40 [ 467.461518][T28483] __do_execve_file.isra.0+0x27e/0x23f0 [ 467.467069][T28483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.473316][T28483] ? __phys_addr_symbol+0x30/0x70 [ 467.478362][T28483] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 467.484091][T28483] ? __check_object_size+0x3d/0x42f [ 467.489300][T28483] ? copy_strings_kernel+0x110/0x110 [ 467.494602][T28483] ? strncpy_from_user+0x2a8/0x380 [ 467.499719][T28483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.505971][T28483] __x64_sys_execveat+0xed/0x130 [ 467.510923][T28483] do_syscall_64+0x103/0x610 [ 467.515524][T28483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.521421][T28483] RIP: 0033:0x458da9 [ 467.525322][T28483] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.544940][T28483] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 467.553359][T28483] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 467.561349][T28483] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 467.569328][T28483] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 467.577318][T28483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 467.585299][T28483] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:50 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/4096) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 467.593490][T28527] CPU: 1 PID: 28527 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 467.601482][T28527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.611538][T28527] Call Trace: [ 467.614837][T28527] dump_stack+0x172/0x1f0 [ 467.619191][T28527] should_fail.cold+0xa/0x15 [ 467.623795][T28527] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.629617][T28527] ? ___might_sleep+0x163/0x280 [ 467.634483][T28527] __should_failslab+0x121/0x190 [ 467.639432][T28527] should_failslab+0x9/0x14 [ 467.643949][T28527] kmem_cache_alloc_node_trace+0x270/0x720 [ 467.649772][T28527] ? retint_kernel+0x2d/0x2d [ 467.654388][T28527] __kmalloc_node+0x3d/0x70 [ 467.658906][T28527] kvmalloc_node+0x68/0x100 [ 467.663416][T28527] alloc_fdtable+0xd6/0x290 [ 467.667935][T28527] dup_fd+0x743/0xb30 [ 467.671932][T28527] unshare_fd+0x160/0x1d0 [ 467.671951][T28527] ? set_max_threads+0xe0/0xe0 [ 467.671968][T28527] ? retint_kernel+0x2d/0x2d [ 467.671984][T28527] ? trace_hardirqs_on_caller+0x6a/0x220 [ 467.671999][T28527] ? cache_grow_end+0xa4/0x190 14:37:50 executing program 0 (fault-call:4 fault-nth:5): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 467.672020][T28527] unshare_files+0x7f/0x1f0 [ 467.672042][T28527] ? __ia32_sys_unshare+0x40/0x40 [ 467.696072][T28527] ? retint_kernel+0x2d/0x2d [ 467.696100][T28527] __do_execve_file.isra.0+0x27e/0x23f0 [ 467.696116][T28527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.696138][T28527] ? __phys_addr_symbol+0x30/0x70 [ 467.702887][T28525] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 467.705645][T28527] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 467.705662][T28527] ? __check_object_size+0x3d/0x42f [ 467.705686][T28527] ? copy_strings_kernel+0x110/0x110 [ 467.705702][T28527] ? strncpy_from_user+0x2a8/0x380 [ 467.705724][T28527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.715517][T28525] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 467.715842][T28527] __x64_sys_execveat+0xed/0x130 [ 467.727083][T28527] do_syscall_64+0x103/0x610 [ 467.727106][T28527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.727119][T28527] RIP: 0033:0x458da9 14:37:50 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x80000001, 0x206103) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x42001, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x51) modify_ldt$write(0x1, &(0x7f0000000080)={0x7fff, 0xffffffffffffffff, 0x4000, 0x0, 0x32, 0x8, 0x1f, 0xa7b, 0x5, 0x81}, 0x10) [ 467.727134][T28527] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.727149][T28527] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 467.748467][T28525] FAT-fs (loop2): Filesystem has been set read-only [ 467.752314][T28527] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 467.752325][T28527] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 14:37:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:50 executing program 4 (fault-call:3 fault-nth:5): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 467.752343][T28527] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 467.752353][T28527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 467.752363][T28527] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 467.914818][T28646] FAULT_INJECTION: forcing a failure. [ 467.914818][T28646] name failslab, interval 1, probability 0, space 0, times 0 [ 467.937024][T28669] FAULT_INJECTION: forcing a failure. [ 467.937024][T28669] name failslab, interval 1, probability 0, space 0, times 0 [ 467.953474][T28646] CPU: 0 PID: 28646 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 467.961471][T28646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.971532][T28646] Call Trace: [ 467.974843][T28646] dump_stack+0x172/0x1f0 [ 467.979194][T28646] should_fail.cold+0xa/0x15 [ 467.983801][T28646] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.989622][T28646] ? ___might_sleep+0x163/0x280 [ 467.994495][T28646] __should_failslab+0x121/0x190 [ 467.999458][T28646] should_failslab+0x9/0x14 [ 468.003978][T28646] kmem_cache_alloc_node_trace+0x270/0x720 [ 468.009796][T28646] ? kasan_unpoison_shadow+0x35/0x50 [ 468.015094][T28646] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 468.020913][T28646] __kmalloc_node+0x3d/0x70 [ 468.025428][T28646] kvmalloc_node+0x68/0x100 [ 468.029941][T28646] alloc_fdtable+0x142/0x290 [ 468.034539][T28646] dup_fd+0x743/0xb30 [ 468.038546][T28646] unshare_fd+0x160/0x1d0 [ 468.042888][T28646] ? set_max_threads+0xe0/0xe0 [ 468.047658][T28646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.053122][T28646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.058584][T28646] ? lockdep_hardirqs_on+0x418/0x5d0 [ 468.063878][T28646] unshare_files+0x7f/0x1f0 [ 468.068476][T28646] ? __ia32_sys_unshare+0x40/0x40 [ 468.073520][T28646] __do_execve_file.isra.0+0x27e/0x23f0 [ 468.079079][T28646] ? retint_kernel+0x2d/0x2d [ 468.083685][T28646] ? copy_strings_kernel+0x110/0x110 [ 468.088977][T28646] ? strncpy_from_user+0x2a8/0x380 [ 468.094098][T28646] ? getname_flags+0x120/0x5b0 [ 468.098871][T28646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.105123][T28646] __x64_sys_execveat+0xed/0x130 [ 468.110085][T28646] do_syscall_64+0x103/0x610 [ 468.114687][T28646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.120588][T28646] RIP: 0033:0x458da9 [ 468.124487][T28646] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.144097][T28646] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 468.152515][T28646] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 468.160495][T28646] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 468.168473][T28646] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 468.176452][T28646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 468.184426][T28646] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 468.192434][T28669] CPU: 1 PID: 28669 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 468.200429][T28669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.210485][T28669] Call Trace: [ 468.213791][T28669] dump_stack+0x172/0x1f0 [ 468.218136][T28669] should_fail.cold+0xa/0x15 [ 468.222736][T28669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 468.228559][T28669] ? ___might_sleep+0x163/0x280 [ 468.233423][T28669] __should_failslab+0x121/0x190 [ 468.238381][T28669] should_failslab+0x9/0x14 [ 468.242898][T28669] kmem_cache_alloc_node_trace+0x270/0x720 [ 468.248718][T28669] __kmalloc_node+0x3d/0x70 [ 468.253228][T28669] kvmalloc_node+0x68/0x100 [ 468.257743][T28669] alloc_fdtable+0x142/0x290 [ 468.262365][T28669] dup_fd+0x743/0xb30 [ 468.266365][T28669] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.271843][T28669] unshare_fd+0x160/0x1d0 [ 468.276187][T28669] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.281649][T28669] ? set_max_threads+0xe0/0xe0 [ 468.286431][T28669] ? retint_kernel+0x2d/0x2d [ 468.291037][T28669] unshare_files+0x7f/0x1f0 [ 468.295547][T28669] ? __ia32_sys_unshare+0x40/0x40 [ 468.300577][T28669] ? __do_execve_file.isra.0+0x237/0x23f0 [ 468.306306][T28669] ? unshare_files+0x1a/0x1f0 [ 468.311007][T28669] __do_execve_file.isra.0+0x27e/0x23f0 [ 468.316592][T28669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.322837][T28669] ? __phys_addr_symbol+0x30/0x70 [ 468.327863][T28669] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 468.333595][T28669] ? __check_object_size+0x3d/0x42f [ 468.338807][T28669] ? copy_strings_kernel+0x110/0x110 [ 468.344098][T28669] ? strncpy_from_user+0x2a8/0x380 [ 468.349219][T28669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.355477][T28669] __x64_sys_execveat+0xed/0x130 [ 468.360432][T28669] do_syscall_64+0x103/0x610 [ 468.365033][T28669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.370933][T28669] RIP: 0033:0x458da9 [ 468.374833][T28669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.395360][T28669] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 468.403775][T28669] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 468.411748][T28669] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 468.419723][T28669] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 468.427695][T28669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 468.435671][T28669] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:50 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:50 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) 14:37:50 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:50 executing program 0 (fault-call:4 fault-nth:6): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:50 executing program 4 (fault-call:3 fault-nth:6): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:50 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) [ 468.580232][T28726] FAULT_INJECTION: forcing a failure. [ 468.580232][T28726] name failslab, interval 1, probability 0, space 0, times 0 [ 468.627205][T28814] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 468.631963][T28726] CPU: 1 PID: 28726 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 468.644239][T28726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.654298][T28726] Call Trace: [ 468.657646][T28726] dump_stack+0x172/0x1f0 [ 468.661988][T28726] should_fail.cold+0xa/0x15 [ 468.666587][T28726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 468.672405][T28726] ? ___might_sleep+0x163/0x280 [ 468.677268][T28726] __should_failslab+0x121/0x190 [ 468.682210][T28726] should_failslab+0x9/0x14 [ 468.686718][T28726] kmem_cache_alloc_trace+0x2d1/0x760 [ 468.692104][T28726] ? retint_kernel+0x2d/0x2d [ 468.696710][T28726] __do_execve_file.isra.0+0x325/0x23f0 [ 468.702261][T28726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.703780][T28814] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 468.708682][T28726] ? __phys_addr_symbol+0x30/0x70 14:37:51 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:37:51 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 468.708697][T28726] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 468.708717][T28726] ? __check_object_size+0x3d/0x42f [ 468.734520][T28726] ? copy_strings_kernel+0x110/0x110 [ 468.734536][T28726] ? strncpy_from_user+0x2a8/0x380 [ 468.734557][T28726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.734579][T28726] __x64_sys_execveat+0xed/0x130 [ 468.734602][T28726] do_syscall_64+0x103/0x610 [ 468.734624][T28726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.751592][T28833] FAULT_INJECTION: forcing a failure. [ 468.751592][T28833] name failslab, interval 1, probability 0, space 0, times 0 [ 468.756149][T28726] RIP: 0033:0x458da9 [ 468.756164][T28726] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.756172][T28726] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 468.756185][T28726] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 468.756194][T28726] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 468.756203][T28726] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 468.756211][T28726] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 468.756220][T28726] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 468.761924][T28814] FAT-fs (loop2): Filesystem has been set read-only [ 468.832207][T28833] CPU: 1 PID: 28833 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 468.852103][T28833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.852110][T28833] Call Trace: [ 468.852134][T28833] dump_stack+0x172/0x1f0 [ 468.852156][T28833] should_fail.cold+0xa/0x15 [ 468.852169][T28833] ? retint_kernel+0x2d/0x2d [ 468.852187][T28833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 468.852213][T28833] __should_failslab+0x121/0x190 [ 468.852232][T28833] should_failslab+0x9/0x14 [ 468.866782][T28833] kmem_cache_alloc_trace+0x2d1/0x760 [ 468.866811][T28833] __do_execve_file.isra.0+0x325/0x23f0 [ 468.866826][T28833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 14:37:51 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000006c0)='/dev/snd/pcmC#D#p\x00', 0x40, 0x420000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000740)={0x0, 0x10, &(0x7f0000000700)=[@in={0x2, 0x4e24, @loopback}]}, &(0x7f0000000780)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000007c0)={r2, 0x388b, 0x3}, 0x2a7) socket$inet_dccp(0x2, 0x6, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x746, 0x200) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast2}, 0x0, 0x4, 0x4, 0x2}}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000000c0)="458b5be3db6d72add48140ce6a11e1ee00270bfa3c044173dd69a4db8e1a1704b21cabd37e5c6a0f738929f5dfd02f7dfb9c5432c21caa595b930775dea219cbb779d1e31a6ec9d7ad6eb4d21414c739212382c02a09522a37e2c35cf99ed41deb577054c10ea65aaf16c99a94c4da3a8d80f99925cae39877284e7515abed5146c2b69e25febbf9c43ab5ac500f2ebe3d1c8907ec308df7137c180677da8b37595d843e283250d414900d09a8c6bf75987c114a1741d67be9506728", 0xbc}, {&(0x7f0000000180)="729c43c335e24c05ec21fc58cd65a562cddba4c8f7246f84fd98b7a427a0da739af436a8b1fa661f4892b91b8434809a3e2c26a5a4ef6d07ee1edba43c6a6130cbb61237970f92b0cfd9135ea11584354757a18019ccbf7ae914dbd1df07a83fbdbf791ca45d062d", 0x68}, {&(0x7f0000000940)="55a5f4052b5b59351226519ee966cb63f885015ea53a4df3ecc2386ec8e5c3a01ebfa0e447179e00d4d8b47cc4fe7bc7a7cbcd0e53373b965d3ac43e8d219c51ae5285971ee40b4d2494d1de2107dcd8f07a66986f5ba440138a18c9a78a2907a9", 0x61}, {&(0x7f0000000280)="b30b5a4a48927f055ec9f5c0b05dae8ca32779235316ea92f1f0c70ebdd5c94857b1816f85ca6e6d4c74f703b46202ab888c80a1d38c16bc4920dadac4e54949637ce0b0aa8191938b381cc077532312942e1b7010a9d9bea23de0d2bfdf27bb95185ed4fb9e", 0xffffffffffffffe7}, {&(0x7f00000009c0)="15931c92005e797bb3ec76bede1fd31f624b4196fc96cc517468825f4caeace7211294b5d64b3e910c628c0a5e0b28133d6b51ee472c0558350f3948e70978e8d421bc8232b1fbe2ec23cb30445310c1d72567ab8480e06d5ebc86a50d6529f0b5a4bacfd787ada08ca3fae3afff01000080bbe7536d4691993f05b26b8b402c3c6c9d9bd101b620a3f13bee9400000000000000", 0x91}, {&(0x7f00000003c0)="d04b95156bf8f872d5a7c322021e307d87309a316b852c2d620048dd0c37a993c47275c5c44afbe47e203cbc29d38a6ab6749d664208f1c447d915c7fc8ac19e4827dce6160d7a3af957fa54c0482950d990379aa93f964fcf804d8d4f73d26dc86252d0d14ba477fcda67b6b5baf8d837b9b3f2ee75e21223d0bbeda5a6a1253ac71eef1330fdc0d520f64e08b2b269f456ff3eedb72cb74199b499081d6a611a7cad0b6db12a832fce9025abf410788e229fa04d6cb7ea434e28c17a8d3d41b6b34b390f13c96f20b15affdfb2", 0xce}, {&(0x7f00000004c0)="e6b0ac6e9e37c1f6a10e88c9c9035be55cbcf5f82e", 0x15}, {&(0x7f0000000500)="6ec0113f74519a9dbb1c6cbdcd7beaeea06d8735cce0e5204298f8f40613dc7242dba2b9f8898bcf2ef1d0625fe4bbab436fa8e5a33df01d6b77b1d06b5904e2dfc54758d3df7560d3c5ad015ba736a8bcad5e597a81ddf04e9282728f2d869526fa1ca4d57b3c04e096388a57210553c2fe847ec8f2b6d13f4442f5f38729ced5de16821023301b5406794af59ebb618fcb577dc477cea2801164735efbad81901d2fe5a95a0328e650ab6fb4038a", 0xaf}], 0x8, 0x0, 0x37e}, 0x20000000) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000800)={0x1, 0x2, [{r3, 0x0, 0xfffffffff0000000}, {r3, 0x0, 0xfffff000, 0xfffffffff0008000}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000680)='/dev/nullb0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000840)='./file0\x00', 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000880)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 468.866842][T28833] ? __phys_addr_symbol+0x30/0x70 [ 468.866855][T28833] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 468.866870][T28833] ? __check_object_size+0x3d/0x42f [ 468.866896][T28833] ? copy_strings_kernel+0x110/0x110 [ 468.947587][T28833] ? strncpy_from_user+0x2a8/0x380 [ 468.952710][T28833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.958962][T28833] __x64_sys_execveat+0xed/0x130 [ 468.963917][T28833] do_syscall_64+0x103/0x610 [ 468.968520][T28833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.974413][T28833] RIP: 0033:0x458da9 [ 468.978318][T28833] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.997941][T28833] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 469.006371][T28833] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 469.014354][T28833] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 469.022327][T28833] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 469.030311][T28833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 469.038291][T28833] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f0000000100)={0x8b}, 0x7) sync_file_range(r0, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x3042, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000180)=0x10000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0xfff) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) [ 469.092415][T28814] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 469.122051][T28814] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 469.135909][T28814] FAT-fs (loop2): Filesystem has been set read-only 14:37:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:51 executing program 4 (fault-call:3 fault-nth:7): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:51 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:51 executing program 0 (fault-call:4 fault-nth:7): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 469.234821][T28851] FAULT_INJECTION: forcing a failure. [ 469.234821][T28851] name failslab, interval 1, probability 0, space 0, times 0 [ 469.291785][T28851] CPU: 1 PID: 28851 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 469.300008][T28851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.310069][T28851] Call Trace: [ 469.313385][T28851] dump_stack+0x172/0x1f0 [ 469.317741][T28851] should_fail.cold+0xa/0x15 [ 469.322355][T28851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.328177][T28851] ? ___might_sleep+0x163/0x280 [ 469.333039][T28851] __should_failslab+0x121/0x190 [ 469.337989][T28851] should_failslab+0x9/0x14 [ 469.342502][T28851] kmem_cache_alloc+0x2b2/0x6f0 [ 469.347384][T28851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.353635][T28851] ? __validate_process_creds+0x22d/0x380 [ 469.359381][T28851] prepare_creds+0x3e/0x3f0 [ 469.363941][T28851] prepare_exec_creds+0x12/0xf0 [ 469.368803][T28851] __do_execve_file.isra.0+0x393/0x23f0 [ 469.374381][T28851] ? copy_strings_kernel+0x110/0x110 [ 469.379687][T28851] __x64_sys_execveat+0xed/0x130 [ 469.384641][T28851] do_syscall_64+0x103/0x610 [ 469.389245][T28851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.395140][T28851] RIP: 0033:0x458da9 [ 469.399040][T28851] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.418656][T28851] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 469.427084][T28851] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 469.435064][T28851] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 469.443037][T28851] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 469.451019][T28851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 469.458995][T28851] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 469.479877][T28863] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 469.504618][T28863] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:51 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x186, 0x400, 0x7, 0x7f}) [ 469.554629][T28964] FAULT_INJECTION: forcing a failure. [ 469.554629][T28964] name failslab, interval 1, probability 0, space 0, times 0 [ 469.568392][T28863] FAT-fs (loop2): Filesystem has been set read-only [ 469.581152][T28964] CPU: 1 PID: 28964 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 469.589147][T28964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.599204][T28964] Call Trace: [ 469.602513][T28964] dump_stack+0x172/0x1f0 [ 469.606869][T28964] should_fail.cold+0xa/0x15 [ 469.611484][T28964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.617303][T28964] ? ___might_sleep+0x163/0x280 [ 469.622180][T28964] __should_failslab+0x121/0x190 [ 469.627129][T28964] should_failslab+0x9/0x14 [ 469.631639][T28964] kmem_cache_alloc+0x2b2/0x6f0 [ 469.636499][T28964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.642751][T28964] ? __validate_process_creds+0x22d/0x380 [ 469.648480][T28964] prepare_creds+0x3e/0x3f0 [ 469.652994][T28964] prepare_exec_creds+0x12/0xf0 [ 469.657853][T28964] __do_execve_file.isra.0+0x393/0x23f0 [ 469.663408][T28964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 469.669660][T28964] ? __phys_addr_symbol+0x30/0x70 [ 469.674700][T28964] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 469.680432][T28964] ? __check_object_size+0x3d/0x42f [ 469.685682][T28964] ? copy_strings_kernel+0x110/0x110 [ 469.690976][T28964] ? strncpy_from_user+0x2a8/0x380 [ 469.696102][T28964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:37:52 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x1, 0x200, 0x7f, 0x2, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={r2, 0x84, "ab3aed303e9ce0f8dff5aabfd149c287c74b183dc15e71879ab30186a023e3264a080026c9d9f3bdd28712ba84105a7195a383b0058397f33062c59c41bd8eff2aa4acfde1e20dd5f043a1d77c877d7b3288cb3016a976d7df808ab4739f976b4dce1f57203029c8af015552a1e6a69f8afeee4d1b5c13fa01b0740ee02b4be533f5d009"}, &(0x7f0000000180)=0x8c) [ 469.702368][T28964] __x64_sys_execveat+0xed/0x130 [ 469.707411][T28964] do_syscall_64+0x103/0x610 [ 469.712023][T28964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.717928][T28964] RIP: 0033:0x458da9 [ 469.721831][T28964] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.741447][T28964] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 469.750010][T28964] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 469.757993][T28964] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 469.765976][T28964] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 469.774043][T28964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 469.782014][T28964] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 469.790367][ T26] audit: type=1800 audit(1556807871.972:139): pid=28849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16722 res=0 14:37:52 executing program 0 (fault-call:4 fault-nth:8): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 469.847832][T28863] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:37:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:52 executing program 4 (fault-call:3 fault-nth:8): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 469.890650][T28863] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:52 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) [ 469.947597][T28978] FAULT_INJECTION: forcing a failure. [ 469.947597][T28978] name failslab, interval 1, probability 0, space 0, times 0 [ 469.977229][T28863] FAT-fs (loop2): Filesystem has been set read-only [ 469.990794][T29022] FAULT_INJECTION: forcing a failure. [ 469.990794][T29022] name failslab, interval 1, probability 0, space 0, times 0 [ 470.005984][T28978] CPU: 1 PID: 28978 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 470.013980][T28978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.024042][T28978] Call Trace: [ 470.027366][T28978] dump_stack+0x172/0x1f0 [ 470.031725][T28978] should_fail.cold+0xa/0x15 [ 470.036349][T28978] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.042202][T28978] ? ___might_sleep+0x163/0x280 [ 470.047074][T28978] __should_failslab+0x121/0x190 [ 470.052026][T28978] should_failslab+0x9/0x14 [ 470.056552][T28978] kmem_cache_alloc+0x2b2/0x6f0 [ 470.061422][T28978] __alloc_file+0x27/0x300 [ 470.065851][T28978] alloc_empty_file+0x72/0x170 [ 470.070637][T28978] path_openat+0xef/0x46e0 [ 470.075081][T28978] ? save_stack+0xa9/0xd0 [ 470.079420][T28978] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 470.084797][T28978] ? __kmalloc+0x15c/0x740 [ 470.089215][T28978] ? security_prepare_creds+0x123/0x190 [ 470.094765][T28978] ? prepare_creds+0x2f5/0x3f0 [ 470.099536][T28978] ? prepare_exec_creds+0x12/0xf0 [ 470.104567][T28978] ? __do_execve_file.isra.0+0x393/0x23f0 [ 470.110291][T28978] ? __x64_sys_execveat+0xed/0x130 [ 470.115412][T28978] ? do_syscall_64+0x103/0x610 [ 470.120178][T28978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.126861][T28978] ? __lock_acquire+0x548/0x3fb0 [ 470.131816][T28978] do_filp_open+0x1a1/0x280 [ 470.136329][T28978] ? may_open_dev+0x100/0x100 [ 470.141114][T28978] ? mark_held_locks+0xa4/0xf0 [ 470.145892][T28978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.151368][T28978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.156835][T28978] ? lockdep_hardirqs_on+0x418/0x5d0 [ 470.162125][T28978] ? trace_hardirqs_on_caller+0x6a/0x220 [ 470.167781][T28978] ? mark_held_locks+0xa4/0xf0 [ 470.172554][T28978] ? debug_smp_processor_id+0x3c/0x280 [ 470.178021][T28978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.183488][T28978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.188957][T28978] ? lockdep_hardirqs_on+0x418/0x5d0 [ 470.194257][T28978] do_open_execat+0x137/0x690 [ 470.198950][T28978] ? unregister_binfmt+0x170/0x170 [ 470.204066][T28978] ? lock_downgrade+0x880/0x880 [ 470.208927][T28978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.215174][T28978] ? kasan_check_read+0x11/0x20 [ 470.220037][T28978] ? do_raw_spin_unlock+0x57/0x270 [ 470.225161][T28978] __do_execve_file.isra.0+0x178d/0x23f0 [ 470.230840][T28978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.237102][T28978] ? copy_strings_kernel+0x110/0x110 [ 470.242395][T28978] ? strncpy_from_user+0x2a8/0x380 [ 470.247523][T28978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.253775][T28978] __x64_sys_execveat+0xed/0x130 [ 470.258736][T28978] do_syscall_64+0x103/0x610 [ 470.263355][T28978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.269260][T28978] RIP: 0033:0x458da9 [ 470.273160][T28978] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.292767][T28978] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 470.301187][T28978] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 470.309166][T28978] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 470.317140][T28978] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 470.325114][T28978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 470.333099][T28978] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 470.341108][T29022] CPU: 0 PID: 29022 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 470.349104][T29022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.359163][T29022] Call Trace: [ 470.362470][T29022] dump_stack+0x172/0x1f0 [ 470.366816][T29022] should_fail.cold+0xa/0x15 [ 470.371423][T29022] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.377244][T29022] ? ___might_sleep+0x163/0x280 [ 470.382107][T29022] __should_failslab+0x121/0x190 [ 470.387050][T29022] should_failslab+0x9/0x14 [ 470.392408][T29022] kmem_cache_alloc+0x2b2/0x6f0 14:37:52 executing program 0 (fault-call:4 fault-nth:9): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 470.397266][T29022] ? kasan_check_read+0x11/0x20 [ 470.402125][T29022] __alloc_file+0x27/0x300 [ 470.406555][T29022] alloc_empty_file+0x72/0x170 [ 470.411375][T29022] path_openat+0xef/0x46e0 [ 470.415818][T29022] ? save_stack+0xa9/0xd0 [ 470.420155][T29022] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 470.425529][T29022] ? __kmalloc+0x15c/0x740 [ 470.429946][T29022] ? security_prepare_creds+0x123/0x190 [ 470.435526][T29022] ? prepare_creds+0x2f5/0x3f0 [ 470.440292][T29022] ? prepare_exec_creds+0x12/0xf0 [ 470.445322][T29022] ? __do_execve_file.isra.0+0x393/0x23f0 [ 470.451051][T29022] ? __x64_sys_execveat+0xed/0x130 [ 470.456166][T29022] ? do_syscall_64+0x103/0x610 [ 470.460935][T29022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.467009][T29022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.472475][T29022] ? lockdep_hardirqs_on+0x418/0x5d0 [ 470.477770][T29022] do_filp_open+0x1a1/0x280 [ 470.482281][T29022] ? may_open_dev+0x100/0x100 [ 470.486965][T29022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.492430][T29022] ? lockdep_hardirqs_on+0x418/0x5d0 [ 470.497719][T29022] ? retint_kernel+0x2d/0x2d [ 470.502321][T29022] ? trace_hardirqs_on_caller+0x6a/0x220 [ 470.507977][T29022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.513461][T29022] ? do_open_execat+0x117/0x690 [ 470.518320][T29022] do_open_execat+0x137/0x690 [ 470.523015][T29022] ? unregister_binfmt+0x170/0x170 [ 470.528136][T29022] ? lock_downgrade+0x880/0x880 [ 470.533023][T29022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.539272][T29022] ? kasan_check_read+0x11/0x20 [ 470.544127][T29022] ? do_raw_spin_unlock+0x57/0x270 [ 470.549253][T29022] __do_execve_file.isra.0+0x178d/0x23f0 [ 470.554888][T29022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.561145][T29022] ? copy_strings_kernel+0x110/0x110 [ 470.566431][T29022] ? strncpy_from_user+0x2a8/0x380 [ 470.571554][T29022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.577805][T29022] __x64_sys_execveat+0xed/0x130 [ 470.582757][T29022] do_syscall_64+0x103/0x610 [ 470.587441][T29022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.593347][T29022] RIP: 0033:0x458da9 [ 470.597251][T29022] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.616857][T29022] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 470.625272][T29022] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 470.633241][T29022] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 470.641213][T29022] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 470.649189][T29022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 470.657161][T29022] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:53 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:53 executing program 4 (fault-call:3 fault-nth:9): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:53 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getaffinity(r0, 0x8, &(0x7f00000000c0)) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) syz_open_procfs(r0, &(0x7f0000000100)='net/bnep\x00') r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80001, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000040)={0x7, 0x5, 0xffff}) [ 470.768429][T29087] FAULT_INJECTION: forcing a failure. [ 470.768429][T29087] name failslab, interval 1, probability 0, space 0, times 0 [ 470.800255][T29087] CPU: 1 PID: 29087 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 470.808298][T29087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.818379][T29087] Call Trace: [ 470.821686][T29087] dump_stack+0x172/0x1f0 [ 470.826036][T29087] should_fail.cold+0xa/0x15 [ 470.830638][T29087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.836461][T29087] ? ___might_sleep+0x163/0x280 [ 470.841323][T29087] __should_failslab+0x121/0x190 [ 470.846281][T29087] should_failslab+0x9/0x14 [ 470.850795][T29087] kmem_cache_alloc+0x2b2/0x6f0 [ 470.855653][T29087] ? kasan_check_read+0x11/0x20 [ 470.860516][T29087] __alloc_file+0x27/0x300 [ 470.864939][T29087] alloc_empty_file+0x72/0x170 [ 470.869707][T29087] path_openat+0xef/0x46e0 [ 470.874143][T29087] ? save_stack+0xa9/0xd0 [ 470.878482][T29087] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 470.883855][T29087] ? __kmalloc+0x15c/0x740 [ 470.888278][T29087] ? security_prepare_creds+0x123/0x190 [ 470.893833][T29087] ? prepare_creds+0x2f5/0x3f0 [ 470.898599][T29087] ? prepare_exec_creds+0x12/0xf0 [ 470.903628][T29087] ? __do_execve_file.isra.0+0x393/0x23f0 [ 470.909363][T29087] ? __x64_sys_execveat+0xed/0x130 [ 470.914484][T29087] ? do_syscall_64+0x103/0x610 [ 470.919255][T29087] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.925332][T29087] ? __lock_acquire+0x548/0x3fb0 [ 470.930285][T29087] ? prepare_exec_creds+0x12/0xf0 [ 470.935320][T29087] do_filp_open+0x1a1/0x280 [ 470.939841][T29087] ? may_open_dev+0x100/0x100 [ 470.944555][T29087] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 470.950194][T29087] ? find_held_lock+0x35/0x130 [ 470.954972][T29087] ? __lock_acquire+0x548/0x3fb0 [ 470.959919][T29087] ? debug_smp_processor_id+0x3c/0x280 [ 470.965394][T29087] ? debug_smp_processor_id+0x3c/0x280 [ 470.970873][T29087] do_open_execat+0x137/0x690 [ 470.975568][T29087] ? unregister_binfmt+0x170/0x170 [ 470.980686][T29087] ? lock_downgrade+0x880/0x880 [ 470.985545][T29087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.991798][T29087] ? kasan_check_read+0x11/0x20 [ 470.996758][T29087] ? do_raw_spin_unlock+0x57/0x270 [ 471.001898][T29087] __do_execve_file.isra.0+0x178d/0x23f0 [ 471.007540][T29087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.013806][T29087] ? copy_strings_kernel+0x110/0x110 [ 471.019129][T29087] ? strncpy_from_user+0x2a8/0x380 [ 471.024256][T29087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.030514][T29087] __x64_sys_execveat+0xed/0x130 [ 471.035471][T29087] do_syscall_64+0x103/0x610 [ 471.040077][T29087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.045989][T29087] RIP: 0033:0x458da9 [ 471.049894][T29087] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:37:53 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40240, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000001080)={{0xa, 0x4e20, 0x3eec, @mcast2, 0x5}, {0xa, 0x4e21, 0x8, @mcast1, 0x5}, 0xff, [0xa7, 0xffffffff, 0x6, 0x1, 0x4, 0x4, 0x9]}, 0x5c) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) [ 471.069505][T29087] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 471.077925][T29087] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 471.085899][T29087] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 471.093876][T29087] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 471.101855][T29087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 471.109828][T29087] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 471.188520][T29098] FAULT_INJECTION: forcing a failure. [ 471.188520][T29098] name failslab, interval 1, probability 0, space 0, times 0 [ 471.190112][T29096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 471.242277][T29098] CPU: 0 PID: 29098 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 471.250305][T29098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.257665][T29096] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 471.261878][T29098] Call Trace: [ 471.261929][T29098] dump_stack+0x172/0x1f0 [ 471.261955][T29098] should_fail.cold+0xa/0x15 14:37:53 executing program 0 (fault-call:4 fault-nth:10): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:53 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x410140, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x3, {{0xb86a88884a62812, 0x2}, 0x1}}, 0x10) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) [ 471.261978][T29098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.262003][T29098] ? ___might_sleep+0x163/0x280 [ 471.262036][T29098] __should_failslab+0x121/0x190 [ 471.276939][T29096] FAT-fs (loop2): Filesystem has been set read-only [ 471.279463][T29098] should_failslab+0x9/0x14 [ 471.279482][T29098] kmem_cache_alloc+0x2b2/0x6f0 [ 471.279500][T29098] ? kasan_check_read+0x11/0x20 [ 471.279523][T29098] __alloc_file+0x27/0x300 [ 471.279547][T29098] alloc_empty_file+0x72/0x170 [ 471.333889][T29098] path_openat+0xef/0x46e0 [ 471.338329][T29098] ? save_stack+0xa9/0xd0 [ 471.342678][T29098] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 471.348053][T29098] ? __kmalloc+0x15c/0x740 [ 471.352472][T29098] ? security_prepare_creds+0x123/0x190 [ 471.358019][T29098] ? prepare_creds+0x2f5/0x3f0 [ 471.362789][T29098] ? prepare_exec_creds+0x12/0xf0 [ 471.367821][T29098] ? __do_execve_file.isra.0+0x393/0x23f0 [ 471.373575][T29098] ? __x64_sys_execveat+0xed/0x130 [ 471.378695][T29098] ? do_syscall_64+0x103/0x610 [ 471.383472][T29098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.389551][T29098] ? __lock_acquire+0x548/0x3fb0 [ 471.394497][T29098] ? prepare_exec_creds+0x12/0xf0 [ 471.399534][T29098] do_filp_open+0x1a1/0x280 [ 471.404049][T29098] ? may_open_dev+0x100/0x100 [ 471.408732][T29098] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 471.414386][T29098] ? find_held_lock+0x35/0x130 [ 471.419159][T29098] ? mark_held_locks+0xa4/0xf0 [ 471.423928][T29098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.429400][T29098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.434868][T29098] ? retint_kernel+0x2d/0x2d [ 471.439460][T29098] ? trace_hardirqs_on_caller+0x6a/0x220 [ 471.445101][T29098] ? debug_smp_processor_id+0x3c/0x280 [ 471.450566][T29098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.456040][T29098] do_open_execat+0x137/0x690 [ 471.460728][T29098] ? unregister_binfmt+0x170/0x170 [ 471.465850][T29098] ? lock_downgrade+0x880/0x880 [ 471.470711][T29098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.476963][T29098] ? kasan_check_read+0x11/0x20 [ 471.481821][T29098] ? do_raw_spin_unlock+0x57/0x270 [ 471.486944][T29098] __do_execve_file.isra.0+0x178d/0x23f0 [ 471.492597][T29098] ? copy_strings_kernel+0x110/0x110 [ 471.497886][T29098] ? strncpy_from_user+0x2a8/0x380 [ 471.503008][T29098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.509257][T29098] __x64_sys_execveat+0xed/0x130 [ 471.514208][T29098] do_syscall_64+0x103/0x610 [ 471.518807][T29098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.524703][T29098] RIP: 0033:0x458da9 [ 471.528608][T29098] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.548397][T29098] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 471.556816][T29098] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 471.564814][T29098] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 471.572789][T29098] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 471.580765][T29098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 14:37:53 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x440000, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000240)={0x100, 0x4, 0xff, 0x100000000}) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000000)) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) [ 471.588771][T29098] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:54 executing program 4 (fault-call:3 fault-nth:10): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 471.659661][T29096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 471.693928][T29096] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:54 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) bind$netrom(r0, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast2, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:37:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 471.733969][T29213] FAULT_INJECTION: forcing a failure. [ 471.733969][T29213] name failslab, interval 1, probability 0, space 0, times 0 [ 471.756543][T29225] FAULT_INJECTION: forcing a failure. [ 471.756543][T29225] name failslab, interval 1, probability 0, space 0, times 0 [ 471.764093][T29096] FAT-fs (loop2): Filesystem has been set read-only [ 471.798449][T29225] CPU: 0 PID: 29225 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 471.806473][T29225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.816547][T29225] Call Trace: [ 471.819855][T29225] dump_stack+0x172/0x1f0 [ 471.824204][T29225] should_fail.cold+0xa/0x15 [ 471.828809][T29225] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.834633][T29225] ? ___might_sleep+0x163/0x280 [ 471.839493][T29225] __should_failslab+0x121/0x190 [ 471.844432][T29225] should_failslab+0x9/0x14 [ 471.848933][T29225] kmem_cache_alloc+0x2b2/0x6f0 [ 471.853784][T29225] ? rcu_read_lock_sched_held+0x110/0x130 [ 471.859503][T29225] ? kmem_cache_alloc+0x32e/0x6f0 [ 471.864532][T29225] security_file_alloc+0x39/0x170 [ 471.869560][T29225] __alloc_file+0xac/0x300 [ 471.873977][T29225] alloc_empty_file+0x72/0x170 [ 471.878738][T29225] path_openat+0xef/0x46e0 [ 471.883171][T29225] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 471.888542][T29225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.893997][T29225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.899457][T29225] ? lockdep_hardirqs_on+0x418/0x5d0 [ 471.904740][T29225] ? retint_kernel+0x2d/0x2d [ 471.909328][T29225] ? trace_hardirqs_on_caller+0x6a/0x220 [ 471.914976][T29225] do_filp_open+0x1a1/0x280 [ 471.919477][T29225] ? may_open_dev+0x100/0x100 [ 471.924162][T29225] ? mark_held_locks+0xa4/0xf0 [ 471.928924][T29225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.934415][T29225] ? mark_held_locks+0xa4/0xf0 [ 471.939181][T29225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.944638][T29225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.950177][T29225] ? lockdep_hardirqs_on+0x418/0x5d0 [ 471.955461][T29225] ? retint_kernel+0x2d/0x2d [ 471.960058][T29225] do_open_execat+0x137/0x690 [ 471.964743][T29225] ? unregister_binfmt+0x170/0x170 [ 471.969853][T29225] ? lock_downgrade+0x880/0x880 [ 471.974711][T29225] ? kasan_check_read+0x11/0x20 [ 471.979558][T29225] ? do_raw_spin_unlock+0x57/0x270 [ 471.984679][T29225] __do_execve_file.isra.0+0x178d/0x23f0 [ 471.990307][T29225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.996563][T29225] ? copy_strings_kernel+0x110/0x110 [ 472.001843][T29225] ? strncpy_from_user+0x2a8/0x380 [ 472.006953][T29225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.013195][T29225] __x64_sys_execveat+0xed/0x130 [ 472.018139][T29225] do_syscall_64+0x103/0x610 [ 472.022734][T29225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.028618][T29225] RIP: 0033:0x458da9 [ 472.032511][T29225] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.052106][T29225] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 472.060511][T29225] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 472.068474][T29225] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 472.076437][T29225] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 472.084404][T29225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 472.092375][T29225] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 472.112990][T29213] CPU: 1 PID: 29213 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 472.120999][T29213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.131054][T29213] Call Trace: [ 472.134371][T29213] dump_stack+0x172/0x1f0 [ 472.138721][T29213] should_fail.cold+0xa/0x15 [ 472.143328][T29213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.149158][T29213] ? ___might_sleep+0x163/0x280 [ 472.154028][T29213] __should_failslab+0x121/0x190 [ 472.158976][T29213] should_failslab+0x9/0x14 [ 472.163491][T29213] __kmalloc_track_caller+0x2d8/0x740 [ 472.168870][T29213] ? pointer+0xa30/0xa30 [ 472.173132][T29213] ? kasan_check_read+0x11/0x20 [ 472.177995][T29213] ? sched_exec+0x1cc/0x260 [ 472.182503][T29213] ? kasprintf+0xbb/0xf0 [ 472.186756][T29213] kvasprintf+0xc8/0x170 [ 472.191008][T29213] ? bust_spinlocks+0xe0/0xe0 [ 472.195695][T29213] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 472.201509][T29213] ? sched_exec+0x1cc/0x260 [ 472.206021][T29213] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 472.211838][T29213] ? lockdep_hardirqs_on+0x418/0x5d0 [ 472.217325][T29213] kasprintf+0xbb/0xf0 [ 472.221407][T29213] ? kvasprintf_const+0x190/0x190 [ 472.226444][T29213] ? nr_iowait+0x130/0x130 [ 472.230871][T29213] ? kasan_check_read+0x12/0x20 [ 472.235749][T29213] __do_execve_file.isra.0+0x94b/0x23f0 [ 472.241299][T29213] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.247565][T29213] ? copy_strings_kernel+0x110/0x110 [ 472.252854][T29213] ? strncpy_from_user+0x2a8/0x380 [ 472.257982][T29213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.264236][T29213] __x64_sys_execveat+0xed/0x130 [ 472.269189][T29213] do_syscall_64+0x103/0x610 [ 472.273792][T29213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.279686][T29213] RIP: 0033:0x458da9 [ 472.283589][T29213] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.303198][T29213] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 472.311616][T29213] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 472.319586][T29213] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 472.327556][T29213] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 472.335534][T29213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 472.343509][T29213] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat ', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:54 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000380), 0x2) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{0x0}, {}, {}]}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c3d8f", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=ANY=[]) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000180)={r2, &(0x7f00000000c0)=""/166}) r4 = gettid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={r4, r5, r6}, 0xc) r7 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r7, 0x89e2) 14:37:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:54 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2400, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) close(r0) 14:37:54 executing program 4 (fault-call:3 fault-nth:11): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:54 executing program 0 (fault-call:4 fault-nth:11): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 472.450729][T29329] QAT: Invalid ioctl 14:37:54 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) accept4$rose(r0, &(0x7f0000000000)=@full={0xb, @dev, @rose, 0x0, [@remote, @rose, @bcast, @netrom, @netrom, @null]}, &(0x7f0000000040)=0x40, 0x800) r1 = semget$private(0x0, 0x0, 0x0) semctl$GETPID(r1, 0x0, 0xb, &(0x7f0000000080)=""/183) [ 472.492944][T29334] FAULT_INJECTION: forcing a failure. [ 472.492944][T29334] name failslab, interval 1, probability 0, space 0, times 0 [ 472.511418][T29338] FAULT_INJECTION: forcing a failure. [ 472.511418][T29338] name failslab, interval 1, probability 0, space 0, times 0 [ 472.533664][T29334] CPU: 1 PID: 29334 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 472.541658][T29334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.551719][T29334] Call Trace: [ 472.555024][T29334] dump_stack+0x172/0x1f0 [ 472.559383][T29334] should_fail.cold+0xa/0x15 [ 472.563990][T29334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.569813][T29334] ? ___might_sleep+0x163/0x280 [ 472.574675][T29334] __should_failslab+0x121/0x190 [ 472.579619][T29334] should_failslab+0x9/0x14 [ 472.584131][T29334] __kmalloc_track_caller+0x2d8/0x740 [ 472.589506][T29334] ? pointer+0xa30/0xa30 [ 472.593752][T29334] ? kasan_check_read+0x11/0x20 [ 472.598609][T29334] ? sched_exec+0x1cc/0x260 [ 472.603116][T29334] ? kasprintf+0xbb/0xf0 [ 472.607375][T29334] kvasprintf+0xc8/0x170 [ 472.611621][T29334] ? bust_spinlocks+0xe0/0xe0 [ 472.616307][T29334] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 472.622122][T29334] ? sched_exec+0x1cc/0x260 [ 472.626634][T29334] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 472.632449][T29334] ? lockdep_hardirqs_on+0x418/0x5d0 [ 472.637743][T29334] kasprintf+0xbb/0xf0 [ 472.641816][T29334] ? kvasprintf_const+0x190/0x190 [ 472.646858][T29334] ? nr_iowait+0x130/0x130 [ 472.651282][T29334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.657531][T29334] ? kasan_check_read+0x11/0x20 [ 472.662400][T29334] __do_execve_file.isra.0+0x94b/0x23f0 [ 472.667952][T29334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.674211][T29334] ? copy_strings_kernel+0x110/0x110 [ 472.679506][T29334] ? strncpy_from_user+0x2a8/0x380 [ 472.684626][T29334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.690876][T29334] __x64_sys_execveat+0xed/0x130 [ 472.695833][T29334] do_syscall_64+0x103/0x610 [ 472.700434][T29334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.706328][T29334] RIP: 0033:0x458da9 [ 472.710242][T29334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.729850][T29334] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 472.738269][T29334] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 472.746242][T29334] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 472.754216][T29334] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 472.762188][T29334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 472.770163][T29334] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 472.778166][T29338] CPU: 0 PID: 29338 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 472.786158][T29338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.796206][T29338] Call Trace: [ 472.796232][T29338] dump_stack+0x172/0x1f0 [ 472.796255][T29338] should_fail.cold+0xa/0x15 [ 472.796276][T29338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.796299][T29338] ? ___might_sleep+0x163/0x280 [ 472.796319][T29338] __should_failslab+0x121/0x190 [ 472.796348][T29338] should_failslab+0x9/0x14 [ 472.828597][T29338] __kmalloc_track_caller+0x2d8/0x740 [ 472.833983][T29338] ? pointer+0xa30/0xa30 [ 472.838236][T29338] ? trace_hardirqs_on_caller+0x6a/0x220 [ 472.843883][T29338] ? kasprintf+0xbb/0xf0 [ 472.848139][T29338] kvasprintf+0xc8/0x170 [ 472.852396][T29338] ? bust_spinlocks+0xe0/0xe0 [ 472.857092][T29338] kasprintf+0xbb/0xf0 [ 472.861173][T29338] ? kvasprintf_const+0x190/0x190 [ 472.866215][T29338] ? nr_iowait+0x130/0x130 [ 472.870639][T29338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.876887][T29338] ? kasan_check_read+0x11/0x20 [ 472.881755][T29338] __do_execve_file.isra.0+0x94b/0x23f0 [ 472.887304][T29338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.893588][T29338] ? copy_strings_kernel+0x110/0x110 [ 472.898893][T29338] ? strncpy_from_user+0x2a8/0x380 [ 472.904019][T29338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.904043][T29338] __x64_sys_execveat+0xed/0x130 [ 472.904066][T29338] do_syscall_64+0x103/0x610 [ 472.904089][T29338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.915250][T29338] RIP: 0033:0x458da9 [ 472.915266][T29338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.915275][T29338] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 472.915290][T29338] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 472.915300][T29338] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 472.915309][T29338] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 472.915317][T29338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 14:37:55 executing program 5: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x800) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x1, 0x0, @pic={0x1ff, 0x9, 0x1, 0x9, 0x9, 0x100000000, 0x1ff, 0x2, 0x1000200, 0x1, 0x1, 0x4, 0x4, 0x8, 0x7, 0x1}}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:55 executing program 4 (fault-call:3 fault-nth:12): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 472.915333][T29338] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:55 executing program 0 (fault-call:4 fault-nth:12): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 473.113840][T29455] FAULT_INJECTION: forcing a failure. [ 473.113840][T29455] name failslab, interval 1, probability 0, space 0, times 0 [ 473.149564][T29455] CPU: 1 PID: 29455 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 473.157578][T29455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.167633][T29455] Call Trace: [ 473.170940][T29455] dump_stack+0x172/0x1f0 [ 473.175286][T29455] should_fail.cold+0xa/0x15 [ 473.179907][T29455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.185731][T29455] __should_failslab+0x121/0x190 [ 473.190677][T29455] should_failslab+0x9/0x14 [ 473.190695][T29455] kmem_cache_alloc+0x2b2/0x6f0 [ 473.190710][T29455] ? nr_iowait+0x130/0x130 [ 473.190733][T29455] mm_alloc+0x1d/0xd0 [ 473.208456][T29455] __do_execve_file.isra.0+0xaa3/0x23f0 [ 473.214020][T29455] ? copy_strings_kernel+0x110/0x110 [ 473.223055][T29455] ? strncpy_from_user+0x2a8/0x380 [ 473.223078][T29455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.223100][T29455] __x64_sys_execveat+0xed/0x130 [ 473.223122][T29455] do_syscall_64+0x103/0x610 [ 473.223142][T29455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.223155][T29455] RIP: 0033:0x458da9 [ 473.223171][T29455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.223180][T29455] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 473.240918][T29455] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 473.240928][T29455] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 473.240937][T29455] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:37:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:55 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x132) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xff, 0x10001, 0x2, 0x5, 0x3ff, 0x9}, 0xfffffffffffffffe}, 0xa) 14:37:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x100) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) write$P9_ROPEN(r1, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x20, 0x3}, 0xfff}}, 0x18) [ 473.240945][T29455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 473.240961][T29455] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 473.354120][T29558] FAULT_INJECTION: forcing a failure. [ 473.354120][T29558] name failslab, interval 1, probability 0, space 0, times 0 [ 473.386953][T29569] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 473.442391][T29558] CPU: 0 PID: 29558 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 473.446710][T29569] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 473.450411][T29558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.450418][T29558] Call Trace: [ 473.450446][T29558] dump_stack+0x172/0x1f0 [ 473.450473][T29558] should_fail.cold+0xa/0x15 [ 473.482621][T29558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.488446][T29558] ? ___might_sleep+0x163/0x280 [ 473.493311][T29558] __should_failslab+0x121/0x190 [ 473.498269][T29558] should_failslab+0x9/0x14 [ 473.502783][T29558] kmem_cache_alloc+0x2b2/0x6f0 [ 473.507646][T29558] ? nr_iowait+0x130/0x130 [ 473.512085][T29558] mm_alloc+0x1d/0xd0 [ 473.516080][T29558] __do_execve_file.isra.0+0xaa3/0x23f0 [ 473.517557][T29569] FAT-fs (loop2): Filesystem has been set read-only [ 473.521626][T29558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.521656][T29558] ? copy_strings_kernel+0x110/0x110 [ 473.521671][T29558] ? strncpy_from_user+0x2a8/0x380 [ 473.521694][T29558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.551113][T29558] __x64_sys_execveat+0xed/0x130 [ 473.556070][T29558] do_syscall_64+0x103/0x610 [ 473.560677][T29558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.566579][T29558] RIP: 0033:0x458da9 [ 473.570484][T29558] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:37:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000002040)=@assoc_value={0x0}, &(0x7f0000002380)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000004440)={r2, @in={{0x2, 0x4e24, @local}}}, 0x84) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004680)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000004780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000047c0)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000048c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004900)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000004a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004a40)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000004b40)=0xe8) lstat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004d00)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000004e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004e40)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000004f40)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004f80)={0x0, 0x0, 0x0}, &(0x7f0000004fc0)=0xc) setxattr$system_posix_acl(&(0x7f0000004540)='./file0\x00', &(0x7f0000004580)='system.posix_acl_access\x00', &(0x7f0000005000)={{}, {0x1, 0x2}, [{0x2, 0x3, r3}, {0x2, 0x5, r4}, {0x2, 0x3, r5}, {0x2, 0x4, r6}, {0x2, 0x7, r7}, {0x2, 0x2, r8}, {0x2, 0x1, r9}, {0x2, 0x7, r10}, {0x2, 0x4, r11}], {0x4, 0x4}, [{0x8, 0x5, r12}], {0x10, 0x4}, {0x20, 0x1}}, 0x74, 0x3) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) sendmmsg$nfc_llcp(r13, &(0x7f0000004200)=[{&(0x7f0000000040)={0x27, 0x0, 0x0, 0x6, 0xfffffffffffffffb, 0x1ff, "7c10e119ce5a35402e878daf2866019c3ecd57319a4bc7bc70335d9ee131322dc8be67bc1d1cd4d37d93d815eca8826daf3f14e1b3f122eef07934ba9bb05f", 0x1f}, 0x60, &(0x7f0000000480)=[{&(0x7f00000000c0)="6cac8186a808ee9f501a74eb948d4cdc525926f7b0f1df4011046d00c924e645c46c7d7b67cec914736616e83f53529d2a94ec5d9b1e539edf611e2a27fa3109040d0fb9929e88cbdeb6e80e0a779f6be61be40ec755f3657243f2996c6793f4614dd941ace6fe49e27708c19302bead8925da0304da97febf6b72ab838321a9e0703831acf638a41e17d4ca29af98e2434aa7f6d05ed9a492d02ce84402133b370fb3d9bd524b7addf253776d95b8a56d78b8840b84c1fa", 0xb8}, {&(0x7f0000000180)="480403ed736ffec22b438a134055558f3c15026e6d466ec5ea0f46d56b69733cb80e2f80375427c15373", 0x2a}, {&(0x7f00000001c0)="6ae42ac891dcc10ece9ca4449296f23be3a14c4645dde2bfd0dcbde516a9f46b8d5a0770f2c77269f7edd87f7729fbbf9dbe634a69d744dbd8231142f90431f946099498ca54fa060a3edc3cf86925a39a4eb2db2e3898aa3f351774473021ee9cf6713874208de4a337ad7f86298452ee653e71871ea588f633cdb9bdbcdf762aca79328ff647e651716e944f7a8554ff097fbe973a825381e3918938cf8334e8", 0xa1}, {&(0x7f0000000280)="4769d93a84bb9b2f8e354646f95eccf0cbccd1ca3dba5a34c4e2ff800a373a554dc0798a636b15c55b45ca8e53dc9959b1a0350676bf62ee02b8335b5d262c9a0d61095d58f11f4b38a13e673bc1b4982a194adb11395d98c5c50c1bf077f13af4b99ed6a8cbb5bd8d3db512effd71c0180d96d98fc24896c83e0baea6da582bee1faff2efc0cb3af6f7c3c2c6c39a35f880779bd0f98a164cce5a960b647ad37dc675250d0b51d90161c04f161add122ca26ae7ae8cac8b7b0c4ad995bd3ca35462f2345a9e73e4af613d2b62d708e70f99d9f99024be558775c9d56c6351d3fed4fbf7e2", 0xe5}, {&(0x7f0000000380)="ab9dfdf07b97cb4257753b0b52ceedd562198ef8bb15f1be11e9d7ade86e412da88b6e629506ed94df7873dd4894752dce170024fce26dd6686a37b8e622c82289b84871c4fcd0a7bce1b4dbd73cadc2ac5a8fac065b9d2d5c704ebe2c51c367c999b7f2c6d0d1b01e2f0aeacd9023cc4270455c7f108bdd47c3fb8d26", 0x7d}, {&(0x7f0000000400)="f69e699fec1d60363c07f4d5e55ca47310d9b793054374de56d0b203514747531a8a395ba1d1225c2fdc921ff0", 0x2d}, {&(0x7f0000000440)="c50a38181755ffaf3766eebe0a95e3", 0xf}], 0x7, &(0x7f0000000500)={0x28, 0x11f, 0x1, "032b3340e26eeeedb1388453d13f216d472e7ae203828037"}, 0x28, 0x10}, {&(0x7f0000000540)={0x27, 0x0, 0x0, 0x1, 0x40, 0x1ff, "81dd9743f910309596517c45492e0be53e87bc28466df01ff7a99317e2ffe2885dc9790b59073f61b46d5c1614f514fc575269ef893a53f4f50df32eebb3dc", 0x28}, 0x60, &(0x7f0000000900)=[{&(0x7f00000005c0)="c8064d", 0x3}, {&(0x7f0000000600)="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", 0xfc}, {&(0x7f0000000700)="8723db59ab0a077f85d5d90f1ad53a1b3316cb2a6aa4a8442b1e3f8cac3ee3ea8287a5af64a6a2c895918cd5b2241b968f", 0x31}, {&(0x7f0000000740)="b322282269c1e1d1735c0fa376ad5867e370a7ce2f90ab916a94eebdcd5b48876e670dccf995cd4a037a861bffe3c33fad67537e8a60c823077b35dc4095f65ff18465a935edc50e69b827942547c90a29489c32bf183777ba023a759bc5b93030369c8357cb2e881988421f0324b788bdc02c2f3dce334f19c370eb1885ba6a7ee98cd0d5a669e52869ae0bdc133e9c2288e898a6287eeab68b3c31b57a896d60ee40451149e939bd7ea335db", 0xad}, {&(0x7f0000000800)="db34e905907ca4acee073ae17236b7657a442a5b9dd0ff5e4e55de08c91fa787bca5ff95b89578c320c9ab3bb364ba1e53bb3a9d15d7521f5949e01f59bbd3f371d795c83cd5b2566fac206c474c01b0086be5037c02eea3eaa73817eee232f237ed751d1776b50fbc27389581dfdccba3209e086b3358b2deaf65ebfaff0ad73ef4814233d8599decc15482524cb162f4e01d6c9882ca58c8703be7dec84c351b3c84bc534d7aff55eaa51ca51b663ce150bb4a2976aa8f", 0xb8}, {&(0x7f00000008c0)="3b2e762cc49fcfd3c202e3a2574ccdbe8c2b510b4f0a8b2c5ded76081e612ac0959b1bf7", 0x24}], 0x6, &(0x7f0000000980)={0xa0, 0x10e, 0x9, "97576b465169d81e0bf9da48fc2580b917283351a57c9604ef3bc097112a3489673db3081028c2ae42dba7c1a6b530ca5ab563c49d4bf29ae36ad6c5eed228c0d4cf0ca138e853cb482a15d9fe35a28c970dc1f591677c2ade96d516107df14f036612e31c25d9f4e7da4a25b3a00cc691b256e240dd936a5a34ff0b69dbddbdf2d4890e0a084411fbc8e6087b8a5b"}, 0xa0, 0x20000084}, {&(0x7f0000000a40)={0x27, 0x1, 0x2, 0x2, 0x8001, 0x3, "25587c7ce407cab0e176ff57435fed7e351fee5b658e1cc9fe824aad891feadad4071424a673f19677fe9b2cac9bcd57cf2da6d1d2e9be70ee90b8b75e0ab7", 0x17}, 0x60, &(0x7f0000000d80)=[{&(0x7f0000000ac0)="a9f40ca45e6653210424bc9e34517bb17450ca1212bfb727ba2fb3edec81d5b232874706ee202ab277a96a616b91cde9eedd80a9db10c078a0b5723b1e2e1c357f6ab91140aa173cd6ccb0e34a3e5b703b63ee5294c4b5c0dfbd4c874a63f155bc6ff0e0be4fcdfb9485de5a4c9cf759c2fa7757eed2a2a847a704e90e47bb22bec5f804fe69b831bcc5bbf33196c6ad44a7b45e5ecb9b54060e0b24727b8c431047b6fc2f649cbb67382454d4b99b4b11ae", 0xb2}, {&(0x7f0000000b80)="c9d5b3fc3cf3230ca90481ee9a25b5edc843", 0x12}, {&(0x7f0000000bc0)="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", 0xfb}, {&(0x7f0000000cc0)="44af92d564e93d6edb2399301fc9a50115898504b7ec18bfe895477fe0bea0af6e53b36d342e9fd00b706fd060a50eff8f2293331b14cb22c85b4f420bb749e913fd603407385a1c4288c9c793048a4687a02ec73f761eda8425e47e790db921cce3eac85a4f1ebceb57994e48d2c51ee03d8bd628b5dece40534c59584f173fe12f73c34c2571fa63cd097f8fc19308f13960e2091bff1c5c19da", 0x9b}], 0x4, &(0x7f0000000dc0)={0x10, 0x109, 0xa2}, 0x10, 0x40}, {&(0x7f0000000e00)={0x27, 0x0, 0x2, 0x2, 0x4, 0x7, "4abe1ca422743828f7a38fbac0be3add670a0d6945b56f1c9b888a25f5e4c1515112544de6389a1a65a730b4251287db1cdaa8ea719d2897a46753558aaa44", 0x1a}, 0x60, &(0x7f00000011c0)=[{&(0x7f0000000e80)="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", 0xfb}, {&(0x7f0000000f80)="0def", 0x2}, {&(0x7f0000000fc0)="428b70455d1b4d111ffa57741124d1911b682d51ffee982ea9d0831090ca232b5039b9a4feba8d7b2e00e1769457358e794c8ae91f4383bde7617f4692c9cad81516e27caff4b8dc84551a7b956c50995d8035d73ec9c88204feb3ab4c82827b6ad56204929fcf4a13bf324fc5dabd47d571e32e277243804940f2870de70c5104b5105bca3bf55141cd6fed00ce8ecd9b961838c909b49e434ec87ac65b6723ed087a535876985dc322fb38672ae392cfd8b88d546a80d4dec36d10e7536d6110f67c53f63c7298d6c6d00ff542a2cda2ba0bc49a8f3a550b87748667b5cb28468451", 0xe3}, {&(0x7f00000010c0)="64e9f653363dcc4da3851218ec9521b848b5f7c95b8b1b03a97442965f9b31d9f04efecc6b4f900b3baa2d00a81467d2547508c28a1135d05faef826769797b55eb5ca325aa806758b757d638e068a3755a8e1d631959ca7de10aa53f5755abd6c1a614fb4d5d13d0db145ee7200bef88c59", 0x72}, {&(0x7f0000001140)="16af6994e733367a979e0f467f1c82980f12ea7628c6e6e809c20c18f533d431e26787475c7cd2d25866dce9ab6dffa0cf594bc66e5de5205581d05b612f4e87b9a4690c455d71be577b4757c63a30b1b5b5c2e57fe6432cc76f35562aef42dc65", 0x61}], 0x5, &(0x7f0000001240)={0xb0, 0x0, 0x1, "acfa4308f9cdf64d6b2882adb9e8137608ada78417d4fb4a345a94fc744a719212ffabc8ab090c2ac5ea7810e42a11db37c672cf088710d4a977818c198a1f6e574438705cad23bb50d856aa6c9a066391ad135de0e8dd1d3522e9a9fdeedbd4bfeb71cd2602fa9f9535e8d8572f146302857c3461033a919d8013e6ba5b620e1c8a4074a741f14258d54b8401310542ff27635ca4c9fe2150"}, 0xb0, 0x40000d0}, {&(0x7f0000001300)={0x27, 0x0, 0x1, 0x7, 0x100000001, 0x8000, "399c15c0a907bcf29ce999d00ced4633992323db853f61d04a3aade0b749c91c26f4026ac59349fc2043c95cc4eddcfe37373d4f554947be673e7f69e92192", 0x11}, 0x60, &(0x7f0000001b40)=[{&(0x7f0000001380)="22e2edeccb16e1da48522139de78f4dd64b8d51d9585e663c9e5ca72cdc67dfe10d660c7258e06712f18ce64cb695ac26e9e59c2ab37326aa2a3822f0ee0840bf44d1bb24958af1a85cb4754aaa1a80d9f39577e2353228baac0f02dae438c2931e0465ff835dccd23e51a876454ca93fe5a56bbba00aea6c0a3b56da90873a417", 0x81}, {&(0x7f0000001440)="cb90aaea6585ee34e7b6da225340cc93b3ecaf04a94f50e5cb9ba26f81116fde624e439a30f3d7c7f81f30e4ec0722aa49999d66ab932bf086161e19f8691d27aae76d18adc0149e7c17af0804fa1fc1c21771a7d469caf74020c8d793a684185f7986badc36a0402be80b67c2e6de5cfdeee8ad6003363d520acb7f34b33e1b04f92987a1a147f3a29374632c90e28ebc2461a749a537428f6049503e93065dd73aeef3a8275788ca480dd5c44a06127cdb50ecf0155bfa2b3b9eb0ec5ee136273215d11a09a2f2374b821db7ee9124ac164ffd86ae4ef40e92b41f154de1dc96f84f6cc005", 0xe6}, {&(0x7f0000001540)="f8b51f3c308b0f0a014106930d5e2a6b8e66a5cbc5cc26c441118350372441873327e2fb5c3e564278b4653b3edc99a082bc3eb3005429739bc9cd39cb38f9e2ba76762f6c833d046449e33066dbaf1e273393e77284560b4dd42e032ca711abe1782c3583a992ceebd8af71820b99a0ae1cf1082c5e7c658b1592f71120fec75c2bd183e7f79d8c9afa806b2d9728bab11f495711867285d724fe75c282c12416", 0xa1}, {&(0x7f0000001600)="2bc789e13e963f484aa904e53f7d0d33397d28c155488583cee59912d99af630f6ddd07afd2ef15d6ebaa085eb8bd6318938e210b4128e3c455ea2b992791d1ad68073d867763a463b53cf8ab0cca500a5db5c3a8df0974fa8e72d6d036f19d8eb6b76627c5b19528a7722b21ff6c5f59df8b19e1173711e61722a93c651d5442487785df6acb327d26732220c3e1c2f170f87aef29339318293863a498f5c770a7f777d9627748d29f9e63d6fe3a75776cb7b72e1326cc94aed3f04e9bb32ee3d2d3e57baf4", 0xc6}, {&(0x7f0000001700)="9a50191e8690321b69752278d63e345fb7f24f7bd06f31d4bf11681590bfe147f7eb9969ccade2f3c659ebcf352b7342f49047ea960c5079bcd00b233dd091a0b209d7432f53bee45272704f5644ff5ce9251b9447820853fa404032fd1cef4dc525b9dbb12d9cb50f3d4900b80b27feaee58890524ebc10e635d0f96273917383b1ad8511aed059f2846d02ef17dc8e2ff662ff13f835e33398819c35393c86ea768db653aeaddf4842b151700440a913426ac0f4bb10fc", 0xb8}, {&(0x7f00000017c0)="effe6386795c9d6532773e33255aafaa72c8c7bcc9c59e7ea429f60ac03bbb9efdef1ae78077a118ef68a5a958e7156fcc03e779e1169adff28f20d8e385d67db4e7c57a277558ce6a8f87f7ba63f17f683d44ccf7fa2284410082ed7172aceed6de117c10f958740cb9847086fe33ad32e2ca8a1a41d9a510e0fb196630cbbd35b365914ff213b87b7e7d7e", 0x8c}, {&(0x7f0000001880)="1de05240fc38b15dea506f65d66876215d48ffc7c60af689d437864fae67d060cb56c5f42e0f4c8c81e5ac341593529bd743812438bf276897a8d9aa6043826b0cf5f7d7351434a8c707d9d8d998e2d4c30342376285931435df0d4732b30cf5eec921b8072120fd5027ac84a58aafc340e042ce72fb4a992df696254448dec0299f7d3aa9e51c1530df509215b398331621ac0f021098504f4b49299ce61d76498e953ec2ceade4a48808409014cf4992cbe55572f003c9bad5b885bdd09423e7f0250527ec5209", 0xc8}, {&(0x7f0000001980)="d3ab7e33c0e82c1b641733291c2ec35d3099fcf8219f820f0f930f9734a10468308eeffd7bc9d4a66ff484017e4989b83772e5e1a2acefa17cb07e8ff6fc74", 0x3f}, {&(0x7f00000019c0)="ab132782117424f89689ca7c71e0a28140de999a338734277dfd4605a5a6b8236e7839765c15a63c26fae6f54e938f28dced3e6b0c6ff5672c4f6e532db42a231c138e8f49c58877e81d0cebf75a98bc2c0a5223194741944babaea97d61159b2cf34c28ebe61006cc47dad80155483ab4c7f8c3f9eb69cc20e1d329804453362b7eafba8b130ead2d96c99a428d20eb073806360638889e3107fa4f63447f0dd07e9f137ec7d1c5ad453a9af837b51fd957809a02cf26ff8633", 0xba}, {&(0x7f0000001a80)="91c8816d462112e554ab7f838ab73b955e73f9062ddd32b1f3d82ddcd2a8c057ba68f0d5b8961f8f9cf78f0ab1af2309a9128876056c48ccbc1f510a1ee071d8a9901af8bc5f5693b51ca426d75d618bfba4271d9d938fc056401bf3b80d0b7cf3cd13f4eccc6f7945044521d67152be29173e22a1266b5826a0c07dffa0f6d549adf558a7aa731e720044594008ead2aa33fff4e4316ee189c1c12845085c5b5d3000324e689b23e10e4c8ad57fe5", 0xaf}], 0xa, &(0x7f0000001c00)={0x68, 0x0, 0x20, "59c8bf85366bdc8c4f9f3c441d2428f489787b032aa497b8968aa4b1634822e2d55ed1741a67b9cddbfc09783d9a0e31463dda5cab763319c66d693536cff3e6ab9662467ddc40ce9c9760dcd04222491f61"}, 0x68, 0x40}, {&(0x7f0000001c80)={0x27, 0x0, 0x1, 0x0, 0x401, 0x11, "81564f0e4b0125b4ce5fc63def56382c4a3a2658bf97382e222e1055d4d9b6295e6761af1ba4507b99dd08f62ff57da05fa7235bde86bfab246d74450fe6d1", 0x21}, 0x60, &(0x7f00000021c0)=[{&(0x7f0000001d00)="14dc557776bbefb8063b9d6bfb12c81a24c1fc492aaf0dbc92d7fb539a159b227fd34f3c7c983e65de121b6742e30582584af3c2793cfddf71decbe89c2357098c4ad0da248ce8f07ef6a4031bb8941b3b1b384f1653155e47c9cbbaacab3a84517863dda6302e4ec1aa4625d46939da3040eec0552b0cd693c420ff1651bad1e6b9dff0ba3c7246a22765ee5850463d9c3ac08498b88fb79007c660904b469d63031c49e1a9740b018f0fe8fbd49ece2b276533fc25ac137a6098704a37685f28f0c07c85378a8e26cead5f7fec86930d0c78894e6fe16914", 0xd9}, {&(0x7f0000001e00)="99075421b544c45d8847f2dfd4a7d12e89a427196193ae6b8bdc1459ad51381137b383524946edd03e8bd19d6182a2361beb7718e4c58c79811fcd772e0ca8e637b7311a2543a26d21d43f27b44f3651e7503140485630b1c878", 0x5a}, {&(0x7f0000001e80)="7ca5ab27982421751158ff3f6c0a10d35daa3b61e1279c2b62bc23984ea32712201c105c425855993bbb2f2560000ab7ee743ed91eac7ede91814daf51632d42a5dcb5075e2bfa0376484a1bb35c0c09e12dbc22f760075cbc38c520874cefb230e608dc37656690f503800acf236b44e0a703a5ae706f91ed7c984c0b4e0bc3981ab4", 0x83}, {&(0x7f0000001f40)="c1b0008536a7178c66e1565ca2e988d276906f2d9bd930adbea7ec3b16", 0x1d}, {&(0x7f0000001f80)="7a79b9a2dad0cc4c2138b11539376a4a766ad4a5287e5d1d033f021792beaaa2b8b5fa4d45f7b34f3bebe89637f0f7aa6c187668e1dbc0e220acad84c7eae94a3d55d31bc4a5cc59f4d0eea3e01459e6426ff91c58967f3ba1d7d0f387cd812d3a37784cae51281f60c1610265564c06986785f82968ecf9d41ceaeaf9bbeaba3b7981da32df8706aa62b08b1822255d7c179684e6de321d92e2b2420e5474412c512ecefee6eeb642405d0d1f980ce18445f639c1871992cdebd5ca", 0xbc}, {&(0x7f0000002040)}, {&(0x7f0000002080)="2c965d510977cbe6573402c07053a181c8441ad31f2d6a350f9b53aedf33c1e8f5ca22c87a5a0fb60abeee1ed3394e019ec1db62b3ee1f2a015572f3a459b92f705fe7d74c7750e50ddb9367daf358b439", 0x51}, {&(0x7f0000002100)="5f83dc29ff11a6847d07ad7a871d86d2f2681f934fea13675d78cddf1b2d4a6aa3c6ca9b8359e06f5957d35dd9f2ee18654e09ee5a0d03b4717c5849cd5d6a3487356e71a8483de8697b9c863357a4a0885f0f49a8ff7c2bf59a8ecde5e3d78a6681cdb2fa723918da9e4fdf545537b53a8a5b57be2005e432029f0105fa5b51adff35b60b96c2d0543f83bfb903a6ba1e5a", 0x92}], 0x8, &(0x7f0000002240)={0x98, 0x3a, 0x3, "df9776235539bee50934b7bc2e56969df5782e9129662b96102cab06162d4e0e502facf5308aeb0267904518c6eddd3df8697bd32ae459a94d74715b5d115269437a732ba89cb592bfc54d49ce3cc54ae9dd8ebfc0f70157bd776a53abb5756835806e233c2981cb15b8cbcd41834db8b94709b6cbc7bdd002b754f4ed999af61f6a"}, 0x98, 0x80}, {&(0x7f0000002300)={0x27, 0x1, 0x2, 0x5, 0x9, 0x7, "75cb1ec624f6f62971a1b970ebf611eca82d3780a86e1f87e17fa732e0e6702c5cd501be8c9f12613bbe27cdad4f891b2bdb8bdaa16db548326331c346b7c5", 0x3b}, 0x60, &(0x7f0000002600)=[{&(0x7f0000002380)}, {&(0x7f00000023c0)="58721cca9f27aba1d0235aecab1cb697af7cdc129a26f5c031a1d5a0d1ab8cc0ec03ce3131bf9684169ac14a5f80be5595db8ec75e6428664550158fcb1666428fae284030b7b2a0933b761a8ab6a295dd836223d69c98660c979cb8a2e9b387af3f20682968296ee8fac2b158d22e", 0x6f}, {&(0x7f0000002440)="fe0c70f6218cabcccb219cf06c40fde20cc68789e6ee2280b5ced5291f6ec24c92d28c66372100d75824b19688b6d68f6518e8", 0x33}, {&(0x7f0000002480)="b435759d2157acd321c78f40b489501635a9766a19e6c2fb0057a1724c1895160903d2bdd87bacc9a0304e263b8cba5d", 0x30}, {&(0x7f00000024c0)="2d66fdafe05a6d8eb22fc869dd20eefc75a31b9f9b8d6ab766967f52a43df00f29a1bc8896a391b8364f9646a1499016df", 0x31}, {&(0x7f0000002500)="87b926cf87fe265d1913786b97d41498521ee3d480b223850509daa051ccc7461b8ed1e6a6bb97416436110dfb63391f0d35ea31c57d98ee83be04701b74fd19054394a88492ddb7e8579ed239eadef52555968709def5f66948269bc617289e3d0a321eb8de4cbd632dce", 0x6b}, {&(0x7f0000002580)="15008564b128773a011f88b842ddf7cda306998e0b333b727cb971da24e84613edef0c4c0044fc4d60911c7aaa24cc960cf499083fd2df8b148d89e547f53bea6a25e9986bb06cce734a47178d66edd46d927870688c22e17054bf97d5198a88a5bd2f1758ea9630f1", 0x69}], 0x7, &(0x7f0000002680)={0xa0, 0x112, 0xcd, "f8454fc69595cff180e8283bc869f2bc8cc78d89fac534165192e48d70d82e06845515ba3c977301b798ab686299a5cefcbe7ecfcc399a5aea3e07f47ec34a40a98170af25176b155e79997496a4aafdc1329638ae1a7e44702d2680d7d37d2062bd15f3258c998a7b09a46d72775f5e48ac3d7f870bb18b7d56a175a4a231a8212fd3b5270b1dc66d71a3e98a"}, 0xa0, 0x8800}, {&(0x7f0000002740)={0x27, 0x1, 0x0, 0x2, 0x72, 0x8, "f3251c4dac503f72fcb682cc90ae241b98e5c69db31662c6b54993a4d929a7fb48b5827684a8f94d0d1839381c97772162f000f614e3ae03de40ad8f5b7c2f", 0x2f}, 0x60, &(0x7f0000003c00)=[{&(0x7f00000027c0)="147f7ba92a77fd6812595972c7217f0911c1d8e06975dd32807bca0b6c12d895fb5c90f832711618a4bea33b9e303855df8dc87aa0539ceb2cc4406930d93344740893e8cb098979dca23a6ac7c1e8eee74feb51fc6f72eb4ed01314e0b87a193502005c109440843a759f29a8e62db6bd24688cb46ff803b63db5a278c5f8752c269847e75d6f0a57930077485f92eef4948876b15b44b5d9bf01ab6f9234b8bf775c277f1fe6b9", 0xa8}, {&(0x7f0000002880)="0aea7c9c9735a07f92b8f51fcae6266949e946a62838282aef3cde40aa0d74ec7f8a2a51f1dbd76217b702108e4f0ec44fdc79ef53879dd6f7e186470618af4488a062630d9d9de9450eb2228278b838f2da7ba7e4d93c9b8eb8a1906538399b2893b7dca2b46080bfa678d78e848d037e3e5e2d74a31a01aac0f4896bbc66c2c046577dfd7e94c7416501e56060bc4c0a29739dcace50f6559c82c4f0aac4995af4b97ef0748b617d7ffcfbe1fcf646aa53491cd337639f794942bf3880e39f0494c8e0b5e29ef4bde9d822ca7f00aab67a3acaba2695526f110984b3404eb0b75a117161d7", 0xe6}, {&(0x7f0000002980)="44a6db3fd6912d5a628767876cb8dec82033cbf4daf02a170ae82ca94e632259e9b2b51f68f4852a7a17a31c6f091da0f4750b13ef72c0f4c5f3ea149ab0888938e81bc031192577fde0ccc7967e090b39e7d6c6b65a2b8abc4e1dd8ddc87639475afc17db16", 0x66}, {&(0x7f0000002a00)="188acda3fe9062ccea158be75187099be9af8c7a20f4e7f2abc7adb2e58ada9b8f6d5f6f450fa4db3e5d9d2c38a36645f4a7c1187c44a9a508aa0ce1400ebb0e536fb6369b2c3e62c8f1e556749ffa0e07b34a5a29cc256948492366eb113d48a7619370f0358cf57c640e3a56680eccd3532e940f4308ee27743fb34bef0c166c5ddc117297262ffff0c689223c49e6b390a947ee10f3c2adf4b17881b8e1908d56e66a6bad9770cd20b7e110fcf51b4a764ed65809da37921e1ac4ed040ad0850162ab4fc032ee2a36f094081d2d10a8cd6040d795d20fed78c150a51539b9be69163b32f86fe6a7f373", 0xeb}, {&(0x7f0000002b00)="6ed78fcfc15b1ef4ba667d9daf85b8069a1df006dc5039f0f6592e13d51ec12088d987b0c06e23914958ecb5fbb1509a70504211e8b5a51030c53355d5219f641405ec814937d25dc7a6ebcdacacf08780e034482f5fee74262fed0fc3bb26c8af1e71610d5420e13bf1854a6a9e8e677976b5ec8d87f5b885c7f9ad825d0214a4f5254a16f3f0b0db04cc0be99b3ed4", 0x90}, {&(0x7f0000002bc0)="47f64995ba04fd789230a5760b3563936adc71d9b4fd2814605082d52d65bc837d5ef93d43ad75869e9f7511dbac9b0f7eca72cbe82c946baf1cae27bb4f3f381dadb176d1531df7cb9efe64f199d3b03ae3019f0ca90a10f5b6f03fbe9868da62f4f69347a6db94a1b90f015c6f4a2b1f41dc07993c16c2e6c904818cf2f63e173b7939e715ed327277a0afd010834a9955407293d9a80e4d7cc9a4ec9ba07ca41fc98cc385be63ffa56d714460643a56ab993d2e4919e1f387ee471661f4d1b418c740dd96af7db28407d77b44cffd0c25f7d628bb802b04ead95983b3c7a93f040ce482ad25061031bb25980263264267ae7bddab308ea76068e7dcaf346384b95c03948b1a626a37223fa41a9b13bb5f738d3e5f0da8847471b4321a89d349a0789d1717c51af9b7c522d03c6c70ced888c663acf5bfaa058a864f2453fda2eebaa757dea9f97aea72163587239267b2bdf57fc07b91367fe9ed700806308d4c5698c63ca9fbd77ed82d88a44bf883a9e306860a54d045193ac7e3edfda01189ac899f090a367ac8da0076a83d6c8dee9482141ea70c4c3765a4baa09584ac45a400a48204dffee284e7d2fd436edce5f75f5ed3733725504a83abfe1ecd5192de91ad14f00c5446b97fb6edf1c3920f36bcfa43144c2d373c0d729934d6da5d5fe7cc82e9940123acfae25d3b7869ad279d2edb9adb01c2825696e944740ef70cbeaca2de8564c9ffcdfbe19cb5acbb8bb9cb3b77e70f1728aac0844fe3421b4ee7b36e4c1c6b3f9b3964508beae09dc059d8089c0f8498462c9c47f159fd55cd404b2aa6a34207079e2b45499e1496de6b835baab4e3162947bda1816a89b04877fa7d380dc2dcf5f522d39b700dfe250b95ef50094b5a5306924527c9577de727b4fc91f26fba2b15747ffc7b6b835494b63375b95328ef9550b5e05b1a3e6566d6311673aa4b9b573d8d51d068ade4b1aaaf92f995ef21427f3bd7a662d3783f063a6714f13551a6f2f5293d0e2d9977cdc3d6d7d659c74571ad2c09ff0b481dd1e87686c3cde70c1ef5e3ce2b1acff3c175903710cbc7989682d9df983339eb23ed3e99806f34c6b6fb239b1fa7343b08c583d20d5211162ff0b350cd74fc68507ab9296b16eea3ee90825c093af177a2349a510744991eed2cfacbefed824307fe0ead403fbdde2fff6d34c0abd0abec7bb94d04aaefe44e5fa8cd57709a73f69dbe15ec0555ce6159b53dcafc3e87d60725bd823491270faba7e510859c3c225a0949c0117c2442ffb5f5a1df434ad4a9bb3bf8f9417a3ac77c9f6a262bac73602cefa4c63e251c7348480dd734e52751c34df293380c5f43bede1cbf46abed53aa6a786e1caae6ca335b4f46d9ff495b0aad2d2bfd3594f0963ac7bab73880d7fa51a0b0593eedae1ab9f7948e5d3c79f4c2bd2871a1acb47a8f13d01a7475c5558f1995b29a95daf0b6c5909397be972464eacaf2dfc5d4c8752dfd38e24ff9d2d818c6d1c70420b446600430f6ac64c6e661a823613d23665cb96921bdf98cc89c75b33e7b7c28a46478178bb01ea1da106fc39554c874737b2bcc6a7c4dca011d170477eac6ea155489e32965af6d85cd2d15af1653b13cf85819e3f2f6232491fc1d6df5789b968783d0de7545bf6a8de1063e186b3459b24a6f208e747b4dfd43ff986cc0836590354991ae081e150f06cd0dfcc79eddd1f9564f2f625f5f8629e8895ae0fab4cbdd41cadb9a3d5cf6c4cc74afef0e938bd8366d8efcda4d7a67594171b4906c02be1c4f6e6bf6914d798f45a9f4ce0934f85cfb658e53ec9f0d597faf2efd84e23df881c42308bfea7f3ad731d56d8053893dcf9ad226ab16993b71e5d5ee12d7a2c67506a526d0a831e00b43753029b451a82201df22eb8ab348b5415620f19276885de3338ac3d8673d4cd5fd56083d98b202af9d5d3b5a7fa48a4b50ec10932360077242d19c0e70281aa6db793be2c8854c79df6897f0e31bb99ea6d50d46324a91862690742bd5963c5b21736685750613e674546dabcd9fe56d17d868195e1b1a0c092ec951a832e3e6cb6851bd00d0bd884bc63301155b9b6f557cdca8cd37dd2536881de1babb10980687e0c4517a7eed36a4871d0740f0b7afa404346a1c804237b7164674a8d37b393030d629e9c8c2ce98e53513b8b5621d3c16170c2c4122b751a0de334666dff3ecdca1a183a46e18ce7237599ce4befc09c9cf99633d19f5ddd3d941967005d56c29d99259fff5dea07770588a1ff9f28fe92148e0055f7ad4e5a8b225e962f5d1b0056291fcd2a9881add6d19d7e2afee0dcdcd2b4ac146c2c1252571834f2018613d915c42576b15aab5d442ef1fc78fbf9be7f87cf8dea54ef899067df6c10d32c6af54088b13ee2ceadf1412b883c6d7df9c00b632874e65dd6e62f4ade18b5494e6c89868d60b4be0561f1da9d1e0bddaa02a356cf6d0936016c472ee20927534c1b029d3495b1919ff28b188339c0f639530efc4aca031692445595beb08574ea48aaaf5bd85b55a450c1593ff9ec16620bb97d1e0e3a8ec0321b57c00fb0d106d5b5ba48216d8cac7bca146daa7b8bae26c5f3fac75c53703ce4bd4cd9094a10607f139f443573b3283072496426fe8f6e2c86beb70eef1009d3413c7fcc3e17e434694b26673f30232d418607ab3edfde35620db68739917454bac4f2f41970b9dc51ce7f2d85a619657593e33f004040663e87e3cbddb95e085644ff14311440afa5c1bc92f02414f48d416b2a0a94e0c383b15d6c794272be9100f8c046f919eb0548fc3a8e481f8ae4499f21e78f4ee3adb3a7319bc0871c6f8230cc38660eca414d48ec1767ccf6219c42dd9a87f53374f64be86efb03c83d3fb99218469a91663191a4bfe090ab370345422b56abe96b42386d65e8c29f3e0fc505cc136dd43e39714e5bd489e900bf9dca3db474b81922d9ff89285d754a7cdba6c0934615996e33392cd78f485fb79d1c5febd864929f10b89cbe406ff4055c71898d1bea49603d1a502a9b6ff5150de13d00ec066fde65245a6396812c7043c1b5571a1526fef4ea0cc35fc0448b518fedafa49b7bbf9bbcc1af1d19c2cc5680d825d04fb4189f6ad1566b5d977f439128cf2496974300172e2272bb13ea5c7b7023a4bdfe1c32fb335aefe0d99fe1c5ad29bdb60f61751e8cd560447cf5dfb30afd53746a6f0e428eefef8908d88e3a7ab7edce583ba23865b7dfac52426f6f388fc87de4a3e91a86504c2f4079ad378be8520db9db27ef7ba61fdb895fb89e9087e03266dbf6f672d7ea9d3c4c1b92bfcec6b493ab32b75fc82ba8db19d6e11658c711ecaed47b9f7ba37608844dd1e013923260636149db712d14f7104d0206988687c07aea765cfd8f99afedf162d38546990857aacbda9235e32004d5dee812b6a65e813be1c0c62daafec6fbcf7fec2d0e1fee4b485a49a81d1d2d84aba04e2ec82abfe51f6fe9ef8f6336e34500364266fe7b177e7aeb39bc8a173b81a91d038de1cdaa3f47415fc4311b959b4b5e6916bbb4a36c9cb7bfaab5dc83fb3666f61f847e9f0ab4964ad5e85024eff35b53820c4e2adbfbecf835ddf7eccf4ebb57938014cea26c8aac6cedcd6c69f429535c2f4210525cf91eed304939e420a5d36756b605a6278b2104251871a01def7b9de60e0d92b6f9e44a2f7d0843f8be991801ec875a2f2cbe5d351de771690b8c3c18389743769333d0a5b22666288ab4f873f218213a6c1c64284c626868a271f1ca08e8505f1f9ccda964e3bd86316974c279a5f6a0548b4692bddf03936ccacfc92870b50a2e3b7827da6dbc52b601b67c4317681fe99207d4aa39d48788b2c1674b7871cda059d394bfa87cd22c209bc72b957799164b3ed1880878829513635c46e204a2edd27c4474ed5ae265738005a09eb02ffc87f426176c71aaeaf271cf103b50a9d1b01d923ed10d05d39b17aa9ba90c32673a9fb51199158e7351eed6902becd4df35b0574a38ec9da8e75168524d53ad4ce9f87d120ee70dee5bd2c8cbc4928b87df9dfa04db7c9d7153d5fce4509c729672ed22ada7830be67cf143a424fd020ec9109fa47d2ff1317960eff1431da3b2c2845a42f9b24e7a887ed39be183c75a4795b3e0daf2f058e4e8ddb10f5b3839bcd909b507a38c5ce5fd100530f5becc0d565079aef56c5a7ea77ead940030bd94340c65ac4dcff4e86229dd9ce2d94cfe892811bc306d1e00833c51b1c57f5d4a09c196127c0218b528e371f77019cf096b43a766f08b493b61e48838b2dad098c14330445d370f73837e40f8f909d8099511aab30ccfc9b32d21a42f9b4a995113448583e133583a8992c21a23e77c13c4b6f093322291f143bc80df733e24a376dbecd5844af6cfa3060bceda1b5ce79fc5011d454e03fdd05167c68938c65db7fe2ee4cec7f0f3601427c04c896adc50e51f6cf64e537a0d0612468177ae6bb6ee0c0e7159548da8b2f043a016b2aff2cd94372a5811d1ef24e942091ee85e7cbe3580f8d26be6caf6eb43b6451c73dc46120900522564f7e9976f50127d29327447fb0800f89686d005e10aa3749e49f622dbc4d884ed6c54420ec75ee5a116d58a8a24e2df1fda8c24b210d50c1ae37eb553a8bd6b9d87a2996897c49505ac2912ab0a6d4619049a654d32d10658b0aba0eca70338c5efc695b908d29befde3f5b8f3a95828b1a689a25fd4b946cf5d2fd02660d53f401b52839a33a22aae55cbf7925d745f54d8a9e85726110a0e7fbb937b7e9be86d553a4cbfec693510da73172c8203075ccf08cb8705ae8e3fff6df3bfaa253189dfbcd2402b3c3fa91627e24fb69a04250ad320f1b60bd6ec2f116f89c1a30a5e60af053f0ecf0ab2d14dc7b3508b3f4aaaaf97bdd90ee86587189a22e6a3631e3bf4777c65cc7f9a679fda504e6df16b89c1e84615eeb9dc8d6f177fc397a597688232384cd65f8e89cffd52a4f50f3c10835c5d611968b6507a08d7a7dc7c7ed9b8b7fea4a91d524a87658dff5a368ad9cd38f2763d1fb6625c8181754dbfd87a22e657df0754a552647febc9bfb9affcd63789245d12507ffeb8bec48a605c77c2a6fa55a85ae3e8bf569047ec28ce773aca85372339dfe8cc3bff46f02b7e9d5b3515052f9e1e41830167ec76d41f5264cadc5d6d02872b85a4e3281e35da76120180309bc0c28858ac06f42dcecbb5015e11b7ec788a18205b0578d5ae3fed17cb54d4004243abfc69b3392d9d3bbf1c9ca6f4dc480702e3211b939069446127182a4a3fea6848756587a2f6d96560b8f93f1313928deb5e6e3e35860ec2ccae2900c1fca927bc4e562c140c7131c76cbc33a476d68c67cc41a2d3c214028aa5a4ed4ce7003399a88a95fe65492bec8ef41c4f6ce6e1b46a176ab055a9b52450c23a1948d046fae10d0190feb62dd9d933908e28ecf4078020cc7318967ff31cc2ad787f6f7fa827a106ecb687081ec2e3b44a175791ce3df9e26700c5a2f70dc347ce887dfb71137ce1d4a8807424f22f63266abba8d9504d729a79d4d188adf458051b6be67ce3784d3b51cfdc641972d63a776b1df1587e0cdc336de91d399b91b3e29ace560fb3b879d82a87e9d66ff165df0fc1ff3f78e84f219bf2760bdc88102aed227a1a0fa41f9aec384c2dae1dd9d87fead53b340fadd37fb92133f8247b53bca8b5cead25d83aab1895eca0e00b97e8d9382cd818d01f6ad2e0ccacca02ae29a7d92f80912e130dbeb122627efc344d884b34cb713962", 0x1000}, {&(0x7f0000003bc0)="630a5ae9ce064d818ebb66d7a2c132760d97d728d3255eb51160d09936961e", 0x1f}], 0x7, 0x0, 0x0, 0x40040}, {&(0x7f0000003c80)={0x27, 0x0, 0x0, 0x6, 0x400, 0x2, "33cbf83c9e8b9f6f2f003984ed3edf58f294f22f9480fa960b490f6b7b0f0e0d593c17325429d0a7c03719b5176beae535a13dd79cae479f0a13c87f945a53", 0x14}, 0x60, &(0x7f0000003dc0)=[{&(0x7f0000003d00)="ecc1839a920ffaa8a457c7e31eec742104fe514500a6655e2340ed5741e739f613b118a71efd37c25575624b4eaddfb9999a08428142293d7b9e35ba8044b010f4ded5c910d426fa8779992f614174e14edb94d6a2e011466d5b2aee7c73a1a64ab52b8afb4a132297576ee6c94dacbee79c95fdb1bc6d6713c7e43d19a31e6e7b5cf2acefcdf0ece5648de1a00e58d3d2fae2ad0c3e74dd0b675d8b6b3eb6f63d7a1f4205a8a687d685df4ca73ec50cc713cf6884", 0xb5}], 0x1, &(0x7f0000003e00)={0x108, 0x103, 0x5, "434a1e0b309e7b4ee553b0ef316a1a82553439c065f324f0e6c15ad4c99cd8375770178e2d26b030c8d31ced6a6daf9925971412863c8ef35fa4cc0982be5edfd6252990d72a51c6bfa7f9f2e72f8d5b32e832961773e3a229197cb9128113dfddacd8a1927341df33f5c99a4b99ed5461f92efc206b39899231d97cbe24e75624b78c61c08e1e5daa64bc6f5611f792abc234e47dc84eff250e626f9f53a654f00fdad34e8b2f32e160d135ca0583cb946c30459a9f69ae0ed0a49b95e726843dd172d132c06941e6cde917363d1f712a2411c05914a62a98fdfa7a81801af0bcac330e85240e9447dd472a373641651fe5544e"}, 0x108, 0x4}, {&(0x7f0000003f40)={0x27, 0x1, 0x2, 0x3, 0x1, 0x5, "c697751d1018c9be860992eda7b3e94a20368c5a87057166e64903c7efcc341c60f3e933846fd76c668e348fcfe491c512cf1ff627c066a3ca0a1bc749773e", 0x2e}, 0x60, &(0x7f00000040c0)=[{&(0x7f0000003fc0)="b37b991241252a09a3772323af880322ec8feeebb931deaaa59608039c89d265", 0x20}, {&(0x7f0000004000)="4bdf639e5d43d637d9d0e39086a47cb17894d54a8688235f8f88a42e29c7e4542e5dc7f37771f357edf1805c1475ab524154db7ab4ea5373ceb7121d04fb967dac144e43d161be23711bf34874a1bf1f4514f4135cfde5df1c88695be64e144fffee2294800f2da4312d5bbcf66168cc5082d5ee966a7cef72cbc39dd8dd8b1b4b704f98d5b96d11027c004f5be42297ee4d10c0a05c932816efcc28187e573ced3dbb7ab7845b819df969ccdfdd65e78961f689951397c1e491dda49c3f41", 0xbf}], 0x2, &(0x7f0000004100)={0xd0, 0x116, 0x8, "7fab2c9afca39f4c150c107d4c8a48b01c96dbfe5f1167836ffad71e4c42024d48920da308afd2d3a6184ffa8a397df87924dc5944ff0579e7588eda6e6a24f006f781fe749cd35e66a02c51a37a04e353a1ef657aa2da096b009c4c48cb58826fd3bb84f9cd87c5743bd71a9a0cd3a704026ff352582be3e74ebc931d483d6903ac0b585c90aca934ba7d5bf3f0fcedda1830cbc677aba6d58332b9a8499c8bde7b5379fad784e46bebe280343b06a1cdae624a5278a624d1611ec9"}, 0xd0, 0x8004}], 0xa, 0x4000000) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000004500)={0xbf, @remote, 0x4e21, 0x2, 'lblc\x00', 0xe, 0x5, 0x7}, 0x2c) 14:37:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:55 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x20000) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000a0cebd70008da7543702bb4115fddbdf25"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:56 executing program 4 (fault-call:3 fault-nth:13): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:56 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x400, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000100)=0x54) [ 473.590102][T29558] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 473.598607][T29558] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 473.606587][T29558] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 473.614566][T29558] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 473.622571][T29558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 473.630541][T29558] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 473.725004][T29569] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 473.754478][T29689] FAULT_INJECTION: forcing a failure. [ 473.754478][T29689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 473.762055][T29569] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 473.809647][T29689] CPU: 1 PID: 29689 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 473.817670][T29689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.819807][T29569] FAT-fs (loop2): Filesystem has been set read-only [ 473.827727][T29689] Call Trace: [ 473.827756][T29689] dump_stack+0x172/0x1f0 [ 473.827784][T29689] should_fail.cold+0xa/0x15 [ 473.827808][T29689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.827828][T29689] ? ___might_sleep+0x163/0x280 [ 473.827854][T29689] should_fail_alloc_page+0x50/0x60 [ 473.827878][T29689] __alloc_pages_nodemask+0x1a1/0x8d0 [ 473.867801][T29689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.873292][T29689] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 473.879010][T29689] ? retint_kernel+0x2d/0x2d [ 473.883623][T29689] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 473.889864][T29689] alloc_pages_current+0x107/0x210 [ 473.894985][T29689] __get_free_pages+0xc/0x40 [ 473.899572][T29689] pgd_alloc+0x8b/0x3f0 [ 473.903730][T29689] ? pgd_page_get_mm+0x40/0x40 [ 473.908494][T29689] ? lockdep_init_map+0x1be/0x6d0 [ 473.913520][T29689] ? lockdep_init_map+0x1be/0x6d0 [ 473.918552][T29689] mm_init+0x590/0x9b0 [ 473.922624][T29689] mm_alloc+0xa6/0xd0 [ 473.926609][T29689] __do_execve_file.isra.0+0xaa3/0x23f0 [ 473.932153][T29689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.938400][T29689] ? copy_strings_kernel+0x110/0x110 [ 473.943684][T29689] ? strncpy_from_user+0x2a8/0x380 [ 473.948798][T29689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.955047][T29689] __x64_sys_execveat+0xed/0x130 [ 473.959988][T29689] do_syscall_64+0x103/0x610 [ 473.964585][T29689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.970479][T29689] RIP: 0033:0x458da9 [ 473.974376][T29689] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.993991][T29689] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 474.002399][T29689] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 474.010370][T29689] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 474.018343][T29689] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 474.026309][T29689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 474.034280][T29689] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:56 executing program 0 (fault-call:4 fault-nth:13): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:56 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8500, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001100)={r2, 0x7f}, &(0x7f0000001140)=0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x4, 0x2, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) 14:37:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:56 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) 14:37:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:56 executing program 4 (fault-call:3 fault-nth:14): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:56 executing program 5: syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x400, 0x6, 0x8, 0x6, 0x1, 0x6, 0x0, 0x7, 0x0}, &(0x7f0000000040)=0x20) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff3, 0x4000) write$P9_RFSYNC(r2, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r1, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @loopback}}, 0x8001, 0x101}, &(0x7f0000000200)=0x90) 14:37:56 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8, 0x5}, {0x5, 0x141}]}, 0x14, 0x1) openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/udmabuf\x00', 0x2) [ 474.256661][T29706] FAULT_INJECTION: forcing a failure. [ 474.256661][T29706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.270655][T29707] FAULT_INJECTION: forcing a failure. [ 474.270655][T29707] name failslab, interval 1, probability 0, space 0, times 0 [ 474.307326][T29706] CPU: 1 PID: 29706 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 474.315366][T29706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.325424][T29706] Call Trace: [ 474.328733][T29706] dump_stack+0x172/0x1f0 [ 474.333077][T29706] should_fail.cold+0xa/0x15 [ 474.337685][T29706] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.343496][T29706] ? ___might_sleep+0x163/0x280 [ 474.348376][T29706] should_fail_alloc_page+0x50/0x60 [ 474.353586][T29706] __alloc_pages_nodemask+0x1a1/0x8d0 [ 474.358964][T29706] ? debug_smp_processor_id+0x3c/0x280 [ 474.364436][T29706] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 474.370201][T29706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 474.375667][T29706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 474.381135][T29706] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 474.387391][T29706] alloc_pages_current+0x107/0x210 [ 474.393487][T29706] __get_free_pages+0xc/0x40 [ 474.398086][T29706] pgd_alloc+0x8b/0x3f0 [ 474.402249][T29706] ? pgd_page_get_mm+0x40/0x40 [ 474.407020][T29706] ? lockdep_init_map+0x1be/0x6d0 [ 474.412056][T29706] ? lockdep_init_map+0x1be/0x6d0 [ 474.417094][T29706] mm_init+0x590/0x9b0 [ 474.421169][T29706] mm_alloc+0xa6/0xd0 [ 474.425160][T29706] __do_execve_file.isra.0+0xaa3/0x23f0 [ 474.430725][T29706] ? copy_strings_kernel+0x110/0x110 [ 474.436017][T29706] ? getname_flags+0x3c9/0x5b0 [ 474.440786][T29706] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 474.446349][T29706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.452610][T29706] __x64_sys_execveat+0xed/0x130 [ 474.457566][T29706] do_syscall_64+0x103/0x610 [ 474.462169][T29706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.468065][T29706] RIP: 0033:0x458da9 [ 474.471967][T29706] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.491572][T29706] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 474.499990][T29706] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 474.507964][T29706] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 474.515939][T29706] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 474.523941][T29706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 474.531917][T29706] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 474.539927][T29707] CPU: 0 PID: 29707 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 474.547919][T29707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.557976][T29707] Call Trace: [ 474.561282][T29707] dump_stack+0x172/0x1f0 [ 474.565630][T29707] should_fail.cold+0xa/0x15 [ 474.570232][T29707] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.576053][T29707] ? ___might_sleep+0x163/0x280 [ 474.580926][T29707] __should_failslab+0x121/0x190 [ 474.585877][T29707] should_failslab+0x9/0x14 [ 474.590401][T29707] kmem_cache_alloc+0x2b2/0x6f0 [ 474.595272][T29707] vm_area_alloc+0x20/0x110 [ 474.599781][T29707] __do_execve_file.isra.0+0xc34/0x23f0 14:37:57 executing program 0 (fault-call:4 fault-nth:14): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:57 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 474.605356][T29707] ? copy_strings_kernel+0x110/0x110 [ 474.610656][T29707] ? strncpy_from_user+0x2a8/0x380 [ 474.610679][T29707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.610701][T29707] __x64_sys_execveat+0xed/0x130 [ 474.610725][T29707] do_syscall_64+0x103/0x610 [ 474.622067][T29707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.622081][T29707] RIP: 0033:0x458da9 14:37:57 executing program 4 (fault-call:3 fault-nth:15): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 474.622097][T29707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.622107][T29707] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 474.622121][T29707] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 474.622130][T29707] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 474.622139][T29707] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 474.622148][T29707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 474.622157][T29707] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:57 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x40c0, 0x80) bind$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x24) 14:37:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 474.748092][T29715] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 474.786697][T29715] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:37:57 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x8}, 0x8) [ 474.804156][T29722] FAULT_INJECTION: forcing a failure. [ 474.804156][T29722] name failslab, interval 1, probability 0, space 0, times 0 [ 474.818398][T29715] FAT-fs (loop2): Filesystem has been set read-only [ 474.829462][T29723] FAULT_INJECTION: forcing a failure. [ 474.829462][T29723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.862097][T29723] CPU: 1 PID: 29723 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 474.870106][T29723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.880161][T29723] Call Trace: [ 474.883468][T29723] dump_stack+0x172/0x1f0 [ 474.887813][T29723] should_fail.cold+0xa/0x15 [ 474.892427][T29723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.898245][T29723] ? ___might_sleep+0x163/0x280 [ 474.903113][T29723] should_fail_alloc_page+0x50/0x60 [ 474.908319][T29723] __alloc_pages_nodemask+0x1a1/0x8d0 [ 474.913709][T29723] ? __mark_inode_dirty+0x23c/0x1290 [ 474.919008][T29723] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 474.925003][T29723] ? touch_atime+0x1b3/0x2a0 [ 474.929602][T29723] ? find_held_lock+0x35/0x130 [ 474.934384][T29723] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 474.940639][T29723] alloc_pages_current+0x107/0x210 [ 474.945763][T29723] get_zeroed_page+0x14/0x50 [ 474.950368][T29723] __pud_alloc+0x3b/0x250 [ 474.954717][T29723] __handle_mm_fault+0x7a5/0x3ec0 [ 474.959762][T29723] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 474.965315][T29723] ? find_held_lock+0x35/0x130 [ 474.970101][T29723] ? handle_mm_fault+0x322/0xb30 [ 474.975062][T29723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.981319][T29723] ? kasan_check_read+0x11/0x20 [ 474.986193][T29723] handle_mm_fault+0x43f/0xb30 [ 474.990971][T29723] __get_user_pages+0x7b6/0x1a40 [ 474.995936][T29723] ? follow_page_mask+0x19a0/0x19a0 [ 475.001144][T29723] ? retint_kernel+0x2d/0x2d [ 475.005756][T29723] get_user_pages_remote+0x21d/0x440 [ 475.011059][T29723] copy_strings.isra.0+0x3dc/0x890 [ 475.016189][T29723] ? remove_arg_zero+0x590/0x590 [ 475.021132][T29723] ? prepare_binprm+0x6aa/0x940 [ 475.025990][T29723] ? lock_downgrade+0x880/0x880 [ 475.030846][T29723] ? vma_link+0x117/0x180 [ 475.035187][T29723] ? install_exec_creds+0x180/0x180 [ 475.040398][T29723] copy_strings_kernel+0xa5/0x110 [ 475.045435][T29723] __do_execve_file.isra.0+0x10ef/0x23f0 [ 475.051090][T29723] ? copy_strings_kernel+0x110/0x110 [ 475.056397][T29723] __x64_sys_execveat+0xed/0x130 [ 475.061359][T29723] do_syscall_64+0x103/0x610 [ 475.066050][T29723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.071951][T29723] RIP: 0033:0x458da9 [ 475.075856][T29723] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.095468][T29723] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 475.103889][T29723] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 475.111869][T29723] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 475.119854][T29723] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 475.127836][T29723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 475.135809][T29723] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 475.143827][T29722] CPU: 0 PID: 29722 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 475.151818][T29722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.161895][T29722] Call Trace: [ 475.165209][T29722] dump_stack+0x172/0x1f0 [ 475.169547][T29722] should_fail.cold+0xa/0x15 [ 475.174142][T29722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.180045][T29722] ? ___might_sleep+0x163/0x280 [ 475.184988][T29722] __should_failslab+0x121/0x190 [ 475.189933][T29722] should_failslab+0x9/0x14 [ 475.194454][T29722] kmem_cache_alloc+0x2b2/0x6f0 [ 475.199326][T29722] vm_area_alloc+0x20/0x110 [ 475.203860][T29722] __do_execve_file.isra.0+0xc34/0x23f0 [ 475.209425][T29722] ? copy_strings_kernel+0x110/0x110 [ 475.214714][T29722] ? strncpy_from_user+0x2a8/0x380 [ 475.219841][T29722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.226097][T29722] __x64_sys_execveat+0xed/0x130 [ 475.231054][T29722] do_syscall_64+0x103/0x610 [ 475.235660][T29722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.241551][T29722] RIP: 0033:0x458da9 [ 475.245453][T29722] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.272404][T29722] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 475.280819][T29722] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 475.288789][T29722] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 475.296762][T29722] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 475.304731][T29722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 475.312713][T29722] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 475.377337][T29715] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 475.401603][T29715] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 475.412092][T29715] FAT-fs (loop2): Filesystem has been set read-only 14:37:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x10', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:57 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') accept4$tipc(r1, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x80800) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000008c}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xc0, r3, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x67}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfd84}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x96f}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4001}, 0x1) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:57 executing program 4 (fault-call:3 fault-nth:16): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:57 executing program 0 (fault-call:4 fault-nth:15): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:57 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000040)={0x8, "00ea21f41bff9333e9a8770f4a0a5b0fd4aaca21b831d913faa569db9c2c3317", 0x2, 0x3ff, 0x4, 0x100000, 0x200, 0x2}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:57 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 475.532278][T29934] FAULT_INJECTION: forcing a failure. [ 475.532278][T29934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 475.612851][T29934] CPU: 0 PID: 29934 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 475.620874][T29934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.630925][T29934] Call Trace: [ 475.634218][T29934] dump_stack+0x172/0x1f0 [ 475.638566][T29934] should_fail.cold+0xa/0x15 [ 475.643165][T29934] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.648986][T29934] ? ___might_sleep+0x163/0x280 [ 475.653861][T29934] should_fail_alloc_page+0x50/0x60 [ 475.659068][T29934] __alloc_pages_nodemask+0x1a1/0x8d0 [ 475.664457][T29934] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 475.670196][T29934] ? retint_kernel+0x2d/0x2d [ 475.674801][T29934] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 475.681049][T29934] alloc_pages_current+0x107/0x210 [ 475.686170][T29934] get_zeroed_page+0x14/0x50 [ 475.688545][T29947] FAULT_INJECTION: forcing a failure. [ 475.688545][T29947] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 475.690762][T29934] __pud_alloc+0x3b/0x250 [ 475.690784][T29934] __handle_mm_fault+0x7a5/0x3ec0 [ 475.690808][T29934] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 475.718859][T29934] ? find_held_lock+0x35/0x130 [ 475.723634][T29934] ? handle_mm_fault+0x322/0xb30 [ 475.728588][T29934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.734844][T29934] ? kasan_check_read+0x11/0x20 [ 475.739705][T29934] handle_mm_fault+0x43f/0xb30 [ 475.744483][T29934] __get_user_pages+0x7b6/0x1a40 [ 475.749459][T29934] ? follow_page_mask+0x19a0/0x19a0 [ 475.754670][T29934] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.760150][T29934] get_user_pages_remote+0x21d/0x440 [ 475.765454][T29934] copy_strings.isra.0+0x3dc/0x890 [ 475.770589][T29934] ? remove_arg_zero+0x590/0x590 [ 475.775532][T29934] ? prepare_binprm+0x6aa/0x940 [ 475.780392][T29934] ? lock_downgrade+0x880/0x880 [ 475.785243][T29934] ? vma_link+0x117/0x180 [ 475.789578][T29934] ? install_exec_creds+0x180/0x180 [ 475.794789][T29934] copy_strings_kernel+0xa5/0x110 [ 475.799829][T29934] __do_execve_file.isra.0+0x10ef/0x23f0 [ 475.805479][T29934] ? copy_strings_kernel+0x110/0x110 [ 475.811036][T29934] ? strncpy_from_user+0x2a8/0x380 [ 475.816245][T29934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.822495][T29934] __x64_sys_execveat+0xed/0x130 [ 475.827445][T29934] do_syscall_64+0x103/0x610 [ 475.832047][T29934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.837938][T29934] RIP: 0033:0x458da9 [ 475.841837][T29934] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:37:58 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 475.861467][T29934] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 475.869884][T29934] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 475.877856][T29934] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 475.885835][T29934] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 475.893841][T29934] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 475.901815][T29934] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 475.909957][T29947] CPU: 1 PID: 29947 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 475.917956][T29947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.928017][T29947] Call Trace: [ 475.931322][T29947] dump_stack+0x172/0x1f0 [ 475.935674][T29947] should_fail.cold+0xa/0x15 [ 475.940277][T29947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.946095][T29947] ? ___might_sleep+0x163/0x280 [ 475.950965][T29947] should_fail_alloc_page+0x50/0x60 [ 475.956172][T29947] __alloc_pages_nodemask+0x1a1/0x8d0 [ 475.961552][T29947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.967022][T29947] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 475.972743][T29947] ? __pud_alloc+0x1d3/0x250 [ 475.977367][T29947] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 475.983619][T29947] alloc_pages_current+0x107/0x210 [ 475.988743][T29947] __pmd_alloc+0x41/0x460 [ 475.993076][T29947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 475.999329][T29947] __handle_mm_fault+0x192a/0x3ec0 [ 476.004462][T29947] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 476.010014][T29947] ? find_held_lock+0x35/0x130 [ 476.014784][T29947] ? handle_mm_fault+0x322/0xb30 [ 476.019831][T29947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.026083][T29947] ? kasan_check_read+0x11/0x20 [ 476.030947][T29947] handle_mm_fault+0x43f/0xb30 [ 476.035722][T29947] __get_user_pages+0x7b6/0x1a40 [ 476.040668][T29947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.046141][T29947] ? follow_page_mask+0x19a0/0x19a0 [ 476.051359][T29947] ? retint_kernel+0x2d/0x2d [ 476.055971][T29947] get_user_pages_remote+0x21d/0x440 [ 476.061273][T29947] copy_strings.isra.0+0x3dc/0x890 [ 476.066399][T29947] ? remove_arg_zero+0x590/0x590 [ 476.071352][T29947] ? prepare_binprm+0x6aa/0x940 [ 476.076206][T29947] ? lock_downgrade+0x880/0x880 [ 476.081060][T29947] ? vma_link+0x117/0x180 [ 476.085400][T29947] ? install_exec_creds+0x180/0x180 [ 476.090608][T29947] copy_strings_kernel+0xa5/0x110 [ 476.095643][T29947] __do_execve_file.isra.0+0x10ef/0x23f0 [ 476.101293][T29947] ? copy_strings_kernel+0x110/0x110 [ 476.106583][T29947] ? strncpy_from_user+0x2a8/0x380 [ 476.111702][T29947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.117956][T29947] __x64_sys_execveat+0xed/0x130 [ 476.122910][T29947] do_syscall_64+0x103/0x610 [ 476.127517][T29947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.133409][T29947] RIP: 0033:0x458da9 [ 476.137310][T29947] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.156925][T29947] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:37:58 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='vxcan1\x00') ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 476.165351][T29947] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 476.173325][T29947] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 476.181310][T29947] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 476.189294][T29947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 476.197267][T29947] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 14:37:58 executing program 4 (fault-call:3 fault-nth:17): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:58 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x60000, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x6) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000040)=""/173) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000140)={0x3, 0x70, 0x100, 0x6, 0x281, 0x1, 0x0, 0xae1, 0x2, 0x4, 0x6, 0x3, 0x1, 0x5, 0x3, 0x8001, 0x1000, 0x7, 0x9, 0x0, 0x401, 0x5, 0x0, 0x5, 0xff, 0x4, 0x8, 0x9, 0x7fff, 0x80000000, 0x7, 0x28f, 0x2000000003, 0x1000003, 0x4, 0x74, 0x1, 0xfffffffffffffffc, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x2, 0x80, 0x7, 0x81, 0x5, 0x101}) 14:37:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat&', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:58 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:58 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80800, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="8b90dbbf8fedb11482a46f1d2bf7be7d431f18ac7ee7ce5cec8da080c1e90e9ce8e7f02d06b4042c919b28c9c71ea0ce88f66cd387fbd7ac6a9e6b72db89b42869759b8b007b6aec8ef6d18d8e82b7f27563c18807125ab41426d630ad8de0e47d1f6b6cb51a5c771ba76c113115b5afde1bfee69f5c0a20ac23a94a96070307d0fe6e1f2e0d647dcb3647b85663b86b6b78b1d3f1afbab40d5022e34a7c8a29f823f7331e5ba7c3cc858a861100765a86fae70151f1084a8b62c3954097c70045a78dcad8ecd1ed4a0248cd3a9fc41dcdf8260d340b729d2732a928ac074862d6341b100bc2ce28c081d402a46ba88b959d3b52b163ff76", 0xf8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r2, 0x81, 0x1}, &(0x7f0000000280)={'enc=', 'pkcs1', ' hash=', {'sha256-generic\x00'}}, &(0x7f0000000300)="25b298d58939b6946b5ee920892eafd6d52e2c246a91b961d8641c97b6c348b9a93f33827910aafb5a32089ac6bd9501cb3026a0f09da8fd47d29a806967c8050cec4aa0b6687b4898fe1815f724a41ffa4737d0de44b583e496a726df80119c3d52c606c030a94b399715f0657c22723d19c8c1d42449e3925cb4b891703f2d21aaee6f478214558ca80a837cdefe56676e748843c67c221cd9d838d823c39d035871fa413430ef3ecafce6903c0fd537fb37627c20277180dead4aebcb55c93b3470396dc204594d615898a86c27bd76986c17b12df91f1d5ea60d6e425a9932", &(0x7f0000000400)=""/245) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:37:58 executing program 0 (fault-call:4 fault-nth:16): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 476.425617][T29962] FAULT_INJECTION: forcing a failure. [ 476.425617][T29962] name failslab, interval 1, probability 0, space 0, times 0 [ 476.502403][T29962] CPU: 0 PID: 29962 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #96 [ 476.510433][T29962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.520503][T29962] Call Trace: [ 476.523819][T29962] dump_stack+0x172/0x1f0 [ 476.528177][T29962] should_fail.cold+0xa/0x15 [ 476.532791][T29962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.538615][T29962] ? ___might_sleep+0x163/0x280 [ 476.543486][T29962] __should_failslab+0x121/0x190 [ 476.548436][T29962] should_failslab+0x9/0x14 [ 476.552951][T29962] kmem_cache_alloc+0x2b2/0x6f0 [ 476.557811][T29962] ? alloc_pages_current+0x10f/0x210 [ 476.563116][T29962] __pmd_alloc+0xc9/0x460 [ 476.567451][T29962] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 476.570502][T30076] FAULT_INJECTION: forcing a failure. [ 476.570502][T30076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.573701][T29962] __handle_mm_fault+0x192a/0x3ec0 [ 476.573726][T29962] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 476.573743][T29962] ? find_held_lock+0x35/0x130 [ 476.573761][T29962] ? handle_mm_fault+0x322/0xb30 [ 476.573788][T29962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.573807][T29962] ? kasan_check_read+0x11/0x20 [ 476.573829][T29962] handle_mm_fault+0x43f/0xb30 [ 476.573852][T29962] __get_user_pages+0x7b6/0x1a40 [ 476.573869][T29962] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.573904][T29962] ? follow_page_mask+0x19a0/0x19a0 [ 476.638754][T29962] ? retint_kernel+0x2d/0x2d [ 476.643457][T29962] get_user_pages_remote+0x21d/0x440 [ 476.648769][T29962] copy_strings.isra.0+0x3dc/0x890 [ 476.653903][T29962] ? remove_arg_zero+0x590/0x590 [ 476.658846][T29962] ? prepare_binprm+0x6aa/0x940 [ 476.663705][T29962] ? lock_downgrade+0x880/0x880 [ 476.668558][T29962] ? validate_mm+0x502/0x620 [ 476.673154][T29962] ? install_exec_creds+0x180/0x180 [ 476.678369][T29962] copy_strings_kernel+0xa5/0x110 [ 476.683424][T29962] __do_execve_file.isra.0+0x10ef/0x23f0 [ 476.689078][T29962] ? copy_strings_kernel+0x110/0x110 [ 476.694378][T29962] ? strncpy_from_user+0x2a8/0x380 [ 476.699507][T29962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.705764][T29962] __x64_sys_execveat+0xed/0x130 [ 476.710715][T29962] do_syscall_64+0x103/0x610 [ 476.715322][T29962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.721225][T29962] RIP: 0033:0x458da9 [ 476.725300][T29962] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.744923][T29962] RSP: 002b:00007fc35f58fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:37:58 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 476.753348][T29962] RAX: ffffffffffffffda RBX: 00007fc35f58fc90 RCX: 0000000000458da9 [ 476.761329][T29962] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 476.769314][T29962] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 476.777295][T29962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc35f5906d4 [ 476.785270][T29962] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000005 [ 476.793273][T30076] CPU: 1 PID: 30076 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 476.801266][T30076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.811322][T30076] Call Trace: [ 476.814629][T30076] dump_stack+0x172/0x1f0 [ 476.818966][T30076] should_fail.cold+0xa/0x15 [ 476.823564][T30076] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.829382][T30076] ? ___might_sleep+0x163/0x280 [ 476.834246][T30076] should_fail_alloc_page+0x50/0x60 [ 476.839447][T30076] __alloc_pages_nodemask+0x1a1/0x8d0 [ 476.844824][T30076] ? __pud_alloc+0x1d3/0x250 [ 476.849422][T30076] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 476.855140][T30076] ? __pud_alloc+0x1d3/0x250 [ 476.859741][T30076] ? lock_downgrade+0x880/0x880 [ 476.864594][T30076] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 476.870840][T30076] alloc_pages_current+0x107/0x210 [ 476.875966][T30076] __pmd_alloc+0x41/0x460 [ 476.880296][T30076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 476.886541][T30076] __handle_mm_fault+0x192a/0x3ec0 [ 476.891662][T30076] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 476.897210][T30076] ? find_held_lock+0x35/0x130 [ 476.901978][T30076] ? handle_mm_fault+0x322/0xb30 [ 476.906931][T30076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.913182][T30076] ? kasan_check_read+0x11/0x20 [ 476.918043][T30076] handle_mm_fault+0x43f/0xb30 [ 476.922819][T30076] __get_user_pages+0x7b6/0x1a40 [ 476.927774][T30076] ? follow_page_mask+0x19a0/0x19a0 [ 476.932991][T30076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.939248][T30076] get_user_pages_remote+0x21d/0x440 [ 476.944550][T30076] copy_strings.isra.0+0x3dc/0x890 [ 476.949765][T30076] ? remove_arg_zero+0x590/0x590 [ 476.954725][T30076] copy_strings_kernel+0xa5/0x110 [ 476.959758][T30076] __do_execve_file.isra.0+0x10ef/0x23f0 [ 476.965406][T30076] ? copy_strings_kernel+0x110/0x110 [ 476.970692][T30076] ? strncpy_from_user+0x2a8/0x380 [ 476.975809][T30076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.982059][T30076] __x64_sys_execveat+0xed/0x130 [ 476.987005][T30076] do_syscall_64+0x103/0x610 [ 476.991602][T30076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.997497][T30076] RIP: 0033:0x458da9 [ 477.001398][T30076] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.021008][T30076] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 477.029426][T30076] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 477.037396][T30076] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 477.045379][T30076] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:37:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:59 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) [ 477.053364][T30076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 477.061337][T30076] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:37:59 executing program 5: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) 14:37:59 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8040, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:37:59 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat&', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:37:59 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x111280, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x4, 0x3, 0x8a, &(0x7f0000ffe000/0x1000)=nil, 0x200000000}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:59 executing program 3: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00') r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) connect(r0, &(0x7f0000000080)=@llc={0x1a, 0x30f, 0x1, 0x7fff, 0xffffffff, 0x1}, 0x80) 14:37:59 executing program 0 (fault-call:4 fault-nth:17): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:37:59 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:37:59 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:37:59 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) 14:37:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 477.557337][T30172] FAULT_INJECTION: forcing a failure. [ 477.557337][T30172] name failslab, interval 1, probability 0, space 0, times 0 [ 477.601231][T30172] CPU: 0 PID: 30172 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 477.609354][T30172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.619421][T30172] Call Trace: [ 477.622736][T30172] dump_stack+0x172/0x1f0 [ 477.627093][T30172] should_fail.cold+0xa/0x15 [ 477.631700][T30172] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.637546][T30172] ? __should_failslab+0x59/0x190 [ 477.642580][T30172] __should_failslab+0x121/0x190 14:38:00 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80002, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x6, 0x0, [], &(0x7f0000000040)=0x9}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000000c0)={0xfffffffffffffe01, 0xfff, 0x4, 0x6, 0x7f, 0x6}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) accept4$bt_l2cap(r1, &(0x7f0000000240), &(0x7f0000000280)=0xe, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x6f, "a906f559f9c5a5073dfee544a03bb2269439c333f6006de23c08655dbfe80795a6402f3130fcb29bd83e5526e86c6b5993ee23fa5d859a6d8ca01d585e7ad76f9074a0aff5f1fe91422ef12fd4f536dee30b9a18576b160914fa5d384ad2460d073a8790037cb890d9677ad47e045c"}, &(0x7f0000000180)=0x77) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x8, 0x800}, &(0x7f0000000200)=0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 14:38:00 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) [ 477.647521][T30172] should_failslab+0x9/0x14 [ 477.652040][T30172] kmem_cache_alloc+0x2b2/0x6f0 [ 477.656906][T30172] ? alloc_pages_current+0x10f/0x210 [ 477.662200][T30172] __pmd_alloc+0xc9/0x460 [ 477.666541][T30172] __handle_mm_fault+0x192a/0x3ec0 [ 477.671660][T30172] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 477.677189][T30172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.682645][T30172] handle_mm_fault+0x43f/0xb30 [ 477.687397][T30172] __get_user_pages+0x7b6/0x1a40 [ 477.692325][T30172] ? follow_page_mask+0x19a0/0x19a0 [ 477.697514][T30172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.703751][T30172] ? fsnotify+0xbc0/0xbc0 [ 477.708066][T30172] get_user_pages_remote+0x21d/0x440 [ 477.713348][T30172] copy_strings.isra.0+0x3dc/0x890 [ 477.718448][T30172] ? remove_arg_zero+0x590/0x590 [ 477.723375][T30172] ? retint_kernel+0x2d/0x2d [ 477.727969][T30172] copy_strings_kernel+0xa5/0x110 [ 477.732982][T30172] __do_execve_file.isra.0+0x10ef/0x23f0 [ 477.738605][T30172] ? copy_strings_kernel+0x110/0x110 [ 477.743923][T30172] ? strncpy_from_user+0x2a8/0x380 [ 477.749035][T30172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.755263][T30172] __x64_sys_execveat+0xed/0x130 [ 477.760185][T30172] do_syscall_64+0x103/0x610 [ 477.764763][T30172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.770730][T30172] RIP: 0033:0x458da9 [ 477.774633][T30172] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:38:00 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) syz_extract_tcp_res(&(0x7f0000000000), 0x8f91, 0x0) 14:38:00 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 477.794222][T30172] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 477.802614][T30172] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 477.810570][T30172] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 477.818520][T30172] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 477.826484][T30172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 477.834452][T30172] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:38:00 executing program 0 (fault-call:4 fault-nth:18): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:00 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='trusted.syz\x00', &(0x7f0000000040), 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 477.987176][T30235] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:38:00 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8500, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001100)={r2, 0x7f}, &(0x7f0000001140)=0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x4, 0x2, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) 14:38:00 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) 14:38:00 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)='/cgroup-loem0security(.wlan1{[[eth1*\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="518731b5b30e623d1e34ca861f105592c93cbf91a81c7ca167b530ddb26dd42e7ca82213df6ae52bfeb84fce2977cdd13402787197bf5050b27cdafcbe5bc39326a3d4fc4bddf4b9ca7b61e12ead89fa4707a30c37c8c0251aaf4d6d8edeb8a7bf248f42c0808ff1cf6206b5348b56b3b11f2e13f531fd34f6f9146e54828d4b56457bae3525981948134d7534e19cb947c5fbe18ddda1c2b8790f7347faf3faee510f43f0f3b083efd5f2f011646f33ebd04e2072876ade342a4d871b48a877937a614e3ea70b98ed205932aad37dfc24a61a36a5", 0xd5, 0xfffffffffffffffb) [ 478.040634][T30238] FAULT_INJECTION: forcing a failure. [ 478.040634][T30238] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 478.079829][T30235] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 478.105338][T30238] CPU: 1 PID: 30238 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 478.113381][T30238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.123452][T30238] Call Trace: [ 478.126773][T30238] dump_stack+0x172/0x1f0 [ 478.131125][T30238] should_fail.cold+0xa/0x15 [ 478.135692][T30235] FAT-fs (loop2): Filesystem has been set read-only [ 478.135732][T30238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.148135][T30238] ? ___might_sleep+0x163/0x280 [ 478.153003][T30238] should_fail_alloc_page+0x50/0x60 [ 478.158215][T30238] __alloc_pages_nodemask+0x1a1/0x8d0 [ 478.163613][T30238] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 478.169365][T30238] ? get_task_policy.part.0+0x29/0xb0 [ 478.174755][T30238] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 478.180311][T30238] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 478.186581][T30238] alloc_pages_current+0x107/0x210 [ 478.191709][T30238] pte_alloc_one+0x1b/0x1a0 [ 478.196227][T30238] __pte_alloc+0x20/0x310 [ 478.200571][T30238] __handle_mm_fault+0x3391/0x3ec0 [ 478.205702][T30238] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 478.211261][T30238] ? find_held_lock+0x35/0x130 [ 478.216042][T30238] ? handle_mm_fault+0x322/0xb30 [ 478.220997][T30238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.227259][T30238] ? kasan_check_read+0x11/0x20 [ 478.232128][T30238] handle_mm_fault+0x43f/0xb30 [ 478.236933][T30238] __get_user_pages+0x7b6/0x1a40 [ 478.241897][T30238] ? follow_page_mask+0x19a0/0x19a0 [ 478.247109][T30238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:38:00 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = socket$pptp(0x18, 0x1, 0x2) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001040)={0x0, 0x0}, &(0x7f0000001080)=0xc) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$mouse(&(0x7f00000011c0)='/dev/input/mouse#\x00', 0x80, 0x40042) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000001380)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000001240)=0x14) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001180)={r2, r3, r4}, 0xc) [ 478.253377][T30238] ? fsnotify+0xbc0/0xbc0 [ 478.257724][T30238] get_user_pages_remote+0x21d/0x440 [ 478.263036][T30238] copy_strings.isra.0+0x3dc/0x890 [ 478.268169][T30238] ? remove_arg_zero+0x590/0x590 [ 478.273113][T30238] ? prepare_binprm+0x6aa/0x940 [ 478.277973][T30238] ? lock_downgrade+0x880/0x880 [ 478.282831][T30238] ? vma_link+0x117/0x180 [ 478.287177][T30238] ? install_exec_creds+0x180/0x180 [ 478.292393][T30238] copy_strings_kernel+0xa5/0x110 [ 478.297433][T30238] __do_execve_file.isra.0+0x10ef/0x23f0 [ 478.303084][T30238] ? copy_strings_kernel+0x110/0x110 [ 478.308385][T30238] ? strncpy_from_user+0x2a8/0x380 [ 478.313535][T30238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.319813][T30238] __x64_sys_execveat+0xed/0x130 [ 478.324773][T30238] do_syscall_64+0x103/0x610 [ 478.329385][T30238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.335718][T30238] RIP: 0033:0x458da9 [ 478.339627][T30238] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.359246][T30238] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 478.367668][T30238] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 478.375646][T30238] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 478.383625][T30238] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 478.393190][T30238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 14:38:00 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) [ 478.401164][T30238] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 478.470775][T30235] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 478.501180][T30235] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 478.521298][T30235] FAT-fs (loop2): Filesystem has been set read-only 14:38:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\xf4', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:00 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:00 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8500, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000001100)={r2, 0x7f}, &(0x7f0000001140)=0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x4, 0x2, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) 14:38:00 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) 14:38:00 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x2) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x800, 0x14, 0x40, 0xffffffff, "427612ce26e24b9e47718809151b69ab6968aa380fa72bdcc939a4526cbbd9a1"}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:00 executing program 0 (fault-call:4 fault-nth:19): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 478.678207][T30463] FAULT_INJECTION: forcing a failure. [ 478.678207][T30463] name failslab, interval 1, probability 0, space 0, times 0 14:38:01 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) lookup_dcookie(0x7, &(0x7f0000000000)=""/4096, 0x1000) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:01 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 478.753414][T30463] CPU: 0 PID: 30463 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 478.761448][T30463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.771509][T30463] Call Trace: [ 478.774816][T30463] dump_stack+0x172/0x1f0 [ 478.779167][T30463] should_fail.cold+0xa/0x15 [ 478.783772][T30463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.789595][T30463] ? ___might_sleep+0x163/0x280 [ 478.794460][T30463] __should_failslab+0x121/0x190 [ 478.799417][T30463] should_failslab+0x9/0x14 [ 478.803928][T30463] kmem_cache_alloc+0x2b2/0x6f0 [ 478.808792][T30463] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 478.815053][T30463] ptlock_alloc+0x20/0x70 [ 478.819402][T30463] pte_alloc_one+0x6d/0x1a0 [ 478.823924][T30463] __pte_alloc+0x20/0x310 [ 478.828269][T30463] __handle_mm_fault+0x3391/0x3ec0 [ 478.833406][T30463] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 478.838958][T30463] ? find_held_lock+0x35/0x130 [ 478.843732][T30463] ? handle_mm_fault+0x322/0xb30 [ 478.848688][T30463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.854946][T30463] ? kasan_check_read+0x11/0x20 [ 478.859812][T30463] handle_mm_fault+0x43f/0xb30 [ 478.864588][T30463] __get_user_pages+0x7b6/0x1a40 [ 478.869552][T30463] ? follow_page_mask+0x19a0/0x19a0 [ 478.874777][T30463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.880268][T30463] get_user_pages_remote+0x21d/0x440 [ 478.885605][T30463] copy_strings.isra.0+0x3dc/0x890 [ 478.890741][T30463] ? remove_arg_zero+0x590/0x590 [ 478.895693][T30463] ? prepare_binprm+0x6aa/0x940 14:38:01 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) recvfrom$rose(r0, &(0x7f0000000000)=""/243, 0x209, 0x40010140, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x71, 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140), 0x13f, 0x8}}, 0x20) 14:38:01 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000180)={0x43, 0x0, 0x2}, 0x10) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x201, 0x0) bind$bt_l2cap(r2, &(0x7f00000000c0)={0x1f, 0xd1, {0x8, 0x0, 0x2, 0x26, 0x400, 0x80}, 0x7, 0x6}, 0xe) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r2, &(0x7f0000000040)="f2a0ea7a96a8d26a92e4a537f233f08607c7cc75d6e51ecb8cf9a42ac9ff9c1ea5cc8690f14051e62b4c91c585321ef00df216edc1f4e1b85eb69841432520de0e642364858860f56dd2a017b3a19b2e2af579c00b2b2f5b02a4d9b6f93deea58f840404930bb52ca93252e049a25af857af59b6c56c2c5b8ecd77", &(0x7f00000000c0)}, 0x18) socket$inet(0x2, 0x3, 0x80) 14:38:01 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x81, 0x8080) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x1, 0xffff, 0x2, 0x17, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_x_nat_t_port={0x1, 0x0, 0x4e22}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e20}, @sadb_address={0x3, 0x7, 0x32, 0x80, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e22}, @sadb_key={0xf, 0x9, 0x358, 0x0, "4a0f1a2f242ffa35ca0852dd00fdd30cddf14d9b41a9d63feac4caa9a0a23dec6093aa5649ace77d6a18c99efcff47627269eeeea624e044a99314c2081793d0c7260a707688e1a8b588fa24f57df384bbaf2903d2ac472dd3b7260b054ebeff19cf5d0c4cd8d409b85d78"}]}, 0xb8}}, 0x20040000) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:01 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) [ 478.900560][T30463] ? install_exec_creds+0x180/0x180 [ 478.905779][T30463] copy_strings_kernel+0xa5/0x110 [ 478.910827][T30463] __do_execve_file.isra.0+0x10ef/0x23f0 [ 478.916489][T30463] ? copy_strings_kernel+0x110/0x110 [ 478.921776][T30463] ? strncpy_from_user+0x2a8/0x380 [ 478.926901][T30463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.933244][T30463] __x64_sys_execveat+0xed/0x130 [ 478.938208][T30463] do_syscall_64+0x103/0x610 [ 478.942818][T30463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.949594][T30463] RIP: 0033:0x458da9 [ 478.949612][T30463] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.949620][T30463] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat!', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:01 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) [ 478.949635][T30463] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 14:38:01 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 478.949644][T30463] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 478.949654][T30463] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:01 executing program 0 (fault-call:4 fault-nth:20): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 478.949663][T30463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 478.949672][T30463] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:38:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:01 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) 14:38:01 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x20000000) [ 479.493739][T30881] FAULT_INJECTION: forcing a failure. [ 479.493739][T30881] name failslab, interval 1, probability 0, space 0, times 0 [ 479.532191][T30881] CPU: 0 PID: 30881 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 14:38:01 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) socket$can_bcm(0x1d, 0x2, 0x2) 14:38:01 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) [ 479.540243][T30881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.550353][T30881] Call Trace: [ 479.553672][T30881] dump_stack+0x172/0x1f0 [ 479.558026][T30881] should_fail.cold+0xa/0x15 [ 479.562646][T30881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.568469][T30881] ? ___might_sleep+0x163/0x280 [ 479.573334][T30881] __should_failslab+0x121/0x190 [ 479.578295][T30881] should_failslab+0x9/0x14 [ 479.578313][T30881] kmem_cache_alloc+0x2b2/0x6f0 [ 479.578335][T30881] ? __might_sleep+0x95/0x190 [ 479.578366][T30881] __anon_vma_prepare+0x62/0x3c0 [ 479.578394][T30881] __handle_mm_fault+0x34db/0x3ec0 [ 479.578417][T30881] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 479.587765][T30881] ? find_held_lock+0x35/0x130 [ 479.587785][T30881] ? handle_mm_fault+0x322/0xb30 [ 479.587813][T30881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.587833][T30881] ? kasan_check_read+0x11/0x20 [ 479.587859][T30881] handle_mm_fault+0x43f/0xb30 [ 479.633573][T30881] __get_user_pages+0x7b6/0x1a40 [ 479.638534][T30881] ? follow_page_mask+0x19a0/0x19a0 [ 479.643739][T30881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.649992][T30881] ? fsnotify+0xbc0/0xbc0 [ 479.654337][T30881] get_user_pages_remote+0x21d/0x440 [ 479.659661][T30881] copy_strings.isra.0+0x3dc/0x890 [ 479.664795][T30881] ? remove_arg_zero+0x590/0x590 [ 479.669740][T30881] ? prepare_binprm+0x6aa/0x940 [ 479.674595][T30881] ? lock_downgrade+0x880/0x880 [ 479.679453][T30881] ? vma_link+0x117/0x180 [ 479.683788][T30881] ? install_exec_creds+0x180/0x180 [ 479.689002][T30881] copy_strings_kernel+0xa5/0x110 [ 479.694038][T30881] __do_execve_file.isra.0+0x10ef/0x23f0 [ 479.699693][T30881] ? copy_strings_kernel+0x110/0x110 [ 479.704985][T30881] ? strncpy_from_user+0x2a8/0x380 [ 479.710109][T30881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.716402][T30881] __x64_sys_execveat+0xed/0x130 [ 479.721369][T30881] do_syscall_64+0x103/0x610 [ 479.725976][T30881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.731876][T30881] RIP: 0033:0x458da9 [ 479.735780][T30881] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.755480][T30881] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 479.763907][T30881] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 479.771884][T30881] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 479.779861][T30881] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:02 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x111400, 0x0) [ 479.787845][T30881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 479.795835][T30881] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:38:02 executing program 0 (fault-call:4 fault-nth:21): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\"', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:02 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:02 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:02 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:02 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040), 0x4) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:38:02 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) [ 480.035845][T31034] FAULT_INJECTION: forcing a failure. [ 480.035845][T31034] name failslab, interval 1, probability 0, space 0, times 0 [ 480.079467][T31034] CPU: 1 PID: 31034 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 480.087498][T31034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.097561][T31034] Call Trace: [ 480.100875][T31034] dump_stack+0x172/0x1f0 [ 480.105231][T31034] should_fail.cold+0xa/0x15 [ 480.109841][T31034] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.115660][T31034] ? ___might_sleep+0x163/0x280 [ 480.120522][T31034] __should_failslab+0x121/0x190 [ 480.125464][T31034] should_failslab+0x9/0x14 [ 480.129973][T31034] kmem_cache_alloc+0x2b2/0x6f0 [ 480.134835][T31034] ? __might_sleep+0x95/0x190 [ 480.139525][T31034] __anon_vma_prepare+0x1b1/0x3c0 [ 480.144554][T31034] ? __pte_alloc+0x1ba/0x310 [ 480.149157][T31034] __handle_mm_fault+0x34db/0x3ec0 [ 480.154284][T31034] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 480.159836][T31034] ? find_held_lock+0x35/0x130 [ 480.164610][T31034] ? handle_mm_fault+0x322/0xb30 [ 480.169564][T31034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.175811][T31034] ? kasan_check_read+0x11/0x20 [ 480.180673][T31034] handle_mm_fault+0x43f/0xb30 [ 480.185452][T31034] __get_user_pages+0x7b6/0x1a40 [ 480.190409][T31034] ? follow_page_mask+0x19a0/0x19a0 [ 480.195642][T31034] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 480.201121][T31034] get_user_pages_remote+0x21d/0x440 [ 480.206429][T31034] copy_strings.isra.0+0x3dc/0x890 [ 480.211559][T31034] ? remove_arg_zero+0x590/0x590 [ 480.216509][T31034] ? copy_strings_kernel+0x1f/0x110 [ 480.221718][T31034] copy_strings_kernel+0xa5/0x110 [ 480.226753][T31034] __do_execve_file.isra.0+0x10ef/0x23f0 [ 480.232404][T31034] ? copy_strings_kernel+0x110/0x110 [ 480.237694][T31034] ? strncpy_from_user+0x2a8/0x380 [ 480.242816][T31034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.249063][T31034] __x64_sys_execveat+0xed/0x130 [ 480.254016][T31034] do_syscall_64+0x103/0x610 [ 480.258618][T31034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.264509][T31034] RIP: 0033:0x458da9 [ 480.268413][T31034] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.288022][T31034] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 480.296441][T31034] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 480.304417][T31034] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 480.312392][T31034] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 480.320379][T31034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 14:38:02 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r2 = getuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x2000000, &(0x7f0000000300)=ANY=[@ANYBLOB="e794ab59a29afa002c7266646e6f3d", @ANYRESHEX=r1, @ANYBLOB=',wxdno=', @ANYRESHEX=r0, @ANYBLOB=',posixacl,fscache,mmap,fscache,posixacl,subj_user=+#,rootcontext=unconfined_u,subj_role=cpuset,hash,uid<', @ANYRESDEC=r2, @ANYBLOB="d76b15cb3c0d465a6f39f3c9e706cac6a9b3c07f97cb516fc75e2a4955197b8fd3b76d81a78a638f74b2bb4413f815f755b4dbc1e936490522ba00084a5a438ea25829723103e29b8e545cc4d999277482a80ee2425ac04efcc60a9df3a284262f164c2b9f1bad85e3a2d6bc7497252a9347c37f0930d97b736cff58c17281884e8fb70d31bb41cf2597f5aeeb9b"]) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000040)={0x52c, 0x7f, 0x200}) [ 480.328370][T31034] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:38:02 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) 14:38:02 executing program 0 (fault-call:4 fault-nth:22): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:02 executing program 1 (fault-call:8 fault-nth:0): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat5', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:02 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x5033c0, 0x0) [ 480.574606][T31101] FAULT_INJECTION: forcing a failure. [ 480.574606][T31101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.599976][T31110] FAULT_INJECTION: forcing a failure. [ 480.599976][T31110] name failslab, interval 1, probability 0, space 0, times 0 [ 480.614041][T31110] CPU: 0 PID: 31110 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 480.622033][T31110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.632091][T31110] Call Trace: [ 480.635404][T31110] dump_stack+0x172/0x1f0 [ 480.639758][T31110] should_fail.cold+0xa/0x15 [ 480.644379][T31110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.650214][T31110] ? ___might_sleep+0x163/0x280 [ 480.655085][T31110] __should_failslab+0x121/0x190 [ 480.660030][T31110] should_failslab+0x9/0x14 [ 480.664547][T31110] kmem_cache_alloc+0x2b2/0x6f0 [ 480.669421][T31110] getname_flags+0xd6/0x5b0 14:38:03 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x5353a178d3cca3bb) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x9c, r2, 0x424, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x14}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x9c}}, 0x200408c1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cpuset\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7fffffff, 0xf7e, 0x8000, 0xd493, 0xb77a, 0x0, 0x7, 0xc0, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r4, 0x200}, &(0x7f0000000100)=0x8) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 480.673944][T31110] __x64_sys_execveat+0xd4/0x130 [ 480.678898][T31110] do_syscall_64+0x103/0x610 [ 480.683501][T31110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.689480][T31110] RIP: 0033:0x458da9 [ 480.689496][T31110] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.689505][T31110] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:03 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) 14:38:03 executing program 5: r0 = msgget$private(0x0, 0x12) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/4096) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:38:03 executing program 1 (fault-call:8 fault-nth:1): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 480.689520][T31110] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 480.689530][T31110] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 480.689538][T31110] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 480.689554][T31110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 480.713049][T31110] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 480.762247][T31101] CPU: 1 PID: 31101 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 480.770240][T31101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.780302][T31101] Call Trace: [ 480.780331][T31101] dump_stack+0x172/0x1f0 [ 480.780366][T31101] should_fail.cold+0xa/0x15 [ 480.780399][T31101] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.798389][T31101] ? ___might_sleep+0x163/0x280 [ 480.803272][T31101] should_fail_alloc_page+0x50/0x60 [ 480.808485][T31101] __alloc_pages_nodemask+0x1a1/0x8d0 [ 480.813867][T31101] ? __anon_vma_prepare+0x184/0x3c0 [ 480.819082][T31101] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 480.824827][T31101] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 480.831085][T31101] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 480.837352][T31101] alloc_pages_vma+0xdd/0x540 [ 480.842050][T31101] __handle_mm_fault+0x1dd4/0x3ec0 [ 480.847177][T31101] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 480.852727][T31101] ? find_held_lock+0x35/0x130 [ 480.857496][T31101] ? handle_mm_fault+0x322/0xb30 [ 480.862451][T31101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.868705][T31101] ? kasan_check_read+0x11/0x20 [ 480.873570][T31101] handle_mm_fault+0x43f/0xb30 [ 480.878356][T31101] __get_user_pages+0x7b6/0x1a40 [ 480.883321][T31101] ? follow_page_mask+0x19a0/0x19a0 [ 480.888535][T31101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.894792][T31101] ? fsnotify+0xbc0/0xbc0 [ 480.899131][T31101] get_user_pages_remote+0x21d/0x440 [ 480.904437][T31101] copy_strings.isra.0+0x3dc/0x890 [ 480.909575][T31101] ? remove_arg_zero+0x590/0x590 [ 480.914522][T31101] ? prepare_binprm+0x6aa/0x940 [ 480.919408][T31101] ? lock_downgrade+0x880/0x880 [ 480.924359][T31101] ? vma_link+0x117/0x180 [ 480.928703][T31101] ? install_exec_creds+0x180/0x180 [ 480.933918][T31101] copy_strings_kernel+0xa5/0x110 [ 480.938954][T31101] __do_execve_file.isra.0+0x10ef/0x23f0 [ 480.944867][T31101] ? copy_strings_kernel+0x110/0x110 [ 480.950179][T31101] __x64_sys_execveat+0xed/0x130 [ 480.955132][T31101] do_syscall_64+0x103/0x610 [ 480.959734][T31101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.965630][T31101] RIP: 0033:0x458da9 [ 480.969527][T31101] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.989142][T31101] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 480.997558][T31101] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 480.997568][T31101] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 480.997577][T31101] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:03 executing program 0 (fault-call:4 fault-nth:23): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 480.997587][T31101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 480.997595][T31101] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 481.109529][T31171] FAULT_INJECTION: forcing a failure. [ 481.109529][T31171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.122779][T31171] CPU: 0 PID: 31171 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 481.130769][T31171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.140830][T31171] Call Trace: [ 481.144134][T31171] dump_stack+0x172/0x1f0 [ 481.148487][T31171] should_fail.cold+0xa/0x15 [ 481.153202][T31171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.159024][T31171] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 481.164490][T31171] ? lockdep_hardirqs_on+0x418/0x5d0 [ 481.169780][T31171] ? retint_kernel+0x2d/0x2d [ 481.174383][T31171] ? trace_hardirqs_on_caller+0x6a/0x220 [ 481.180037][T31171] should_fail_alloc_page+0x50/0x60 [ 481.185243][T31171] __alloc_pages_nodemask+0x1a1/0x8d0 [ 481.190627][T31171] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 481.196355][T31171] ? find_held_lock+0x35/0x130 [ 481.201144][T31171] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.206962][T31171] cache_grow_begin+0x9c/0x860 [ 481.212700][T31171] ? getname_flags+0xd6/0x5b0 [ 481.221551][T31171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.227892][T31171] kmem_cache_alloc+0x62d/0x6f0 [ 481.232749][T31171] ? ksys_write+0x1f1/0x2d0 [ 481.237263][T31171] getname_flags+0xd6/0x5b0 [ 481.241773][T31171] ? do_syscall_64+0x26/0x610 [ 481.246464][T31171] __x64_sys_execveat+0xd4/0x130 [ 481.251416][T31171] do_syscall_64+0x103/0x610 [ 481.257477][T31171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.263393][T31171] RIP: 0033:0x458da9 [ 481.267293][T31171] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.286905][T31171] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 481.295334][T31171] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 14:38:03 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0xc01) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000040)={0x6, 0x3, @raw_data=[0x135a, 0xf4e, 0x221, 0x8, 0x7, 0xf65, 0x48e7, 0x1ff, 0x4, 0xfffffffffffffff8, 0x0, 0x1, 0xd2f8, 0x8, 0x0, 0x31]}) [ 481.303319][T31171] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 481.311305][T31171] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 481.319289][T31171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 481.327263][T31171] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 481.380319][T31278] FAULT_INJECTION: forcing a failure. [ 481.380319][T31278] name failslab, interval 1, probability 0, space 0, times 0 [ 481.402039][T31278] CPU: 0 PID: 31278 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 481.410046][T31278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.410074][T31278] Call Trace: [ 481.410104][T31278] dump_stack+0x172/0x1f0 [ 481.410129][T31278] should_fail.cold+0xa/0x15 [ 481.432376][T31278] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.438203][T31278] ? __should_failslab+0x59/0x190 [ 481.443245][T31278] __should_failslab+0x121/0x190 [ 481.448196][T31278] should_failslab+0x9/0x14 [ 481.452711][T31278] kmem_cache_alloc_trace+0x2d1/0x760 [ 481.458102][T31278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.464463][T31278] ? debug_smp_processor_id+0x3c/0x280 [ 481.469946][T31278] tomoyo_find_next_domain+0xe4/0x1f8a [ 481.475429][T31278] ? mark_held_locks+0xf0/0xf0 [ 481.480218][T31278] ? perf_trace_lock+0x510/0x510 [ 481.485163][T31278] ? lockdep_hardirqs_on+0x418/0x5d0 [ 481.490457][T31278] ? trace_hardirqs_on_caller+0x6a/0x220 [ 481.496108][T31278] ? tomoyo_dump_page+0x510/0x510 [ 481.501143][T31278] ? lock_acquire+0x16f/0x3f0 [ 481.505828][T31278] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 481.511651][T31278] tomoyo_bprm_check_security+0x12a/0x1b0 [ 481.517387][T31278] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 481.523220][T31278] security_bprm_check+0x69/0xb0 [ 481.528172][T31278] search_binary_handler+0x77/0x570 [ 481.533393][T31278] ? kasan_check_read+0x11/0x20 [ 481.538271][T31278] __do_execve_file.isra.0+0x1394/0x23f0 [ 481.543948][T31278] ? copy_strings_kernel+0x110/0x110 [ 481.549243][T31278] ? strncpy_from_user+0x2a8/0x380 [ 481.554376][T31278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.560660][T31278] __x64_sys_execveat+0xed/0x130 [ 481.565618][T31278] do_syscall_64+0x103/0x610 [ 481.570230][T31278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.576128][T31278] RIP: 0033:0x458da9 [ 481.580031][T31278] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.599646][T31278] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 481.608075][T31278] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 481.616052][T31278] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 481.624031][T31278] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:03 executing program 3: ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e2) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x552) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0xe, 0xfffffffffffff801, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x9, 0x101, 0x0, 0x8}, 0x8) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x2, 0x10001, 0x4, 0x3, 0x13, 0x9, 0x3, 0x401, 0x81, 0x209cb3ad, 0x9, 0xf27}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xffffffff, 0x9, 0x7, 0x2, 0x12, 0xffff, 0x9, 0x3ff, 0x7fffffff, 0x10000, 0x0, 0x1}) 14:38:03 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) [ 481.632006][T31278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 481.639979][T31278] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:38:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:04 executing program 1 (fault-call:8 fault-nth:2): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:04 executing program 0 (fault-call:4 fault-nth:24): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:04 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) 14:38:04 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) timer_create(0x7, &(0x7f00000002c0)={0x0, 0x30, 0x0, @thr={&(0x7f0000000200)="3a05da4062a7ebac996e63858c9e97e4e4081d4c851286dfbd74600d4aef825c5f9efdbae7772ca8f94c9aff5757fe9af54b4e18b74c3185b78ed374aad61855eeab9022fc5f1607367177bc2858d0d219fc26e70fa3b1512fbcace5a27ce4b5983d5ed4c170ae715ed13fa79831f41cf7d0419418c78438022ef572d9e1a81d210eca5b760b8ee60eefb5cc49089e4da4674371e79b6aff2fe7633efd8481dccf517b02d3061ce88e32a93a617527936442", &(0x7f0000000000)="023531aadac755a0ff1a04b5f79066119bbedc4dc3"}}, &(0x7f0000000300)=0x0) timer_getoverrun(r1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e22, @multicast2}, {0x6, @dev={[], 0x26}}, 0xe, {0x2, 0x4e20, @rand_addr=0x4}, 'bond0\x00'}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40400, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r0}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000340)={r3, @in6={{0xa, 0x4e24, 0x43b0, @remote, 0xffffffffffffffe0}}}, 0x84) [ 481.853986][T31378] FAULT_INJECTION: forcing a failure. [ 481.853986][T31378] name failslab, interval 1, probability 0, space 0, times 0 [ 481.866912][T31378] CPU: 1 PID: 31378 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 481.874911][T31378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.884976][T31378] Call Trace: [ 481.888285][T31378] dump_stack+0x172/0x1f0 [ 481.892640][T31378] should_fail.cold+0xa/0x15 [ 481.897331][T31378] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.903162][T31378] ? ___might_sleep+0x163/0x280 [ 481.908021][T31378] __should_failslab+0x121/0x190 [ 481.912965][T31378] should_failslab+0x9/0x14 [ 481.917477][T31378] kmem_cache_alloc_trace+0x2d1/0x760 [ 481.922895][T31378] ? lock_downgrade+0x880/0x880 [ 481.924890][T31400] FAULT_INJECTION: forcing a failure. [ 481.924890][T31400] name failslab, interval 1, probability 0, space 0, times 0 [ 481.927756][T31378] alloc_fdtable+0x86/0x290 [ 481.927777][T31378] dup_fd+0x743/0xb30 [ 481.927809][T31378] unshare_fd+0x160/0x1d0 [ 481.953180][T31378] ? trace_hardirqs_on_caller+0x6a/0x220 [ 481.958827][T31378] ? set_max_threads+0xe0/0xe0 [ 481.963604][T31378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 481.969076][T31378] unshare_files+0x7f/0x1f0 [ 481.973593][T31378] ? __ia32_sys_unshare+0x40/0x40 [ 481.978637][T31378] __do_execve_file.isra.0+0x27e/0x23f0 [ 481.984194][T31378] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.990445][T31378] ? __phys_addr_symbol+0x30/0x70 [ 481.995478][T31378] ? __sanitizer_cov_trace_cmp8+0x18/0x20 14:38:04 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite6\x00') getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300), &(0x7f0000000340)=0x1) msgget(0x1, 0x2) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="580000f8", @ANYRES16=r2, @ANYBLOB="040025bd7000fbdbdf25050000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="7ba035deda80f17e04000000714008210900", @ANYRES32=r3, @ANYBLOB="0c00050001000000000000000c00030008000000000000000800010000000000"], 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4044084) [ 482.001206][T31378] ? __check_object_size+0x3d/0x42f [ 482.006420][T31378] ? copy_strings_kernel+0x110/0x110 [ 482.011718][T31378] ? strncpy_from_user+0x2a8/0x380 [ 482.016847][T31378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.023106][T31378] __x64_sys_execveat+0xed/0x130 [ 482.028068][T31378] do_syscall_64+0x103/0x610 [ 482.032671][T31378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.038566][T31378] RIP: 0033:0x458da9 [ 482.042467][T31378] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.062074][T31378] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 482.070495][T31378] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 482.078470][T31378] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 482.086444][T31378] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 482.094416][T31378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 14:38:04 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:04 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) [ 482.102392][T31378] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 482.112973][T31400] CPU: 0 PID: 31400 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 482.120976][T31400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.131027][T31400] Call Trace: [ 482.134319][T31400] dump_stack+0x172/0x1f0 [ 482.138672][T31400] should_fail.cold+0xa/0x15 [ 482.143279][T31400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.149069][T31400] ? ___might_sleep+0x163/0x280 [ 482.153905][T31400] __should_failslab+0x121/0x190 [ 482.158825][T31400] should_failslab+0x9/0x14 [ 482.163320][T31400] kmem_cache_alloc_trace+0x2d1/0x760 [ 482.168673][T31400] ? retint_kernel+0x2d/0x2d [ 482.173250][T31400] ? trace_hardirqs_on_caller+0x6a/0x220 [ 482.178878][T31400] tomoyo_find_next_domain+0x12c/0x1f8a [ 482.184423][T31400] ? retint_kernel+0x2d/0x2d [ 482.188994][T31400] ? tomoyo_dump_page+0x510/0x510 [ 482.193997][T31400] ? lock_acquire+0x1ea/0x3f0 [ 482.198661][T31400] tomoyo_bprm_check_security+0x12a/0x1b0 [ 482.204367][T31400] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 482.210161][T31400] security_bprm_check+0x69/0xb0 [ 482.215096][T31400] search_binary_handler+0x77/0x570 [ 482.220286][T31400] ? kasan_check_read+0x11/0x20 [ 482.225121][T31400] __do_execve_file.isra.0+0x1394/0x23f0 [ 482.230738][T31400] ? copy_strings_kernel+0x110/0x110 [ 482.236034][T31400] __x64_sys_execveat+0xed/0x130 [ 482.240964][T31400] do_syscall_64+0x103/0x610 [ 482.245543][T31400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.251416][T31400] RIP: 0033:0x458da9 [ 482.255294][T31400] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.274969][T31400] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 482.283371][T31400] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 482.291359][T31400] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 482.299317][T31400] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 482.307273][T31400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 482.315230][T31400] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 14:38:04 executing program 1 (fault-call:8 fault-nth:3): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:04 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:04 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) 14:38:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 482.498038][T31463] FAULT_INJECTION: forcing a failure. [ 482.498038][T31463] name failslab, interval 1, probability 0, space 0, times 0 [ 482.511119][T31463] CPU: 1 PID: 31463 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 482.519134][T31463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.529188][T31463] Call Trace: [ 482.532527][T31463] dump_stack+0x172/0x1f0 [ 482.536874][T31463] should_fail.cold+0xa/0x15 [ 482.541485][T31463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.547305][T31463] ? ___might_sleep+0x163/0x280 [ 482.552176][T31463] __should_failslab+0x121/0x190 [ 482.557121][T31463] should_failslab+0x9/0x14 [ 482.561634][T31463] kmem_cache_alloc_node_trace+0x270/0x720 [ 482.567461][T31463] __kmalloc_node+0x3d/0x70 [ 482.571978][T31463] kvmalloc_node+0x68/0x100 [ 482.576517][T31463] alloc_fdtable+0xd6/0x290 [ 482.581030][T31463] dup_fd+0x743/0xb30 [ 482.585037][T31463] unshare_fd+0x160/0x1d0 [ 482.589382][T31463] ? trace_hardirqs_on_caller+0x6a/0x220 [ 482.595027][T31463] ? set_max_threads+0xe0/0xe0 [ 482.599799][T31463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 482.605277][T31463] unshare_files+0x7f/0x1f0 [ 482.609788][T31463] ? __ia32_sys_unshare+0x40/0x40 [ 482.614831][T31463] __do_execve_file.isra.0+0x27e/0x23f0 [ 482.620391][T31463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 482.626642][T31463] ? __phys_addr_symbol+0x30/0x70 [ 482.631673][T31463] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 482.637401][T31463] ? __check_object_size+0x3d/0x42f [ 482.642647][T31463] ? copy_strings_kernel+0x110/0x110 [ 482.647939][T31463] ? strncpy_from_user+0x2a8/0x380 [ 482.653062][T31463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.653084][T31463] __x64_sys_execveat+0xed/0x130 [ 482.664243][T31463] do_syscall_64+0x103/0x610 [ 482.664265][T31463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.664277][T31463] RIP: 0033:0x458da9 [ 482.664291][T31463] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:38:05 executing program 0 (fault-call:4 fault-nth:25): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 482.664299][T31463] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 482.664313][T31463] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 482.664321][T31463] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 482.664329][T31463] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 482.664338][T31463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 482.664356][T31463] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:05 executing program 1 (fault-call:8 fault-nth:4): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:05 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x50d902, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0xfffffffffffffffe) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000140)=0xffffffffffffffff) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fsync(r1) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r2, 0x22}) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:38:05 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 482.915847][T31529] FAULT_INJECTION: forcing a failure. [ 482.915847][T31529] name failslab, interval 1, probability 0, space 0, times 0 [ 482.928792][T31529] CPU: 1 PID: 31529 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 482.936775][T31529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.936790][T31529] Call Trace: [ 482.950149][T31529] dump_stack+0x172/0x1f0 [ 482.954492][T31529] should_fail.cold+0xa/0x15 [ 482.959101][T31529] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.964929][T31529] ? ___might_sleep+0x163/0x280 [ 482.969804][T31529] __should_failslab+0x121/0x190 [ 482.974751][T31529] should_failslab+0x9/0x14 [ 482.979262][T31529] kmem_cache_alloc_node_trace+0x270/0x720 [ 482.985076][T31529] ? kasan_unpoison_shadow+0x35/0x50 [ 482.990371][T31529] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 482.990394][T31529] __kmalloc_node+0x3d/0x70 [ 482.990411][T31529] kvmalloc_node+0x68/0x100 [ 482.990431][T31529] alloc_fdtable+0x142/0x290 [ 483.009801][T31529] dup_fd+0x743/0xb30 [ 483.013810][T31529] unshare_fd+0x160/0x1d0 [ 483.018146][T31529] ? set_max_threads+0xe0/0xe0 [ 483.022935][T31529] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 483.028589][T31529] unshare_files+0x7f/0x1f0 [ 483.033103][T31529] ? should_fail+0x1de/0x852 [ 483.037704][T31529] ? __ia32_sys_unshare+0x40/0x40 [ 483.042744][T31529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 483.048214][T31529] ? lockdep_hardirqs_on+0x418/0x5d0 [ 483.053512][T31529] ? retint_kernel+0x2d/0x2d [ 483.058106][T31529] ? trace_hardirqs_on_caller+0x6a/0x220 14:38:05 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1009) 14:38:05 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x5, 0xfffffffffffffffb, 0x100, 0x400}) 14:38:05 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x100a) [ 483.058131][T31529] __do_execve_file.isra.0+0x27e/0x23f0 [ 483.058159][T31529] ? copy_strings_kernel+0x110/0x110 [ 483.074629][T31529] __x64_sys_execveat+0xed/0x130 [ 483.079581][T31529] do_syscall_64+0x103/0x610 [ 483.084195][T31529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.090096][T31529] RIP: 0033:0x458da9 [ 483.090113][T31529] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.090122][T31529] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 483.090145][T31529] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 483.129999][T31529] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 483.137975][T31529] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 483.137985][T31529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 483.137993][T31529] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 483.143716][T31526] FAULT_INJECTION: forcing a failure. [ 483.143716][T31526] name failslab, interval 1, probability 0, space 0, times 0 [ 483.176048][T31526] CPU: 1 PID: 31526 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 483.184041][T31526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.194104][T31526] Call Trace: [ 483.197408][T31526] dump_stack+0x172/0x1f0 [ 483.201754][T31526] should_fail.cold+0xa/0x15 [ 483.206372][T31526] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.212192][T31526] ? __task_pid_nr_ns+0x1b1/0x530 [ 483.217269][T31526] __should_failslab+0x121/0x190 [ 483.226309][T31526] should_failslab+0x9/0x14 [ 483.230833][T31526] kmem_cache_alloc_trace+0x4b/0x760 [ 483.236128][T31526] ? kasan_check_read+0x11/0x20 [ 483.240995][T31526] proc_self_get_link+0x16f/0x1d0 [ 483.246156][T31526] link_path_walk.part.0+0xeec/0x1340 [ 483.251535][T31526] ? proc_ns_dir_readdir+0x570/0x570 [ 483.251556][T31526] ? walk_component+0x2000/0x2000 [ 483.251575][T31526] ? save_stack+0x45/0xd0 [ 483.251592][T31526] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 483.251607][T31526] ? getname_kernel+0x40/0x370 [ 483.251626][T31526] path_lookupat.isra.0+0xe3/0x8d0 [ 483.251648][T31526] ? do_syscall_64+0x103/0x610 [ 483.288271][T31526] ? path_parentat.isra.0+0x160/0x160 [ 483.293651][T31526] ? debug_smp_processor_id+0x3c/0x280 [ 483.299135][T31526] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 483.304788][T31526] filename_lookup+0x1b0/0x410 [ 483.309567][T31526] ? nd_jump_link+0x1d0/0x1d0 14:38:05 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f0000001140)='/dev/v4l-subdev#\x00', 0x0, 0x202000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x8000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000001340)={0x1, &(0x7f0000001280)=[{}]}) write$UHID_DESTROY(r1, &(0x7f0000001240), 0x4) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000001180)={0xfffffffffffffffb, "3532714c15de77736738b955f605dfa3b0a1a366a087066f885d1c10b5a7ed3a", 0x1, 0x6a0, 0x5912, 0xe780, 0x8, 0x0, 0xc39, 0xfffffffffffffe00}) r2 = syz_open_dev$media(&(0x7f00000010c0)='/dev/media#\x00', 0x39, 0x840) epoll_wait(r2, &(0x7f0000001100)=[{}, {}, {}], 0x3, 0x9) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e2) sysinfo(&(0x7f00000000c0)=""/4096) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="809428c12f8270a6be9d715dd42ad58ff3233f3334b04fffdcaf32bdd6f1e24e6043f8d3f10636c7cafc289f34641e2e47223d7a78a474b69539fbd93908f769510044266d7affed2431c9e9c363120aab4c9c978c7dd2e42ed0f43f0bc2091cda9d1d18420ab391e35ba88fc6ed5818dff2375da19843c99d7c4926c2616e88c8adea48", 0x84) 14:38:05 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000640)='/dev/dmmidi#\x00', 0x0, 0x18a00) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000680)={0x0, 0x5}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000700)={0x1, 0x80, 0x201, 0x2, 0x8, 0x7fffffff, 0xffffffffffff7cbf, 0x200, r1}, 0x20) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) [ 483.314286][T31526] ? memcpy+0x46/0x50 [ 483.318276][T31526] ? getname_kernel+0x223/0x370 [ 483.323168][T31526] kern_path+0x36/0x40 [ 483.327246][T31526] tomoyo_realpath_nofollow+0x74/0xdb [ 483.332633][T31526] ? tomoyo_realpath_from_path+0x730/0x730 [ 483.338461][T31526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 483.344716][T31526] ? tomoyo_init_request_info+0x105/0x1d0 [ 483.350483][T31526] tomoyo_find_next_domain+0x28c/0x1f8a [ 483.356047][T31526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 483.361529][T31526] ? tomoyo_dump_page+0x510/0x510 14:38:05 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018) [ 483.366588][T31526] tomoyo_bprm_check_security+0x12a/0x1b0 [ 483.372322][T31526] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 483.378157][T31526] security_bprm_check+0x69/0xb0 [ 483.383113][T31526] search_binary_handler+0x77/0x570 [ 483.388325][T31526] ? kasan_check_read+0x11/0x20 [ 483.393237][T31526] __do_execve_file.isra.0+0x1394/0x23f0 [ 483.398898][T31526] ? copy_strings_kernel+0x110/0x110 [ 483.404189][T31526] ? strncpy_from_user+0x2a8/0x380 [ 483.409320][T31526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.415593][T31526] __x64_sys_execveat+0xed/0x130 [ 483.420549][T31526] do_syscall_64+0x103/0x610 [ 483.425159][T31526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.431056][T31526] RIP: 0033:0x458da9 [ 483.434989][T31526] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.454603][T31526] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:05 executing program 1 (fault-call:8 fault-nth:5): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 483.463029][T31526] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 483.471007][T31526] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 483.478990][T31526] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 483.487071][T31526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 483.495095][T31526] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 483.641286][T31655] FAULT_INJECTION: forcing a failure. [ 483.641286][T31655] name failslab, interval 1, probability 0, space 0, times 0 [ 483.658430][T31655] CPU: 0 PID: 31655 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 483.666771][T31655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.676833][T31655] Call Trace: [ 483.676865][T31655] dump_stack+0x172/0x1f0 [ 483.676891][T31655] should_fail.cold+0xa/0x15 [ 483.676914][T31655] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.676938][T31655] ? ___might_sleep+0x163/0x280 [ 483.676964][T31655] __should_failslab+0x121/0x190 [ 483.689148][T31655] should_failslab+0x9/0x14 [ 483.689168][T31655] kmem_cache_alloc_node_trace+0x270/0x720 [ 483.689190][T31655] ? kasan_unpoison_shadow+0x35/0x50 [ 483.699834][T31655] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 483.699857][T31655] __kmalloc_node+0x3d/0x70 [ 483.699880][T31655] kvmalloc_node+0x68/0x100 [ 483.709304][T31655] alloc_fdtable+0x142/0x290 [ 483.709324][T31655] dup_fd+0x743/0xb30 [ 483.709361][T31655] unshare_fd+0x160/0x1d0 [ 483.748093][T31655] ? set_max_threads+0xe0/0xe0 [ 483.752874][T31655] unshare_files+0x7f/0x1f0 [ 483.757396][T31655] ? __ia32_sys_unshare+0x40/0x40 [ 483.762439][T31655] ? __do_execve_file.isra.0+0x237/0x23f0 [ 483.768170][T31655] __do_execve_file.isra.0+0x27e/0x23f0 [ 483.773721][T31655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 483.779971][T31655] ? __phys_addr_symbol+0x30/0x70 [ 483.785000][T31655] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 483.790724][T31655] ? __check_object_size+0x3d/0x42f [ 483.795943][T31655] ? copy_strings_kernel+0x110/0x110 [ 483.801233][T31655] ? strncpy_from_user+0x2a8/0x380 [ 483.806363][T31655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.812709][T31655] __x64_sys_execveat+0xed/0x130 [ 483.817661][T31655] do_syscall_64+0x103/0x610 [ 483.822268][T31655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.828159][T31655] RIP: 0033:0x458da9 [ 483.832059][T31655] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.851674][T31655] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 483.860100][T31655] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 483.868075][T31655] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 483.876046][T31655] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 483.884021][T31655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 483.893216][T31655] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat&', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:06 executing program 0 (fault-call:4 fault-nth:26): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:06 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:06 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1027) 14:38:06 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) 14:38:06 executing program 1 (fault-call:8 fault-nth:6): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 484.033485][T31663] FAULT_INJECTION: forcing a failure. [ 484.033485][T31663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 484.046741][T31663] CPU: 0 PID: 31663 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #96 [ 484.046754][T31663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.046760][T31663] Call Trace: [ 484.046789][T31663] dump_stack+0x172/0x1f0 [ 484.046814][T31663] should_fail.cold+0xa/0x15 [ 484.077028][T31663] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.082858][T31663] ? __lock_acquire+0x548/0x3fb0 [ 484.087821][T31663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.094088][T31663] should_fail_alloc_page+0x50/0x60 [ 484.099476][T31663] __alloc_pages_nodemask+0x1a1/0x8d0 [ 484.099499][T31663] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 484.099519][T31663] ? find_held_lock+0x35/0x130 [ 484.115512][T31663] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.121341][T31663] cache_grow_begin+0x9c/0x860 [ 484.126135][T31663] ? getname_kernel+0x53/0x370 [ 484.130910][T31663] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 484.137174][T31663] kmem_cache_alloc+0x62d/0x6f0 [ 484.142045][T31663] getname_kernel+0x53/0x370 [ 484.146649][T31663] kern_path+0x20/0x40 [ 484.150774][T31663] tomoyo_realpath_nofollow+0x74/0xdb [ 484.156197][T31663] ? tomoyo_realpath_from_path+0x730/0x730 [ 484.162151][T31663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 484.168425][T31663] ? tomoyo_init_request_info+0x105/0x1d0 [ 484.174169][T31663] tomoyo_find_next_domain+0x28c/0x1f8a [ 484.179730][T31663] ? mark_held_locks+0xf0/0xf0 [ 484.184529][T31663] ? tomoyo_dump_page+0x510/0x510 [ 484.189579][T31663] ? lock_acquire+0x16f/0x3f0 [ 484.194274][T31663] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 484.196847][T31673] FAULT_INJECTION: forcing a failure. [ 484.196847][T31673] name failslab, interval 1, probability 0, space 0, times 0 [ 484.200109][T31663] tomoyo_bprm_check_security+0x12a/0x1b0 [ 484.200126][T31663] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 484.200150][T31663] security_bprm_check+0x69/0xb0 [ 484.229373][T31663] search_binary_handler+0x77/0x570 [ 484.234617][T31663] ? kasan_check_read+0x11/0x20 [ 484.239571][T31663] __do_execve_file.isra.0+0x1394/0x23f0 [ 484.245373][T31663] ? copy_strings_kernel+0x110/0x110 [ 484.250717][T31663] ? strncpy_from_user+0x2a8/0x380 [ 484.255890][T31663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.262257][T31663] __x64_sys_execveat+0xed/0x130 [ 484.267227][T31663] do_syscall_64+0x103/0x610 [ 484.271887][T31663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.277859][T31663] RIP: 0033:0x458da9 [ 484.281917][T31663] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.301579][T31663] RSP: 002b:00007f99328ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 484.310011][T31663] RAX: ffffffffffffffda RBX: 00007f99328ddc90 RCX: 0000000000458da9 [ 484.317998][T31663] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 484.325990][T31663] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:06 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0xe, 0x6, 0x9, 0x3, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e24}]}, 0x18}}, 0x24008014) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040)) 14:38:06 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r1, &(0x7f00000000c0)="c8914b5bf40b48501d4de9622c9638e1d9bb56800480522be873222c432d240287bf23bd160cab79e9ea69801b454f6086df58eb5e8867ce303044c4ae5e24ed12c64eb9f1c730497881e6dd2aeec1a5bab5", &(0x7f0000000140)=""/65}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r0, r2}) [ 484.334060][T31663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99328de6d4 [ 484.342219][T31663] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000006 [ 484.350247][T31673] CPU: 1 PID: 31673 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 484.358247][T31673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.368310][T31673] Call Trace: [ 484.368339][T31673] dump_stack+0x172/0x1f0 [ 484.368368][T31673] should_fail.cold+0xa/0x15 [ 484.368385][T31673] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.368405][T31673] ? ___might_sleep+0x163/0x280 [ 484.368423][T31673] __should_failslab+0x121/0x190 [ 484.368445][T31673] should_failslab+0x9/0x14 [ 484.380719][T31673] kmem_cache_alloc_trace+0x2d1/0x760 [ 484.392964][T31673] ? __virt_addr_valid+0x55/0x240 [ 484.393029][T31673] __do_execve_file.isra.0+0x325/0x23f0 [ 484.393080][T31673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 484.393124][T31673] ? __phys_addr_symbol+0x30/0x70 [ 484.393163][T31673] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 484.393207][T31673] ? __check_object_size+0x3d/0x42f [ 484.393283][T31673] ? copy_strings_kernel+0x110/0x110 [ 484.393314][T31673] ? strncpy_from_user+0x2a8/0x380 [ 484.393392][T31673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.408216][T31673] __x64_sys_execveat+0xed/0x130 [ 484.408248][T31673] do_syscall_64+0x103/0x610 [ 484.418805][T31673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.418818][T31673] RIP: 0033:0x458da9 [ 484.418837][T31673] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.430103][T31673] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 484.430118][T31673] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 484.430126][T31673] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 484.430141][T31673] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:06 executing program 1 (fault-call:8 fault-nth:7): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:06 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) open_by_handle_at(r1, &(0x7f0000000040)={0xb8, 0x10000, "94d590e8a71b415bef1fd73d59058d7cbb2b1a5ff66ddf05fb1f2335a76aa5ad6325d81616a65eb523e50cb084f282694a680a237ef58ab9878509a83f315aab29de7cfe4e3a652600abc95586d9feea5a5d8e818b59523377eb8ca8d0e6a40135856214caddc4adff94cc51f9ec92be4ea1ca53525e5c489544bb63621aba69aac37eba930e2c9ec87fff9fff275bf5f6c7cae6c633e64896012d7433ac28aa0916a6454476675a068dd2dc0777fba1"}, 0xaa03) [ 484.441045][T31673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 484.441070][T31673] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 484.557737][T31679] FAULT_INJECTION: forcing a failure. [ 484.557737][T31679] name failslab, interval 1, probability 0, space 0, times 0 [ 484.572051][T31679] CPU: 1 PID: 31679 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 484.580039][T31679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.590111][T31679] Call Trace: [ 484.593430][T31679] dump_stack+0x172/0x1f0 [ 484.593456][T31679] should_fail.cold+0xa/0x15 [ 484.593480][T31679] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.593505][T31679] ? ___might_sleep+0x163/0x280 [ 484.593526][T31679] __should_failslab+0x121/0x190 [ 484.593545][T31679] should_failslab+0x9/0x14 [ 484.593563][T31679] __kmalloc+0x2dc/0x740 [ 484.593580][T31679] ? refcount_inc_not_zero_checked+0x144/0x200 14:38:07 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102d) [ 484.593598][T31679] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 484.593617][T31679] ? security_prepare_creds+0x123/0x190 [ 484.593638][T31679] security_prepare_creds+0x123/0x190 [ 484.602554][T31679] prepare_creds+0x2f5/0x3f0 [ 484.654227][T31679] prepare_exec_creds+0x12/0xf0 [ 484.659089][T31679] __do_execve_file.isra.0+0x393/0x23f0 [ 484.664660][T31679] ? copy_strings_kernel+0x110/0x110 [ 484.669962][T31679] __x64_sys_execveat+0xed/0x130 [ 484.674920][T31679] do_syscall_64+0x103/0x610 [ 484.679525][T31679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.685421][T31679] RIP: 0033:0x458da9 [ 484.689335][T31679] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.709048][T31679] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 484.717490][T31679] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 484.725462][T31679] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 14:38:07 executing program 0 (fault-call:4 fault-nth:27): r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 484.733441][T31679] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 484.741416][T31679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 484.749390][T31679] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:07 executing program 1 (fault-call:8 fault-nth:8): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:07 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) 14:38:07 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 484.995781][T31797] FAULT_INJECTION: forcing a failure. [ 484.995781][T31797] name failslab, interval 1, probability 0, space 0, times 0 [ 485.008610][T31797] CPU: 1 PID: 31797 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 485.016591][T31797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.026645][T31797] Call Trace: [ 485.029946][T31797] dump_stack+0x172/0x1f0 [ 485.034291][T31797] should_fail.cold+0xa/0x15 [ 485.038900][T31797] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:38:07 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:07 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) [ 485.044722][T31797] ? ___might_sleep+0x163/0x280 [ 485.049585][T31797] __should_failslab+0x121/0x190 [ 485.054535][T31797] should_failslab+0x9/0x14 [ 485.059050][T31797] __kmalloc+0x2dc/0x740 [ 485.063322][T31797] ? retint_kernel+0x2d/0x2d [ 485.067945][T31797] ? security_prepare_creds+0x123/0x190 [ 485.073503][T31797] security_prepare_creds+0x123/0x190 [ 485.078882][T31797] ? check_memory_region+0xc1/0x190 [ 485.084104][T31797] prepare_creds+0x2f5/0x3f0 [ 485.088715][T31797] prepare_exec_creds+0x12/0xf0 [ 485.093581][T31797] __do_execve_file.isra.0+0x393/0x23f0 [ 485.099130][T31797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 485.105395][T31797] ? __phys_addr_symbol+0x30/0x70 [ 485.110427][T31797] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 485.116175][T31797] ? __check_object_size+0x3d/0x42f [ 485.121411][T31797] ? copy_strings_kernel+0x110/0x110 [ 485.126706][T31797] ? strncpy_from_user+0x2a8/0x380 [ 485.131832][T31797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.138083][T31797] __x64_sys_execveat+0xed/0x130 [ 485.143039][T31797] do_syscall_64+0x103/0x610 [ 485.147639][T31797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.153538][T31797] RIP: 0033:0x458da9 [ 485.157478][T31797] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.177140][T31797] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 485.185592][T31797] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 14:38:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x81, 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/197, &(0x7f00000001c0)=0xc5) ioctl$TIOCSIG(r0, 0x40045436, 0x38) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) [ 485.193567][T31797] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 485.201539][T31797] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 485.209518][T31797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 485.220016][T31797] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:07 executing program 1 (fault-call:8 fault-nth:9): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:07 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 485.292515][T31806] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 485.309801][T31806] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 485.331526][T31806] FAT-fs (loop2): Filesystem has been set read-only 14:38:07 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) [ 485.419243][T31806] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 485.445917][T31806] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 485.483182][T31902] FAULT_INJECTION: forcing a failure. [ 485.483182][T31902] name failslab, interval 1, probability 0, space 0, times 0 [ 485.496367][T31902] CPU: 1 PID: 31902 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 485.504367][T31902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.514428][T31902] Call Trace: [ 485.517743][T31902] dump_stack+0x172/0x1f0 [ 485.522097][T31902] should_fail.cold+0xa/0x15 [ 485.526699][T31902] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:38:07 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80080000000, 0x80) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x10f, 0xfffffffffffffffd, 0x6, 0x9, 0x0, @broadcast}, 0x10) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:07 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x2, 0x2000) accept$alg(r0, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) [ 485.532609][T31902] ? ___might_sleep+0x163/0x280 [ 485.537466][T31902] __should_failslab+0x121/0x190 [ 485.542411][T31902] should_failslab+0x9/0x14 [ 485.546932][T31902] kmem_cache_alloc+0x2b2/0x6f0 [ 485.551794][T31902] ? kasan_check_read+0x11/0x20 [ 485.551817][T31902] __alloc_file+0x27/0x300 [ 485.551833][T31902] alloc_empty_file+0x72/0x170 [ 485.551855][T31902] path_openat+0xef/0x46e0 [ 485.551890][T31902] ? save_stack+0xa9/0xd0 [ 485.551914][T31902] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 485.551931][T31902] ? __kmalloc+0x15c/0x740 [ 485.551951][T31902] ? security_prepare_creds+0x123/0x190 [ 485.584455][T31902] ? prepare_creds+0x2f5/0x3f0 [ 485.594740][T31902] ? prepare_exec_creds+0x12/0xf0 [ 485.599786][T31902] ? __do_execve_file.isra.0+0x393/0x23f0 [ 485.605507][T31902] ? __x64_sys_execveat+0xed/0x130 [ 485.605524][T31902] ? do_syscall_64+0x103/0x610 [ 485.605540][T31902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.605560][T31902] ? __lock_acquire+0x548/0x3fb0 [ 485.626396][T31902] ? prepare_exec_creds+0x12/0xf0 [ 485.626418][T31902] do_filp_open+0x1a1/0x280 [ 485.635934][T31902] ? may_open_dev+0x100/0x100 [ 485.640652][T31902] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 485.640670][T31902] ? find_held_lock+0x35/0x130 [ 485.640709][T31902] ? mark_held_locks+0xa4/0xf0 [ 485.652426][T31806] FAT-fs (loop2): Filesystem has been set read-only [ 485.655839][T31902] ? debug_smp_processor_id+0x3c/0x280 [ 485.655858][T31902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 485.655878][T31902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 485.673345][T31902] ? lockdep_hardirqs_on+0x418/0x5d0 [ 485.673381][T31902] do_open_execat+0x137/0x690 [ 485.673401][T31902] ? unregister_binfmt+0x170/0x170 [ 485.673418][T31902] ? lock_downgrade+0x880/0x880 [ 485.673436][T31902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.673459][T31902] ? kasan_check_read+0x11/0x20 [ 485.688842][T31902] ? do_raw_spin_unlock+0x57/0x270 [ 485.688866][T31902] __do_execve_file.isra.0+0x178d/0x23f0 [ 485.688882][T31902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 485.688916][T31902] ? copy_strings_kernel+0x110/0x110 [ 485.688938][T31902] ? strncpy_from_user+0x2a8/0x380 [ 485.737709][T31902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.737733][T31902] __x64_sys_execveat+0xed/0x130 [ 485.737756][T31902] do_syscall_64+0x103/0x610 [ 485.737778][T31902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.737790][T31902] RIP: 0033:0x458da9 [ 485.737806][T31902] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 485.737815][T31902] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:08 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) 14:38:08 executing program 1 (fault-call:8 fault-nth:10): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:08 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) 14:38:08 executing program 5: lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "44799dd7643c30a65f4b7d5d7859e2497b80a3"}, 0x14, 0x1) prctl$PR_SET_TSC(0x1a, 0x2) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) 14:38:08 executing program 3: pipe(&(0x7f0000000080)) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) sysfs$1(0x1, &(0x7f00000000c0)='\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x8000, 0x4) [ 485.737830][T31902] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 485.737840][T31902] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 485.737849][T31902] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 485.737858][T31902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 485.737867][T31902] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 485.972130][T32037] FAULT_INJECTION: forcing a failure. [ 485.972130][T32037] name failslab, interval 1, probability 0, space 0, times 0 [ 485.984958][T32037] CPU: 1 PID: 32037 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 485.992980][T32037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.003042][T32037] Call Trace: [ 486.006361][T32037] dump_stack+0x172/0x1f0 [ 486.010709][T32037] should_fail.cold+0xa/0x15 [ 486.015315][T32037] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.021152][T32037] ? ___might_sleep+0x163/0x280 [ 486.026020][T32037] __should_failslab+0x121/0x190 [ 486.030965][T32037] should_failslab+0x9/0x14 [ 486.035478][T32037] kmem_cache_alloc+0x2b2/0x6f0 [ 486.040338][T32037] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.046078][T32037] ? kmem_cache_alloc+0x32e/0x6f0 [ 486.051114][T32037] security_file_alloc+0x39/0x170 [ 486.056156][T32037] __alloc_file+0xac/0x300 [ 486.060581][T32037] alloc_empty_file+0x72/0x170 [ 486.065367][T32037] path_openat+0xef/0x46e0 [ 486.069813][T32037] ? save_stack+0xa9/0xd0 [ 486.074149][T32037] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 486.079528][T32037] ? __kmalloc+0x15c/0x740 [ 486.083951][T32037] ? security_prepare_creds+0x123/0x190 [ 486.089501][T32037] ? prepare_creds+0x2f5/0x3f0 [ 486.094276][T32037] ? prepare_exec_creds+0x12/0xf0 [ 486.099306][T32037] ? __do_execve_file.isra.0+0x393/0x23f0 [ 486.105043][T32037] ? __x64_sys_execveat+0xed/0x130 [ 486.110166][T32037] ? do_syscall_64+0x103/0x610 [ 486.114945][T32037] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.121017][T32037] ? __lock_acquire+0x548/0x3fb0 [ 486.125963][T32037] ? prepare_exec_creds+0x12/0xf0 [ 486.131000][T32037] do_filp_open+0x1a1/0x280 [ 486.135510][T32037] ? may_open_dev+0x100/0x100 [ 486.140191][T32037] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 486.145827][T32037] ? find_held_lock+0x35/0x130 [ 486.150606][T32037] ? __lock_acquire+0x548/0x3fb0 [ 486.155550][T32037] ? debug_smp_processor_id+0x3c/0x280 [ 486.161016][T32037] ? debug_smp_processor_id+0x3c/0x280 [ 486.166500][T32037] do_open_execat+0x137/0x690 [ 486.171187][T32037] ? unregister_binfmt+0x170/0x170 [ 486.176311][T32037] ? lock_downgrade+0x880/0x880 [ 486.181175][T32037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.187421][T32037] ? kasan_check_read+0x11/0x20 [ 486.192280][T32037] ? do_raw_spin_unlock+0x57/0x270 [ 486.197402][T32037] __do_execve_file.isra.0+0x178d/0x23f0 [ 486.203045][T32037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 486.209313][T32037] ? copy_strings_kernel+0x110/0x110 [ 486.214611][T32037] ? strncpy_from_user+0x2a8/0x380 [ 486.219730][T32037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.225981][T32037] __x64_sys_execveat+0xed/0x130 [ 486.230933][T32037] do_syscall_64+0x103/0x610 [ 486.235538][T32037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.241431][T32037] RIP: 0033:0x458da9 [ 486.245327][T32037] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.264944][T32037] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:08 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) 14:38:08 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c) 14:38:08 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000080)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) mknod(&(0x7f0000000000)='./file0\x00', 0x8020, 0x3ff) 14:38:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000040)={0x6e}) fcntl$setstatus(r0, 0x4, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) tee(r2, r2, 0x200000000005, 0x8) 14:38:08 executing program 1 (fault-call:8 fault-nth:11): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 486.273371][T32037] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 486.281344][T32037] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 486.289326][T32037] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 486.297304][T32037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 486.305280][T32037] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:08 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074) [ 486.447008][T32152] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 486.465024][T32158] FAULT_INJECTION: forcing a failure. [ 486.465024][T32158] name failslab, interval 1, probability 0, space 0, times 0 [ 486.477790][T32158] CPU: 1 PID: 32158 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 486.478576][T32152] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 486.485767][T32158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.485775][T32158] Call Trace: [ 486.485803][T32158] dump_stack+0x172/0x1f0 [ 486.485832][T32158] should_fail.cold+0xa/0x15 [ 486.485857][T32158] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.485883][T32158] ? ___might_sleep+0x163/0x280 [ 486.528619][T32158] __should_failslab+0x121/0x190 [ 486.533567][T32158] should_failslab+0x9/0x14 [ 486.538081][T32158] __kmalloc_track_caller+0x2d8/0x740 [ 486.543459][T32158] ? pointer+0xa30/0xa30 [ 486.547704][T32158] ? sched_exec+0x1cc/0x260 [ 486.552206][T32158] ? kasprintf+0xbb/0xf0 [ 486.552224][T32158] kvasprintf+0xc8/0x170 [ 486.552239][T32158] ? bust_spinlocks+0xe0/0xe0 [ 486.552257][T32158] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 486.552269][T32158] ? sched_exec+0x1cc/0x260 [ 486.552289][T32158] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 486.556605][T32152] FAT-fs (loop2): Filesystem has been set read-only [ 486.560757][T32158] ? lockdep_hardirqs_on+0x418/0x5d0 [ 486.560776][T32158] kasprintf+0xbb/0xf0 [ 486.560794][T32158] ? kvasprintf_const+0x190/0x190 [ 486.575837][T32158] ? nr_iowait+0x130/0x130 [ 486.597526][T32158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.597547][T32158] ? kasan_check_read+0x11/0x20 [ 486.597571][T32158] __do_execve_file.isra.0+0x94b/0x23f0 [ 486.597592][T32158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 486.623612][T32158] ? copy_strings_kernel+0x110/0x110 [ 486.623629][T32158] ? strncpy_from_user+0x2a8/0x380 [ 486.623651][T32158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.623672][T32158] __x64_sys_execveat+0xed/0x130 [ 486.623695][T32158] do_syscall_64+0x103/0x610 [ 486.623717][T32158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.623729][T32158] RIP: 0033:0x458da9 [ 486.623745][T32158] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.623760][T32158] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 486.640364][T32158] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 486.640373][T32158] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 486.640382][T32158] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 486.640391][T32158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 486.640411][T32158] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 486.801226][T32152] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 486.810976][T32152] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 486.828214][T32152] FAT-fs (loop2): Filesystem has been set read-only 14:38:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:09 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/206, &(0x7f0000000100)=0xce) 14:38:09 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) getgid() r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x400000, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000200)={0x9d, 0x8dd8, 0x1}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000003c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = fcntl$dupfd(r0, 0x406, r2) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000180)={0x8}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x6}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0x4, 0x1, 0x5, 0x5, 0x8, 0x3, 0x40a0, r5}, &(0x7f0000000300)=0x20) write$P9_RSTAT(r3, &(0x7f0000000340)={0x64, 0x7d, 0x2, {0x0, 0x5d, 0xffff, 0x400, {0x80, 0x2, 0x4}, 0x24010000, 0x4, 0x9, 0x9, 0xb, '/dev/audio\x00', 0x9, 'nodev]GPL', 0xb, '/dev/audio\x00', 0xb, '/dev/audio\x00'}}, 0x64) 14:38:09 executing program 1 (fault-call:8 fault-nth:12): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:09 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) 14:38:09 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a) 14:38:09 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)=0x1) [ 487.040268][T32275] FAULT_INJECTION: forcing a failure. [ 487.040268][T32275] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.054740][T32275] CPU: 1 PID: 32275 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 487.062736][T32275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.072797][T32275] Call Trace: [ 487.076106][T32275] dump_stack+0x172/0x1f0 [ 487.080471][T32275] should_fail.cold+0xa/0x15 [ 487.085081][T32275] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.090925][T32275] ? ___might_sleep+0x163/0x280 [ 487.095794][T32275] should_fail_alloc_page+0x50/0x60 [ 487.100996][T32275] __alloc_pages_nodemask+0x1a1/0x8d0 [ 487.106384][T32275] ? debug_smp_processor_id+0x3c/0x280 [ 487.111855][T32275] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 487.117602][T32275] ? mark_held_locks+0xa4/0xf0 [ 487.122381][T32275] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 487.127845][T32275] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 487.134096][T32275] alloc_pages_current+0x107/0x210 14:38:09 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 487.139220][T32275] __get_free_pages+0xc/0x40 [ 487.143818][T32275] pgd_alloc+0x8b/0x3f0 [ 487.147983][T32275] ? pgd_page_get_mm+0x40/0x40 [ 487.152758][T32275] ? lockdep_init_map+0x1be/0x6d0 [ 487.157788][T32275] ? lockdep_init_map+0x1be/0x6d0 [ 487.162828][T32275] mm_init+0x590/0x9b0 [ 487.166907][T32275] ? mmput+0x4c0/0x4c0 [ 487.170995][T32275] mm_alloc+0xa6/0xd0 [ 487.174991][T32275] __do_execve_file.isra.0+0xaa3/0x23f0 [ 487.180549][T32275] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.186815][T32275] ? copy_strings_kernel+0x110/0x110 [ 487.192108][T32275] ? strncpy_from_user+0x2a8/0x380 [ 487.197230][T32275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.203480][T32275] __x64_sys_execveat+0xed/0x130 [ 487.208431][T32275] do_syscall_64+0x103/0x610 [ 487.213033][T32275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.218963][T32275] RIP: 0033:0x458da9 [ 487.222890][T32275] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.244510][T32275] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 487.252932][T32275] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 487.262174][T32275] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 487.270146][T32275] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 487.278146][T32275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 14:38:09 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) 14:38:09 executing program 1 (fault-call:8 fault-nth:13): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:09 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) connect$rose(r0, &(0x7f0000000000)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) [ 487.286122][T32275] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 487.432490][T32294] FAULT_INJECTION: forcing a failure. [ 487.432490][T32294] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 487.445941][T32294] CPU: 1 PID: 32294 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 487.453928][T32294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.463991][T32294] Call Trace: [ 487.467301][T32294] dump_stack+0x172/0x1f0 [ 487.471646][T32294] should_fail.cold+0xa/0x15 [ 487.476256][T32294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.482078][T32294] ? ___might_sleep+0x163/0x280 [ 487.486949][T32294] should_fail_alloc_page+0x50/0x60 [ 487.492154][T32294] __alloc_pages_nodemask+0x1a1/0x8d0 [ 487.497577][T32294] ? debug_smp_processor_id+0x3c/0x280 [ 487.503052][T32294] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 487.508793][T32294] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 487.514259][T32294] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 487.519726][T32294] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 487.525981][T32294] alloc_pages_current+0x107/0x210 [ 487.531102][T32294] __get_free_pages+0xc/0x40 [ 487.535700][T32294] pgd_alloc+0x8b/0x3f0 [ 487.539864][T32294] ? pgd_page_get_mm+0x40/0x40 [ 487.544639][T32294] ? lockdep_init_map+0x1be/0x6d0 [ 487.549666][T32294] ? lockdep_init_map+0x1be/0x6d0 [ 487.554705][T32294] mm_init+0x590/0x9b0 [ 487.558782][T32294] mm_alloc+0xa6/0xd0 [ 487.562776][T32294] __do_execve_file.isra.0+0xaa3/0x23f0 [ 487.568326][T32294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 487.574598][T32294] ? copy_strings_kernel+0x110/0x110 [ 487.579888][T32294] ? strncpy_from_user+0x2a8/0x380 [ 487.585016][T32294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.591271][T32294] __x64_sys_execveat+0xed/0x130 [ 487.596219][T32294] do_syscall_64+0x103/0x610 [ 487.600824][T32294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.606719][T32294] RIP: 0033:0x458da9 [ 487.610617][T32294] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:38:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:10 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) 14:38:10 executing program 1 (fault-call:8 fault-nth:14): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 487.630320][T32294] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 487.638749][T32294] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 487.646723][T32294] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 487.654700][T32294] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 487.662674][T32294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 487.670647][T32294] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:10 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200) 14:38:10 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) getsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 14:38:10 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) [ 487.798495][T32316] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 487.812128][T32316] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:38:10 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x40}) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x10000, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f00000000c0)=""/180) ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f0000000000)) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) [ 487.860753][T32316] FAT-fs (loop2): Filesystem has been set read-only [ 487.880692][T32384] FAULT_INJECTION: forcing a failure. [ 487.880692][T32384] name failslab, interval 1, probability 0, space 0, times 0 [ 487.893572][T32384] CPU: 1 PID: 32384 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 14:38:10 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000080)=""/102, 0x66) ioctl$SIOCRSACCEPT(r0, 0x89e3) [ 487.901555][T32384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.911613][T32384] Call Trace: [ 487.914928][T32384] dump_stack+0x172/0x1f0 [ 487.919274][T32384] should_fail.cold+0xa/0x15 [ 487.923877][T32384] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.929700][T32384] ? ___might_sleep+0x163/0x280 [ 487.934565][T32384] __should_failslab+0x121/0x190 [ 487.939516][T32384] should_failslab+0x9/0x14 [ 487.944029][T32384] kmem_cache_alloc+0x2b2/0x6f0 [ 487.948914][T32384] vm_area_alloc+0x20/0x110 [ 487.953434][T32384] __do_execve_file.isra.0+0xc34/0x23f0 [ 487.953465][T32384] ? copy_strings_kernel+0x110/0x110 [ 487.953481][T32384] ? strncpy_from_user+0x2a8/0x380 [ 487.953501][T32384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.953522][T32384] __x64_sys_execveat+0xed/0x130 [ 487.953544][T32384] do_syscall_64+0x103/0x610 [ 487.953572][T32384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.964388][T32384] RIP: 0033:0x458da9 [ 487.964404][T32384] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.964412][T32384] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 487.964428][T32384] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 487.964437][T32384] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 487.964446][T32384] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 487.964456][T32384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 14:38:10 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x1, 0x10, 0x100000000, 0x7918}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x200000000000000, 0x30}, 0xfffffffffffffcdc) 14:38:10 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00) [ 487.964465][T32384] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:10 executing program 1 (fault-call:8 fault-nth:15): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 488.112977][T32316] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:38:10 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x100) [ 488.167712][T32316] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 488.180900][T32531] FAULT_INJECTION: forcing a failure. [ 488.180900][T32531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 488.194418][T32531] CPU: 1 PID: 32531 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 488.197720][T32316] FAT-fs (loop2): Filesystem has been set read-only [ 488.202395][T32531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.202403][T32531] Call Trace: [ 488.202430][T32531] dump_stack+0x172/0x1f0 [ 488.202457][T32531] should_fail.cold+0xa/0x15 [ 488.202479][T32531] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.237144][T32531] ? ___might_sleep+0x163/0x280 [ 488.242003][T32531] should_fail_alloc_page+0x50/0x60 [ 488.247203][T32531] __alloc_pages_nodemask+0x1a1/0x8d0 [ 488.252571][T32531] ? mark_held_locks+0xa4/0xf0 [ 488.257341][T32531] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 488.263071][T32531] ? lockdep_hardirqs_on+0x418/0x5d0 [ 488.268361][T32531] ? retint_kernel+0x2d/0x2d [ 488.272954][T32531] ? touch_atime+0x1b3/0x2a0 [ 488.277540][T32531] ? find_held_lock+0x35/0x130 [ 488.282306][T32531] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 488.288574][T32531] alloc_pages_current+0x107/0x210 [ 488.293698][T32531] get_zeroed_page+0x14/0x50 [ 488.298285][T32531] __pud_alloc+0x3b/0x250 [ 488.302618][T32531] __handle_mm_fault+0x7a5/0x3ec0 [ 488.307651][T32531] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 488.313196][T32531] ? find_held_lock+0x35/0x130 [ 488.317958][T32531] ? handle_mm_fault+0x322/0xb30 [ 488.322912][T32531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.329154][T32531] ? kasan_check_read+0x11/0x20 [ 488.334010][T32531] handle_mm_fault+0x43f/0xb30 [ 488.338782][T32531] __get_user_pages+0x7b6/0x1a40 [ 488.343733][T32531] ? follow_page_mask+0x19a0/0x19a0 [ 488.348939][T32531] ? retint_kernel+0x2d/0x2d [ 488.353556][T32531] get_user_pages_remote+0x21d/0x440 [ 488.358854][T32531] copy_strings.isra.0+0x3dc/0x890 [ 488.363993][T32531] ? remove_arg_zero+0x590/0x590 [ 488.368930][T32531] ? prepare_binprm+0x6aa/0x940 [ 488.373778][T32531] ? lock_downgrade+0x880/0x880 [ 488.378624][T32531] ? vma_link+0x117/0x180 [ 488.382954][T32531] ? install_exec_creds+0x180/0x180 [ 488.389138][T32531] copy_strings_kernel+0xa5/0x110 [ 488.394172][T32531] __do_execve_file.isra.0+0x10ef/0x23f0 [ 488.399813][T32531] ? copy_strings_kernel+0x110/0x110 [ 488.405094][T32531] ? strncpy_from_user+0x2a8/0x380 [ 488.410213][T32531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.416460][T32531] __x64_sys_execveat+0xed/0x130 [ 488.421401][T32531] do_syscall_64+0x103/0x610 [ 488.425998][T32531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.431883][T32531] RIP: 0033:0x458da9 [ 488.435783][T32531] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.455390][T32531] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 488.463799][T32531] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 488.471761][T32531] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 488.479727][T32531] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 488.487692][T32531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 488.495662][T32531] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:11 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000) 14:38:11 executing program 5: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2d, 0x7303a50ad3cb4b31) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:11 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) 14:38:11 executing program 1 (fault-call:8 fault-nth:16): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:11 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1, 0x8, [@multicast1, @local, @multicast1, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x30) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 488.721741][T32543] FAULT_INJECTION: forcing a failure. [ 488.721741][T32543] name failslab, interval 1, probability 0, space 0, times 0 [ 488.737000][T32543] CPU: 0 PID: 32543 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 488.744990][T32543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.755141][T32543] Call Trace: [ 488.758462][T32543] dump_stack+0x172/0x1f0 [ 488.762816][T32543] should_fail.cold+0xa/0x15 [ 488.767428][T32543] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.773266][T32543] ? ___might_sleep+0x163/0x280 [ 488.778130][T32543] __should_failslab+0x121/0x190 [ 488.783077][T32543] should_failslab+0x9/0x14 [ 488.787591][T32543] kmem_cache_alloc+0x2b2/0x6f0 [ 488.792473][T32543] ? alloc_pages_current+0x10f/0x210 [ 488.797774][T32543] __pmd_alloc+0xc9/0x460 [ 488.802113][T32543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 488.808372][T32543] __handle_mm_fault+0x192a/0x3ec0 [ 488.813508][T32543] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 488.819058][T32543] ? find_held_lock+0x35/0x130 [ 488.823834][T32543] ? handle_mm_fault+0x322/0xb30 [ 488.828792][T32543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.828815][T32543] ? kasan_check_read+0x11/0x20 [ 488.828837][T32543] handle_mm_fault+0x43f/0xb30 [ 488.828858][T32543] __get_user_pages+0x7b6/0x1a40 [ 488.839943][T32543] ? follow_page_mask+0x19a0/0x19a0 [ 488.839979][T32543] get_user_pages_remote+0x21d/0x440 [ 488.840008][T32543] copy_strings.isra.0+0x3dc/0x890 [ 488.865335][T32543] ? remove_arg_zero+0x590/0x590 [ 488.870304][T32543] ? prepare_binprm+0x6aa/0x940 [ 488.875190][T32543] ? retint_kernel+0x2d/0x2d [ 488.879875][T32543] ? install_exec_creds+0x180/0x180 [ 488.885085][T32543] copy_strings_kernel+0xa5/0x110 [ 488.890126][T32543] __do_execve_file.isra.0+0x10ef/0x23f0 [ 488.895781][T32543] ? copy_strings_kernel+0x110/0x110 [ 488.901074][T32543] ? strncpy_from_user+0x2a8/0x380 [ 488.906198][T32543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.912447][T32543] __x64_sys_execveat+0xed/0x130 [ 488.917412][T32543] do_syscall_64+0x103/0x610 [ 488.922012][T32543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.927906][T32543] RIP: 0033:0x458da9 [ 488.931805][T32543] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.951430][T32543] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 488.959850][T32543] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 14:38:11 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) 14:38:11 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) 14:38:11 executing program 3: prctl$PR_GET_TIMERSLACK(0x1e) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xfffffffffffffffe, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000040)={0x6, 0x1, 0x5, {0x7fff, 0xc56, 0x5ca3, 0x5}}) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100)=0x101, 0x4) getpeername$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c) fstat(r1, &(0x7f0000000080)) 14:38:11 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4c46) [ 488.967827][T32543] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 488.975800][T32543] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 488.983783][T32543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 488.991758][T32543] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:11 executing program 1 (fault-call:8 fault-nth:17): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 489.067065][T32566] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 489.096897][T32566] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:38:11 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x100, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpus\xf0\xc7d\vffective_m\x03:\xc9\xb7', 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e2) ioctl$KDADDIO(r2, 0x4b34, 0x66f8) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000140)) [ 489.147183][T32566] FAT-fs (loop2): Filesystem has been set read-only [ 489.199623][T32665] FAULT_INJECTION: forcing a failure. [ 489.199623][T32665] name failslab, interval 1, probability 0, space 0, times 0 [ 489.221169][T32665] CPU: 0 PID: 32665 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 489.229175][T32665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.239243][T32665] Call Trace: [ 489.242561][T32665] dump_stack+0x172/0x1f0 [ 489.246903][T32665] should_fail.cold+0xa/0x15 [ 489.251506][T32665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.258803][T32665] ? ___might_sleep+0x163/0x280 [ 489.263666][T32665] __should_failslab+0x121/0x190 [ 489.268607][T32665] should_failslab+0x9/0x14 [ 489.273117][T32665] kmem_cache_alloc+0x2b2/0x6f0 [ 489.277975][T32665] ? alloc_pages_current+0x10f/0x210 [ 489.283277][T32665] __pmd_alloc+0xc9/0x460 [ 489.287617][T32665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.293875][T32665] __handle_mm_fault+0x192a/0x3ec0 [ 489.299007][T32665] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 489.304565][T32665] ? find_held_lock+0x35/0x130 [ 489.309339][T32665] ? handle_mm_fault+0x322/0xb30 [ 489.314306][T32665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.320556][T32665] ? kasan_check_read+0x11/0x20 [ 489.325425][T32665] handle_mm_fault+0x43f/0xb30 [ 489.330201][T32665] __get_user_pages+0x7b6/0x1a40 [ 489.335172][T32665] ? follow_page_mask+0x19a0/0x19a0 [ 489.340405][T32665] get_user_pages_remote+0x21d/0x440 [ 489.345713][T32665] copy_strings.isra.0+0x3dc/0x890 [ 489.350838][T32665] ? remove_arg_zero+0x590/0x590 [ 489.355778][T32665] ? prepare_binprm+0x6aa/0x940 [ 489.360636][T32665] ? lock_downgrade+0x880/0x880 [ 489.365490][T32665] ? vma_link+0x117/0x180 [ 489.369834][T32665] ? install_exec_creds+0x180/0x180 [ 489.375043][T32665] copy_strings_kernel+0xa5/0x110 [ 489.380079][T32665] __do_execve_file.isra.0+0x10ef/0x23f0 [ 489.385731][T32665] ? copy_strings_kernel+0x110/0x110 [ 489.391016][T32665] ? strncpy_from_user+0x2a8/0x380 [ 489.396133][T32665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.402401][T32665] __x64_sys_execveat+0xed/0x130 [ 489.407358][T32665] do_syscall_64+0x103/0x610 [ 489.411965][T32665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.418029][T32665] RIP: 0033:0x458da9 [ 489.421925][T32665] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.441531][T32665] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 489.449948][T32665] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 489.457920][T32665] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 489.465905][T32665] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 489.473889][T32665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 489.481865][T32665] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 489.585780][T32667] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 489.604804][T32667] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 489.630467][T32667] FAT-fs (loop2): Filesystem has been set read-only 14:38:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:12 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040), 0x10) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:12 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xff00) 14:38:12 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) 14:38:12 executing program 1 (fault-call:8 fault-nth:18): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:12 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x121881, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000040)={0x5, 0x5, 0x3, 0x4, 0x7f}) [ 489.766553][ T308] FAULT_INJECTION: forcing a failure. [ 489.766553][ T308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.780366][ T308] CPU: 1 PID: 308 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 489.788181][ T308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.798242][ T308] Call Trace: [ 489.801547][ T308] dump_stack+0x172/0x1f0 [ 489.805890][ T308] should_fail.cold+0xa/0x15 [ 489.810497][ T308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.816315][ T308] ? ___might_sleep+0x163/0x280 [ 489.821198][ T308] should_fail_alloc_page+0x50/0x60 [ 489.826402][ T308] __alloc_pages_nodemask+0x1a1/0x8d0 [ 489.831782][ T308] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 489.837523][ T308] ? kasan_check_write+0x14/0x20 [ 489.842473][ T308] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 489.848725][ T308] alloc_pages_current+0x107/0x210 [ 489.853849][ T308] pte_alloc_one+0x1b/0x1a0 [ 489.858374][ T308] __pte_alloc+0x20/0x310 [ 489.862722][ T308] __handle_mm_fault+0x3391/0x3ec0 [ 489.867849][ T308] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 489.873407][ T308] ? find_held_lock+0x35/0x130 [ 489.878184][ T308] ? handle_mm_fault+0x322/0xb30 [ 489.883145][ T308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.889399][ T308] ? kasan_check_read+0x11/0x20 [ 489.894270][ T308] handle_mm_fault+0x43f/0xb30 [ 489.899049][ T308] __get_user_pages+0x7b6/0x1a40 [ 489.904007][ T308] ? follow_page_mask+0x19a0/0x19a0 [ 489.909229][ T308] get_user_pages_remote+0x21d/0x440 [ 489.914535][ T308] copy_strings.isra.0+0x3dc/0x890 [ 489.919666][ T308] ? remove_arg_zero+0x590/0x590 [ 489.924610][ T308] ? prepare_binprm+0x6aa/0x940 [ 489.929470][ T308] ? lock_downgrade+0x880/0x880 [ 489.934326][ T308] ? vma_link+0x117/0x180 [ 489.938671][ T308] ? install_exec_creds+0x180/0x180 [ 489.943877][ T308] copy_strings_kernel+0xa5/0x110 [ 489.948932][ T308] __do_execve_file.isra.0+0x10ef/0x23f0 [ 489.954585][ T308] ? copy_strings_kernel+0x110/0x110 [ 489.959883][ T308] ? strncpy_from_user+0x2a8/0x380 [ 489.965009][ T308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 489.971262][ T308] __x64_sys_execveat+0xed/0x130 [ 489.976220][ T308] do_syscall_64+0x103/0x610 [ 489.980823][ T308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.986717][ T308] RIP: 0033:0x458da9 [ 489.990618][ T308] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:38:12 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:12 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) 14:38:12 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000180)={r3, r0, 0x6}) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00', 0x2) fcntl$getownex(r3, 0x10, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:12 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x101000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040)) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 490.010230][ T308] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 490.018648][ T308] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 490.026625][ T308] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 490.034606][ T308] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 490.042581][ T308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 490.050559][ T308] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:12 executing program 1 (fault-call:8 fault-nth:19): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 490.121187][ T419] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 490.143272][ T419] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:38:12 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'team0\x00', r1}) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x8, {0xffffffffffff0000}}, 0x18) [ 490.173949][ T419] FAT-fs (loop2): Filesystem has been set read-only [ 490.244377][ T437] FAULT_INJECTION: forcing a failure. [ 490.244377][ T437] name failslab, interval 1, probability 0, space 0, times 0 [ 490.257273][ T437] CPU: 1 PID: 437 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 490.265082][ T437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.275149][ T437] Call Trace: [ 490.278505][ T437] dump_stack+0x172/0x1f0 [ 490.282853][ T437] should_fail.cold+0xa/0x15 [ 490.287474][ T437] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.293294][ T437] ? ___might_sleep+0x163/0x280 [ 490.298158][ T437] __should_failslab+0x121/0x190 [ 490.303101][ T437] should_failslab+0x9/0x14 [ 490.307700][ T437] kmem_cache_alloc+0x2b2/0x6f0 [ 490.312568][ T437] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 490.318832][ T437] ptlock_alloc+0x20/0x70 [ 490.323185][ T437] pte_alloc_one+0x6d/0x1a0 [ 490.327697][ T437] __pte_alloc+0x20/0x310 [ 490.332041][ T437] __handle_mm_fault+0x3391/0x3ec0 [ 490.337270][ T437] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 490.342837][ T437] ? find_held_lock+0x35/0x130 [ 490.347615][ T437] ? handle_mm_fault+0x322/0xb30 [ 490.352579][ T437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.358845][ T437] ? kasan_check_read+0x11/0x20 [ 490.363709][ T437] handle_mm_fault+0x43f/0xb30 [ 490.368496][ T437] __get_user_pages+0x7b6/0x1a40 [ 490.373462][ T437] ? follow_page_mask+0x19a0/0x19a0 [ 490.378675][ T437] ? tomoyo_load_policy+0xc9/0x268 [ 490.383807][ T437] get_user_pages_remote+0x21d/0x440 [ 490.390648][ T437] copy_strings.isra.0+0x3dc/0x890 [ 490.395784][ T437] ? remove_arg_zero+0x590/0x590 [ 490.400741][ T437] ? prepare_binprm+0x6aa/0x940 [ 490.405613][ T437] ? lock_downgrade+0x880/0x880 [ 490.410471][ T437] ? vma_link+0x117/0x180 [ 490.414902][ T437] ? install_exec_creds+0x180/0x180 [ 490.420113][ T437] copy_strings_kernel+0xa5/0x110 [ 490.425158][ T437] __do_execve_file.isra.0+0x10ef/0x23f0 [ 490.430840][ T437] ? copy_strings_kernel+0x110/0x110 [ 490.436134][ T437] ? strncpy_from_user+0x2a8/0x380 [ 490.441260][ T437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.447517][ T437] __x64_sys_execveat+0xed/0x130 [ 490.452472][ T437] do_syscall_64+0x103/0x610 [ 490.457071][ T437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.463059][ T437] RIP: 0033:0x458da9 [ 490.466960][ T437] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.486581][ T437] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 490.495004][ T437] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 490.502977][ T437] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 490.511036][ T437] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 490.519010][ T437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 490.526988][ T437] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 490.591998][ T419] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 490.612841][ T419] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 490.612857][ T419] FAT-fs (loop2): Filesystem has been set read-only 14:38:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:13 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000000c0)={{0x2, @loopback, 0x4e23, 0x1, 'lc\x00', 0x10, 0xffff, 0x78}, {@loopback, 0x4e24, 0x4, 0xc8a, 0xffffffff80000000, 0x40}}, 0x44) 14:38:13 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x105000) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000180)=0x100fe) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) 14:38:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) 14:38:13 executing program 1 (fault-call:8 fault-nth:20): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:13 executing program 3: syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x16ab, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x800], 0x1, 0x8, 0xbf, 0x8, 0x180, 0x8, {0x80000000, 0x200, 0x8, 0xffffffffffffffff, 0x9, 0x10000, 0x5, 0x3153, 0x3, 0x2, 0x7fff, 0x1ff, 0x2cf3, 0x2, "243ba6a1b7d233478f978f1de7db6352819e666eeb58c08a7c3cd7a16e48a921"}}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 490.771668][ T544] FAULT_INJECTION: forcing a failure. [ 490.771668][ T544] name failslab, interval 1, probability 0, space 0, times 0 [ 490.784524][ T544] CPU: 0 PID: 544 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 490.792343][ T544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.802416][ T544] Call Trace: [ 490.805724][ T544] dump_stack+0x172/0x1f0 [ 490.810073][ T544] should_fail.cold+0xa/0x15 [ 490.814680][ T544] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.820504][ T544] ? ___might_sleep+0x163/0x280 [ 490.825382][ T544] __should_failslab+0x121/0x190 [ 490.830336][ T544] should_failslab+0x9/0x14 [ 490.834860][ T544] kmem_cache_alloc+0x2b2/0x6f0 [ 490.839724][ T544] ? __might_sleep+0x95/0x190 [ 490.844424][ T544] __anon_vma_prepare+0x62/0x3c0 [ 490.849383][ T544] ? __pte_alloc+0x1ba/0x310 [ 490.853995][ T544] __handle_mm_fault+0x34db/0x3ec0 [ 490.859120][ T544] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 490.864707][ T544] ? find_held_lock+0x35/0x130 [ 490.869588][ T544] ? handle_mm_fault+0x322/0xb30 [ 490.874552][ T544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.880805][ T544] ? kasan_check_read+0x11/0x20 [ 490.885672][ T544] handle_mm_fault+0x43f/0xb30 [ 490.890448][ T544] __get_user_pages+0x7b6/0x1a40 [ 490.895415][ T544] ? follow_page_mask+0x19a0/0x19a0 [ 490.900638][ T544] get_user_pages_remote+0x21d/0x440 [ 490.905948][ T544] copy_strings.isra.0+0x3dc/0x890 [ 490.911080][ T544] ? remove_arg_zero+0x590/0x590 [ 490.916021][ T544] ? prepare_binprm+0x6aa/0x940 [ 490.920874][ T544] ? lock_downgrade+0x880/0x880 [ 490.925728][ T544] ? vma_link+0x117/0x180 [ 490.930062][ T544] ? install_exec_creds+0x180/0x180 [ 490.935271][ T544] copy_strings_kernel+0xa5/0x110 [ 490.940312][ T544] __do_execve_file.isra.0+0x10ef/0x23f0 [ 490.945967][ T544] ? copy_strings_kernel+0x110/0x110 [ 490.951343][ T544] ? strncpy_from_user+0x2a8/0x380 [ 490.956475][ T544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.962761][ T544] __x64_sys_execveat+0xed/0x130 [ 490.967715][ T544] do_syscall_64+0x103/0x610 [ 490.972317][ T544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.978219][ T544] RIP: 0033:0x458da9 [ 490.982118][ T544] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.001723][ T544] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 491.010142][ T544] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 14:38:13 executing program 1 (fault-call:8 fault-nth:21): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 491.018200][ T544] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 491.026173][ T544] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 491.034147][ T544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 491.042118][ T544] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:13 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$RTC_AIE_OFF(r0, 0x7002) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8268}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) 14:38:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) 14:38:13 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) 14:38:13 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) [ 491.209388][ T656] FAULT_INJECTION: forcing a failure. [ 491.209388][ T656] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 491.223043][ T656] CPU: 1 PID: 656 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 491.238178][ T656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.248240][ T656] Call Trace: [ 491.251552][ T656] dump_stack+0x172/0x1f0 [ 491.256682][ T656] should_fail.cold+0xa/0x15 [ 491.256699][ T656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.256710][ T656] ? ___might_sleep+0x163/0x280 [ 491.256724][ T656] should_fail_alloc_page+0x50/0x60 [ 491.256733][ T656] __alloc_pages_nodemask+0x1a1/0x8d0 [ 491.256743][ T656] ? __anon_vma_prepare+0x184/0x3c0 [ 491.256754][ T656] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 491.256769][ T656] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 491.256777][ T656] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 491.256789][ T656] alloc_pages_vma+0xdd/0x540 [ 491.256802][ T656] __handle_mm_fault+0x1dd4/0x3ec0 [ 491.256815][ T656] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 491.256824][ T656] ? find_held_lock+0x35/0x130 [ 491.256834][ T656] ? handle_mm_fault+0x322/0xb30 [ 491.256847][ T656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.256858][ T656] ? kasan_check_read+0x11/0x20 [ 491.256869][ T656] handle_mm_fault+0x43f/0xb30 [ 491.256881][ T656] __get_user_pages+0x7b6/0x1a40 [ 491.256901][ T656] ? follow_page_mask+0x19a0/0x19a0 14:38:13 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='$\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='em1/.-\xb1\x00'], &(0x7f0000000280)=[&(0x7f00000001c0)='\x00\x00\x06\x00', &(0x7f0000000200)='mime_type\x00', &(0x7f0000000240)='wlan1md5sum\x00']) [ 491.256919][ T656] get_user_pages_remote+0x21d/0x440 [ 491.256935][ T656] copy_strings.isra.0+0x3dc/0x890 [ 491.256950][ T656] ? remove_arg_zero+0x590/0x590 [ 491.256958][ T656] ? prepare_binprm+0x6aa/0x940 [ 491.256966][ T656] ? lock_downgrade+0x880/0x880 [ 491.256973][ T656] ? vma_link+0x117/0x180 [ 491.256982][ T656] ? install_exec_creds+0x180/0x180 [ 491.256993][ T656] copy_strings_kernel+0xa5/0x110 [ 491.257004][ T656] __do_execve_file.isra.0+0x10ef/0x23f0 [ 491.257019][ T656] ? copy_strings_kernel+0x110/0x110 [ 491.257027][ T656] ? strncpy_from_user+0x2a8/0x380 [ 491.257038][ T656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.257050][ T656] __x64_sys_execveat+0xed/0x130 [ 491.257062][ T656] do_syscall_64+0x103/0x610 [ 491.257073][ T656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.257081][ T656] RIP: 0033:0x458da9 [ 491.257090][ T656] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.257095][ T656] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 491.257104][ T656] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 491.257109][ T656] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 491.257114][ T656] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 491.257119][ T656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 491.257124][ T656] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 491.406733][ T658] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 491.521888][ T658] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 491.535573][ T658] FAT-fs (loop2): Filesystem has been set read-only [ 491.601039][ T658] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 491.612028][ T658] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 491.622439][ T658] FAT-fs (loop2): Filesystem has been set read-only 14:38:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:14 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) inotify_rm_watch(r1, r2) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb4, 0x8000) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:14 executing program 1 (fault-call:8 fault-nth:22): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:14 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) 14:38:14 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/217, &(0x7f0000000140)=0xd9) 14:38:14 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00', 0xffffffffffffffff) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) fcntl$addseals(r0, 0x409, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 491.775694][ T783] FAULT_INJECTION: forcing a failure. [ 491.775694][ T783] name failslab, interval 1, probability 0, space 0, times 0 [ 491.788774][ T783] CPU: 0 PID: 783 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 491.796600][ T783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.806666][ T783] Call Trace: [ 491.809981][ T783] dump_stack+0x172/0x1f0 [ 491.814335][ T783] should_fail.cold+0xa/0x15 [ 491.814370][ T783] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:38:14 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x80) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv4_newaddr={0x48, 0x14, 0xd3db04f82fecfbe1, 0x70bd28, 0x25dfdbfb, {0x2, 0x10, 0x420, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x80000000, 0x8, 0x800}}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffffffd, 0xfffffffffffffffa, 0xe594}}, @IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x48}}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 491.814405][ T783] ? ___might_sleep+0x163/0x280 [ 491.814436][ T783] __should_failslab+0x121/0x190 [ 491.834591][ T783] should_failslab+0x9/0x14 [ 491.839108][ T783] kmem_cache_alloc+0x2b2/0x6f0 [ 491.839130][ T783] ? __anon_vma_prepare+0x73/0x3c0 [ 491.839159][ T783] __anon_vma_prepare+0x1b1/0x3c0 [ 491.854113][ T783] ? __pte_alloc+0x1ba/0x310 [ 491.858716][ T783] __handle_mm_fault+0x34db/0x3ec0 [ 491.863842][ T783] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 491.869406][ T783] ? find_held_lock+0x35/0x130 14:38:14 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x10000008000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x5, 0x11, 0x14, 0x5, 0x0, 0x0, 0x1, 0xf6, 0x1}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x10000, 0x0) [ 491.873726][ T833] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 491.874181][ T783] ? handle_mm_fault+0x322/0xb30 [ 491.888144][ T783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.894419][ T783] ? kasan_check_read+0x11/0x20 [ 491.899296][ T783] handle_mm_fault+0x43f/0xb30 [ 491.902025][ T833] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 491.904073][ T783] __get_user_pages+0x7b6/0x1a40 [ 491.904104][ T783] ? follow_page_mask+0x19a0/0x19a0 [ 491.904126][ T783] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 491.904151][ T783] get_user_pages_remote+0x21d/0x440 [ 491.935135][ T783] copy_strings.isra.0+0x3dc/0x890 [ 491.936671][ T833] FAT-fs (loop2): Filesystem has been set read-only [ 491.940265][ T783] ? remove_arg_zero+0x590/0x590 [ 491.940282][ T783] ? prepare_binprm+0x6aa/0x940 [ 491.940299][ T783] ? lock_downgrade+0x880/0x880 [ 491.940318][ T783] ? vma_link+0x117/0x180 [ 491.965889][ T783] ? install_exec_creds+0x180/0x180 [ 491.971099][ T783] copy_strings_kernel+0xa5/0x110 14:38:14 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000005374f8e33d6480ccb9030038081f000000000000000000000020000200"/46], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc8, r2, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8b2}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x90}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff75}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x4004000) [ 491.976141][ T783] __do_execve_file.isra.0+0x10ef/0x23f0 [ 491.981793][ T783] ? copy_strings_kernel+0x110/0x110 [ 491.987085][ T783] ? strncpy_from_user+0x2a8/0x380 [ 491.992208][ T783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.998468][ T783] __x64_sys_execveat+0xed/0x130 [ 492.003431][ T783] do_syscall_64+0x103/0x610 [ 492.008040][ T783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.013935][ T783] RIP: 0033:0x458da9 14:38:14 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x400, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x0, 0x2, 0x0, "49e13a72c583f2457b15845d4b659ceea636197563c71bf187dbcece48c112748aaac11a5caab816d541a0f36bd85239dea9009dd0d655e644a3900a9e8e00fb97b5be0217b67f0da4a68de2ef1a429d"}, 0xd8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x14000, 0x0) bind(r2, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x3, @loopback}}, 0x80) r3 = dup(r0) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000000)) [ 492.017832][ T783] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.037463][ T783] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 492.037480][ T783] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 492.037489][ T783] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 492.037498][ T783] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 14:38:14 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) 14:38:14 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x400445a0, &(0x7f00000000c0)=""/160) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x280000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000040)={0x9}, 0x1) dup(r0) [ 492.037508][ T783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 492.037517][ T783] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 492.144824][ T833] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 492.173046][ T833] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 492.202277][ T833] FAT-fs (loop2): Filesystem has been set read-only 14:38:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:14 executing program 1 (fault-call:8 fault-nth:23): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 492.377115][ T1002] FAULT_INJECTION: forcing a failure. [ 492.377115][ T1002] name failslab, interval 1, probability 0, space 0, times 0 [ 492.390919][ T1002] CPU: 1 PID: 1002 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 492.398845][ T1002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.408913][ T1002] Call Trace: [ 492.412232][ T1002] dump_stack+0x172/0x1f0 [ 492.416583][ T1002] should_fail.cold+0xa/0x15 [ 492.421188][ T1002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.427007][ T1002] ? ___might_sleep+0x163/0x280 [ 492.431871][ T1002] __should_failslab+0x121/0x190 [ 492.436824][ T1002] should_failslab+0x9/0x14 [ 492.441337][ T1002] kmem_cache_alloc_trace+0x2d1/0x760 [ 492.446730][ T1002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.452196][ T1002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.458454][ T1002] ? debug_smp_processor_id+0x3c/0x280 [ 492.463939][ T1002] tomoyo_find_next_domain+0x12c/0x1f8a [ 492.469493][ T1002] ? mark_held_locks+0xf0/0xf0 [ 492.474268][ T1002] ? perf_trace_lock+0x510/0x510 [ 492.479222][ T1002] ? retint_kernel+0x2d/0x2d [ 492.483826][ T1002] ? tomoyo_dump_page+0x510/0x510 [ 492.488857][ T1002] ? lock_acquire+0x16f/0x3f0 [ 492.493550][ T1002] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 492.499383][ T1002] tomoyo_bprm_check_security+0x12a/0x1b0 [ 492.505112][ T1002] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 492.510939][ T1002] security_bprm_check+0x69/0xb0 [ 492.515905][ T1002] search_binary_handler+0x77/0x570 [ 492.521115][ T1002] ? kasan_check_read+0x11/0x20 [ 492.525976][ T1002] __do_execve_file.isra.0+0x1394/0x23f0 [ 492.531801][ T1002] ? copy_strings_kernel+0x110/0x110 [ 492.537093][ T1002] ? strncpy_from_user+0x2a8/0x380 [ 492.542218][ T1002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.548477][ T1002] __x64_sys_execveat+0xed/0x130 [ 492.553433][ T1002] do_syscall_64+0x103/0x610 [ 492.558043][ T1002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.563936][ T1002] RIP: 0033:0x458da9 [ 492.567827][ T1002] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.587429][ T1002] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 492.595841][ T1002] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 492.603809][ T1002] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 492.611774][ T1002] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 492.619747][ T1002] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 14:38:15 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) r1 = open(&(0x7f0000000040)='./file0\x00', 0x402, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, r1, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 492.627715][ T1002] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:15 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1009) 14:38:15 executing program 1 (fault-call:8 fault-nth:24): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:15 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e2) r2 = getpgrp(0x0) fcntl$setown(r1, 0x8, r2) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001780)='/dev/sequencer2\x00', 0x400, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) ptrace(0x420f, r4) syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000017c0)={0x7, 0x7, 0x4, 0x5, 0xfffffffffffffffe, 0x6f9, 0x7fff, 0x5, 0x0}, &(0x7f0000000000)=0xf5) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001840)={r5, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x0, 0x3, 0x8, 0x7fff}, &(0x7f0000001900)=0x98) [ 492.731521][ T1033] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 492.791621][ T1033] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 492.833272][ T1130] FAULT_INJECTION: forcing a failure. [ 492.833272][ T1130] name failslab, interval 1, probability 0, space 0, times 0 [ 492.836271][ T1033] FAT-fs (loop2): Filesystem has been set read-only [ 492.846210][ T1130] CPU: 0 PID: 1130 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 492.860488][ T1130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.870540][ T1130] Call Trace: [ 492.873925][ T1130] dump_stack+0x172/0x1f0 [ 492.878270][ T1130] should_fail.cold+0xa/0x15 [ 492.882873][ T1130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.888695][ T1130] ? ___might_sleep+0x163/0x280 [ 492.893558][ T1130] __should_failslab+0x121/0x190 [ 492.898504][ T1130] should_failslab+0x9/0x14 [ 492.903013][ T1130] kmem_cache_alloc+0x2b2/0x6f0 [ 492.907870][ T1130] ? retint_kernel+0x2d/0x2d [ 492.912472][ T1130] getname_kernel+0x53/0x370 [ 492.917071][ T1130] kern_path+0x20/0x40 [ 492.921188][ T1130] tomoyo_realpath_nofollow+0x74/0xdb [ 492.926572][ T1130] ? tomoyo_realpath_from_path+0x730/0x730 [ 492.932405][ T1130] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 492.938654][ T1130] ? tomoyo_init_request_info+0x105/0x1d0 [ 492.944405][ T1130] tomoyo_find_next_domain+0x28c/0x1f8a [ 492.949961][ T1130] ? mark_held_locks+0xf0/0xf0 [ 492.954734][ T1130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.960197][ T1130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.965665][ T1130] ? lockdep_hardirqs_on+0x418/0x5d0 [ 492.970964][ T1130] ? tomoyo_dump_page+0x510/0x510 [ 492.975994][ T1130] ? lock_acquire+0x16f/0x3f0 [ 492.980680][ T1130] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 492.986511][ T1130] tomoyo_bprm_check_security+0x12a/0x1b0 [ 492.992237][ T1130] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 492.998057][ T1130] security_bprm_check+0x69/0xb0 [ 493.003007][ T1130] search_binary_handler+0x77/0x570 [ 493.008214][ T1130] ? kasan_check_read+0x11/0x20 [ 493.013080][ T1130] __do_execve_file.isra.0+0x1394/0x23f0 [ 493.018730][ T1130] ? copy_strings_kernel+0x110/0x110 [ 493.024022][ T1130] ? strncpy_from_user+0x2a8/0x380 [ 493.029140][ T1130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.035410][ T1130] __x64_sys_execveat+0xed/0x130 [ 493.040369][ T1130] do_syscall_64+0x103/0x610 [ 493.044976][ T1130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.050872][ T1130] RIP: 0033:0x458da9 [ 493.054773][ T1130] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.074390][ T1130] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:15 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x20000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000001c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000200)=r3) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000180)={0x3, @null, r2}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 493.082819][ T1130] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 493.090791][ T1130] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 493.098760][ T1130] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 493.106733][ T1130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 493.114704][ T1130] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:15 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7ff, 0x0) write$capi20(r1, &(0x7f00000000c0)={0x10, 0xf1c, 0x5, 0x82, 0x2, 0x50}, 0x10) 14:38:15 executing program 1 (fault-call:8 fault-nth:25): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:15 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x100a) [ 493.203978][ T1033] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 493.231663][ T1033] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:38:15 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x80000000000, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x3, {{0x2, 0x4e23, @broadcast}}}, 0x88) [ 493.271663][ T1033] FAT-fs (loop2): Filesystem has been set read-only 14:38:15 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = geteuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000140)={0xa8, 0x0, 0x1, [{{0x3, 0x2, 0x230, 0xc5, 0x78, 0x5, {0x3, 0xa98, 0x2, 0x800, 0x7ff, 0x5, 0x10000, 0x2400010000, 0x8, 0x9, 0xfffffffffffffffb, r2, r3, 0x80000000, 0x80000001}}, {0x2, 0x0, 0x0, 0x6}}]}, 0xa8) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x6}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x400}, @sack_perm, @window={0x3, 0x81, 0x1}, @mss={0x2, 0xa}, @mss={0x2, 0x401}], 0x5) 14:38:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) [ 493.440957][ T1155] FAULT_INJECTION: forcing a failure. [ 493.440957][ T1155] name failslab, interval 1, probability 0, space 0, times 0 [ 493.453838][ T1155] CPU: 1 PID: 1155 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 493.461738][ T1155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.471804][ T1155] Call Trace: [ 493.475116][ T1155] dump_stack+0x172/0x1f0 [ 493.479470][ T1155] should_fail.cold+0xa/0x15 [ 493.484080][ T1155] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.489896][ T1155] ? ___might_sleep+0x163/0x280 [ 493.494765][ T1155] __should_failslab+0x121/0x190 [ 493.499711][ T1155] should_failslab+0x9/0x14 [ 493.504225][ T1155] kmem_cache_alloc+0x2b2/0x6f0 [ 493.509090][ T1155] getname_kernel+0x53/0x370 [ 493.513689][ T1155] kern_path+0x20/0x40 [ 493.517768][ T1155] tomoyo_realpath_nofollow+0x74/0xdb [ 493.523148][ T1155] ? tomoyo_realpath_from_path+0x730/0x730 [ 493.528964][ T1155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 493.535218][ T1155] ? tomoyo_init_request_info+0x105/0x1d0 [ 493.540953][ T1155] tomoyo_find_next_domain+0x28c/0x1f8a [ 493.546522][ T1155] ? tomoyo_dump_page+0x510/0x510 [ 493.551553][ T1155] ? lock_acquire+0x1ea/0x3f0 [ 493.556252][ T1155] tomoyo_bprm_check_security+0x12a/0x1b0 [ 493.561973][ T1155] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 493.567795][ T1155] security_bprm_check+0x69/0xb0 [ 493.572743][ T1155] search_binary_handler+0x77/0x570 [ 493.577948][ T1155] ? kasan_check_read+0x11/0x20 [ 493.582839][ T1155] __do_execve_file.isra.0+0x1394/0x23f0 [ 493.588491][ T1155] ? copy_strings_kernel+0x110/0x110 [ 493.593781][ T1155] ? strncpy_from_user+0x2a8/0x380 [ 493.598913][ T1155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.605171][ T1155] __x64_sys_execveat+0xed/0x130 [ 493.610122][ T1155] do_syscall_64+0x103/0x610 [ 493.614722][ T1155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.620620][ T1155] RIP: 0033:0x458da9 14:38:15 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1017) 14:38:15 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x2, 0x10001, 0x1}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 493.624521][ T1155] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.644132][ T1155] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 493.652906][ T1155] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 493.660915][ T1155] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 493.668890][ T1155] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 493.668906][ T1155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 14:38:16 executing program 4: r0 = memfd_create(&(0x7f0000000180)='/dev/null\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498e23f00000038001f0000000000000000000000200002"], 0x2d) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x42, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x7fff, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:16 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7ff, 0x80000) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) [ 493.668916][ T1155] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:16 executing program 1 (fault-call:8 fault-nth:26): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 493.819704][ T1165] FAULT_INJECTION: forcing a failure. [ 493.819704][ T1165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 493.832955][ T1165] CPU: 0 PID: 1165 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 493.840847][ T1165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.850903][ T1165] Call Trace: [ 493.854214][ T1165] dump_stack+0x172/0x1f0 [ 493.858572][ T1165] should_fail.cold+0xa/0x15 [ 493.863182][ T1165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.869003][ T1165] ? __lock_acquire+0x548/0x3fb0 [ 493.873956][ T1165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.880210][ T1165] should_fail_alloc_page+0x50/0x60 [ 493.885437][ T1165] __alloc_pages_nodemask+0x1a1/0x8d0 [ 493.890838][ T1165] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 493.896599][ T1165] ? find_held_lock+0x35/0x130 [ 493.901393][ T1165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.907223][ T1165] cache_grow_begin+0x9c/0x860 [ 493.911996][ T1165] ? getname_kernel+0x53/0x370 [ 493.916769][ T1165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 493.923025][ T1165] kmem_cache_alloc+0x62d/0x6f0 [ 493.927894][ T1165] getname_kernel+0x53/0x370 [ 493.932496][ T1165] kern_path+0x20/0x40 [ 493.936586][ T1165] tomoyo_realpath_nofollow+0x74/0xdb [ 493.941968][ T1165] ? tomoyo_realpath_from_path+0x730/0x730 [ 493.947787][ T1165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 493.954033][ T1165] ? tomoyo_init_request_info+0x105/0x1d0 [ 493.959763][ T1165] tomoyo_find_next_domain+0x28c/0x1f8a [ 493.965320][ T1165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 493.970802][ T1165] ? tomoyo_dump_page+0x510/0x510 [ 493.975846][ T1165] tomoyo_bprm_check_security+0x12a/0x1b0 [ 493.981569][ T1165] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 493.987387][ T1165] security_bprm_check+0x69/0xb0 [ 493.992346][ T1165] search_binary_handler+0x77/0x570 [ 493.997560][ T1165] ? kasan_check_read+0x11/0x20 [ 494.002429][ T1165] __do_execve_file.isra.0+0x1394/0x23f0 [ 494.008081][ T1165] ? copy_strings_kernel+0x110/0x110 [ 494.013378][ T1165] ? strncpy_from_user+0x2a8/0x380 [ 494.018505][ T1165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.024762][ T1165] __x64_sys_execveat+0xed/0x130 [ 494.029711][ T1165] do_syscall_64+0x103/0x610 [ 494.034376][ T1165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.040274][ T1165] RIP: 0033:0x458da9 [ 494.044183][ T1165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:38:16 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r1}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 494.064045][ T1165] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 494.072463][ T1165] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 494.080475][ T1165] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 494.088534][ T1165] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 494.096508][ T1165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 494.104492][ T1165] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 494.171011][ T1184] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 14:38:16 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600e23f00000038001f00000be4000000000025fd2000020ea5304ffd969727968dcc9c5b47b22d2682b7492ca56b3810be8d408848f9c531af5d55df6458040e8f60e8050f6616a4e8f3755d037f3e2841a05edac8754a4bf0b807fce6784a7363c95939"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000240)={0x3e, 0x8001, 0x80033}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:16 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018) 14:38:16 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) socketpair(0x8, 0x0, 0x101, &(0x7f0000000000)) [ 494.224973][ T1184] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) 14:38:16 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x10000, 0x0) getsockopt$rose(r1, 0x104, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000001c0)=""/17) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x8001) syslog(0xf, &(0x7f0000000000)=""/218, 0xda) socketpair(0x1b, 0x80000, 0xfffffffffffffff8, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140)={0xfffffffffffffff8}, 0x4) [ 494.287682][ T1184] FAT-fs (loop2): Filesystem has been set read-only 14:38:16 executing program 1 (fault-call:8 fault-nth:27): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 494.379373][ T1184] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 494.484406][ T1184] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 1, start 06000000) [ 494.528687][ T1409] FAULT_INJECTION: forcing a failure. [ 494.528687][ T1409] name failslab, interval 1, probability 0, space 0, times 0 [ 494.535031][ T1184] FAT-fs (loop2): Filesystem has been set read-only [ 494.541606][ T1409] CPU: 0 PID: 1409 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 494.555903][ T1409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.565961][ T1409] Call Trace: [ 494.569263][ T1409] dump_stack+0x172/0x1f0 [ 494.573608][ T1409] should_fail.cold+0xa/0x15 [ 494.578244][ T1409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.584057][ T1409] ? __task_pid_nr_ns+0x1b1/0x530 [ 494.589096][ T1409] __should_failslab+0x121/0x190 [ 494.594033][ T1409] should_failslab+0x9/0x14 [ 494.598537][ T1409] kmem_cache_alloc_trace+0x4b/0x760 [ 494.603820][ T1409] ? kasan_check_read+0x11/0x20 [ 494.608677][ T1409] proc_self_get_link+0x16f/0x1d0 [ 494.613709][ T1409] link_path_walk.part.0+0xeec/0x1340 [ 494.619081][ T1409] ? proc_ns_dir_readdir+0x570/0x570 [ 494.624373][ T1409] ? walk_component+0x2000/0x2000 [ 494.629473][ T1409] ? save_stack+0x45/0xd0 [ 494.633802][ T1409] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 494.639602][ T1409] ? getname_kernel+0x40/0x370 [ 494.644378][ T1409] path_lookupat.isra.0+0xe3/0x8d0 [ 494.649491][ T1409] ? do_syscall_64+0x103/0x610 [ 494.654258][ T1409] ? path_parentat.isra.0+0x160/0x160 [ 494.659654][ T1409] ? mark_held_locks+0xa4/0xf0 [ 494.664423][ T1409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.669879][ T1409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.675335][ T1409] ? lockdep_hardirqs_on+0x418/0x5d0 [ 494.680624][ T1409] ? retint_kernel+0x2d/0x2d [ 494.685211][ T1409] ? trace_hardirqs_on_caller+0x6a/0x220 [ 494.690852][ T1409] filename_lookup+0x1b0/0x410 [ 494.695615][ T1409] ? nd_jump_link+0x1d0/0x1d0 [ 494.700331][ T1409] ? retint_kernel+0x2d/0x2d [ 494.704930][ T1409] ? memcpy+0x46/0x50 [ 494.708914][ T1409] ? getname_kernel+0x223/0x370 [ 494.713764][ T1409] kern_path+0x36/0x40 [ 494.717833][ T1409] tomoyo_realpath_nofollow+0x74/0xdb [ 494.723200][ T1409] ? tomoyo_realpath_from_path+0x730/0x730 [ 494.729003][ T1409] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 494.735244][ T1409] ? tomoyo_init_request_info+0x105/0x1d0 [ 494.740989][ T1409] tomoyo_find_next_domain+0x28c/0x1f8a [ 494.746534][ T1409] ? mark_held_locks+0xf0/0xf0 [ 494.751298][ T1409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.756840][ T1409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.762299][ T1409] ? lockdep_hardirqs_on+0x418/0x5d0 [ 494.767589][ T1409] ? tomoyo_dump_page+0x510/0x510 [ 494.772613][ T1409] ? lock_acquire+0x16f/0x3f0 [ 494.777287][ T1409] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 494.783096][ T1409] tomoyo_bprm_check_security+0x12a/0x1b0 [ 494.788814][ T1409] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 494.794624][ T1409] security_bprm_check+0x69/0xb0 [ 494.799564][ T1409] search_binary_handler+0x77/0x570 [ 494.804878][ T1409] ? kasan_check_read+0x11/0x20 [ 494.809737][ T1409] __do_execve_file.isra.0+0x1394/0x23f0 [ 494.815387][ T1409] ? copy_strings_kernel+0x110/0x110 [ 494.820674][ T1409] ? strncpy_from_user+0x2a8/0x380 [ 494.825789][ T1409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.832037][ T1409] __x64_sys_execveat+0xed/0x130 [ 494.836983][ T1409] do_syscall_64+0x103/0x610 [ 494.841578][ T1409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.847468][ T1409] RIP: 0033:0x458da9 [ 494.851366][ T1409] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.870978][ T1409] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 494.879409][ T1409] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 494.887384][ T1409] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 494.895352][ T1409] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 494.903329][ T1409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 494.911301][ T1409] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:17 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1027) 14:38:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x117, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r1, 0x10, 0x0, @in={0x2, 0x4e23, @multicast2}}}, 0xa0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000001c0)={0x3, 0x3, @stop_pts=0x7}) 14:38:17 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7fd50500000000000000f83d6480ccb903000600008498e23f00000038001f00000000000c0000000000200002"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x16800) write$uinput_user_dev(r1, &(0x7f00000003c0)={'syz1\x00', {0x200, 0x9, 0x1f, 0x9}, 0x3d, [0x41ae76a2, 0xff, 0x0, 0x8, 0x8be2, 0x800, 0x6, 0x5f87, 0x2, 0x6, 0x0, 0x6, 0xfffffffffffffffa, 0xfff, 0x6, 0x5, 0x7fffffff, 0x2, 0x0, 0xffff, 0x3, 0x4, 0x218, 0x200, 0x0, 0x1, 0x3, 0x3, 0x44d, 0xfffffffffffffc00, 0x2, 0x1, 0x7fffffff, 0x2, 0x9, 0x9, 0x1000, 0x2, 0xc8, 0x0, 0x80000000, 0x7fff, 0x4, 0x10000, 0x8, 0x7ff, 0xfffffffffffff86e, 0x80000000, 0x8000, 0x4a, 0x7, 0x9, 0x1f, 0x2, 0x5, 0x2, 0x20f, 0x8af, 0x7ff, 0x2, 0x6, 0x8220, 0x1, 0xdf09], [0x3, 0x83, 0x8, 0x3, 0x4, 0xffffffffffffffc0, 0x80000001, 0x1, 0xffffffff00000000, 0x2, 0x3ff0, 0x849, 0x40, 0x80, 0x8, 0x4, 0x2, 0xfffffffffffffff8, 0x3, 0x4, 0x745, 0x0, 0xff, 0x0, 0x7f, 0x91, 0x0, 0x6, 0xffffffffffffff75, 0xffffffffffffff01, 0x70, 0x5dbf, 0x9, 0xffffffffffffffc1, 0x7, 0x0, 0x8001, 0x1, 0xf95e, 0x2f, 0x7, 0x100000000, 0x40, 0x1ff, 0x800, 0x4, 0x2, 0x3ff, 0x7fff, 0x1ff, 0x69, 0x3, 0x1, 0x7d, 0x1ff, 0x2, 0x3, 0x9, 0x10000, 0x3, 0xff, 0x9, 0x8000, 0xcf0], [0x749d, 0x7, 0x0, 0x5, 0x3, 0x8, 0xffffffff, 0x31, 0x5, 0x2, 0x6, 0x5, 0xd92, 0x9, 0xfff, 0x6, 0xfffffffffffffffd, 0x8, 0x60c, 0x10001, 0x2, 0x4, 0x55, 0x200, 0x40000, 0x0, 0x100000001, 0x47134f16, 0x100000000, 0x40, 0x3, 0x8, 0x2, 0x1, 0x0, 0xfffffffffffffff8, 0xffffffffffffff85, 0xfff, 0x2, 0x3f, 0x3, 0x8, 0x3, 0x4, 0x100, 0x6, 0xfffffffffffffff9, 0x2, 0x7f, 0x7, 0x0, 0x44d45640, 0x8, 0x5, 0x1, 0x643, 0x4, 0x1000, 0x5, 0x2, 0x2, 0x87c, 0x1, 0x2], [0x7fff, 0x51e, 0xd8a3, 0x4, 0x0, 0x9ae8, 0x9, 0x8, 0x4, 0x3, 0x0, 0xf0, 0x6, 0xffffffffffffffff, 0x3ff, 0x80, 0x20, 0xfffffffffffffe01, 0x7fffffff, 0xffffffff, 0x5, 0x6, 0x101, 0x1, 0x1d9, 0x0, 0x4a, 0x1, 0x1f, 0xed4e, 0x336e00000000, 0x40, 0x8, 0x0, 0x8, 0x4, 0x4, 0x473, 0x4, 0x2, 0x89, 0x8, 0x2, 0x7fffffff, 0x8001, 0x95, 0x5, 0x6, 0x82b0, 0xffffffff, 0x2, 0x5, 0x0, 0x4, 0x5, 0x3, 0x6, 0xffffffff, 0xffc00000000000, 0x81, 0x26cc, 0x800, 0x5]}, 0x45c) 14:38:17 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x105, 0xfffffffdfffffffe) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000040)) 14:38:17 executing program 1 (fault-call:8 fault-nth:28): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 495.147728][ T1427] FAULT_INJECTION: forcing a failure. [ 495.147728][ T1427] name failslab, interval 1, probability 0, space 0, times 0 [ 495.160631][ T1427] CPU: 1 PID: 1427 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 495.168534][ T1427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.178597][ T1427] Call Trace: [ 495.181922][ T1427] dump_stack+0x172/0x1f0 [ 495.186271][ T1427] should_fail.cold+0xa/0x15 [ 495.190877][ T1427] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.196696][ T1427] ? __task_pid_nr_ns+0x1b1/0x530 [ 495.201733][ T1427] __should_failslab+0x121/0x190 [ 495.206709][ T1427] should_failslab+0x9/0x14 [ 495.211229][ T1427] kmem_cache_alloc_trace+0x4b/0x760 [ 495.216526][ T1427] ? kasan_check_read+0x11/0x20 [ 495.221401][ T1427] proc_self_get_link+0x16f/0x1d0 [ 495.234176][ T1427] link_path_walk.part.0+0xeec/0x1340 [ 495.239560][ T1427] ? proc_ns_dir_readdir+0x570/0x570 [ 495.244859][ T1427] ? walk_component+0x2000/0x2000 [ 495.249893][ T1427] ? save_stack+0x45/0xd0 [ 495.254237][ T1427] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 495.261037][ T1427] ? getname_kernel+0x40/0x370 [ 495.265812][ T1427] path_lookupat.isra.0+0xe3/0x8d0 [ 495.270934][ T1427] ? do_syscall_64+0x103/0x610 [ 495.275711][ T1427] ? path_parentat.isra.0+0x160/0x160 [ 495.281093][ T1427] ? mark_held_locks+0xa4/0xf0 [ 495.285871][ T1427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 495.291343][ T1427] ? trace_hardirqs_on_thunk+0x1a/0x1c 14:38:17 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) 14:38:17 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000080)=0x1) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) [ 495.296820][ T1427] ? lockdep_hardirqs_on+0x418/0x5d0 [ 495.302119][ T1427] ? retint_kernel+0x2d/0x2d [ 495.306975][ T1427] ? trace_hardirqs_on_caller+0x6a/0x220 [ 495.312617][ T1427] filename_lookup+0x1b0/0x410 [ 495.317397][ T1427] ? nd_jump_link+0x1d0/0x1d0 [ 495.322104][ T1427] ? getname_kernel+0x1c/0x370 [ 495.326879][ T1427] ? memcpy+0x46/0x50 [ 495.330881][ T1427] ? getname_kernel+0x223/0x370 [ 495.335749][ T1427] kern_path+0x36/0x40 [ 495.340113][ T1427] tomoyo_realpath_nofollow+0x74/0xdb [ 495.345495][ T1427] ? tomoyo_realpath_from_path+0x730/0x730 [ 495.351319][ T1427] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 495.357611][ T1427] ? tomoyo_init_request_info+0x105/0x1d0 [ 495.363350][ T1427] tomoyo_find_next_domain+0x28c/0x1f8a [ 495.368922][ T1427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 495.374411][ T1427] ? tomoyo_dump_page+0x510/0x510 [ 495.379458][ T1427] ? lock_acquire+0x1f4/0x3f0 [ 495.384150][ T1427] tomoyo_bprm_check_security+0x12a/0x1b0 [ 495.389886][ T1427] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 495.395712][ T1427] security_bprm_check+0x69/0xb0 [ 495.400659][ T1427] search_binary_handler+0x77/0x570 [ 495.405867][ T1427] ? kasan_check_read+0x11/0x20 [ 495.410737][ T1427] __do_execve_file.isra.0+0x1394/0x23f0 [ 495.416404][ T1427] ? copy_strings_kernel+0x110/0x110 [ 495.421705][ T1427] ? strncpy_from_user+0x2a8/0x380 [ 495.426835][ T1427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.433087][ T1427] __x64_sys_execveat+0xed/0x130 [ 495.438040][ T1427] do_syscall_64+0x103/0x610 [ 495.442640][ T1427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.448535][ T1427] RIP: 0033:0x458da9 [ 495.452433][ T1427] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.472042][ T1427] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 495.480467][ T1427] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 495.488443][ T1427] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 14:38:17 executing program 3: clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x1}, 0x0, &(0x7f0000000080)={r0, r1+30000000}, 0x8) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e2) [ 495.496423][ T1427] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 495.504401][ T1427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 495.512383][ T1427] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:18 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000004005374f83d6480ccb903000600008498e23f00000038001f000000000000c422e8f15e26b300"], 0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x200, 0x2, &(0x7f0000000280)=[{&(0x7f0000000100)="514e86f746ee813bdb978aacaf81590cb7d174eebd64f7711aa7f2b32c32668645e4361d7b8567cce060e46904eadd94594ceb8aea000a66156b6aa4826360b1b0cc163c437c2a5e9aea2a48d1c685b9d2e477f966507eaf255b579bc2738c8645a6404cc6bc7b6b746089260903c92c357cc31118373b853b06949f699eb5a57b0acf836fcf02db7c9638a6f9dac6235179c5e04099a7226de65d725f273d01421df6e29b6e268e6a7b3401806835035a", 0xb1, 0x2}, {&(0x7f00000001c0)="9dc578e2bdf37569672c958501fc2e767d7d5a2bb47b8d9049aa0c988d346886de67896e866349ef82ab4bfc6674bb083d9e85c140762b37e7767c3d7a1d1c900bef736f484ba7d4c59a239a1695bcfd36fdbf16623e73c7b21b32f29fc8a495e08e3f614d2d5ee8feeca0678e6cf05e5a23b6f54c69c43b4ea2ea4a4776ba823db02026c279cab6b54722eafcad5b77432e4abb34127d", 0x97, 0xdf}], 0x0, &(0x7f00000002c0)={[{@errors_withdraw='errors=withdraw'}], [{@pcr={'pcr', 0x3d, 0x33}}, {@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x00\x00\x06\x00'}}, {@pcr={'pcr'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x36, 0x79, 0x39, 0x33, 0x75, 0x64, 0x31], 0x2d, [0x64, 0x66, 0x39, 0x39], 0x2d, [0x64, 0x32, 0x63, 0x37], 0x2d, [0x30, 0x7f, 0x61, 0x32], 0x2d, [0x77, 0x65, 0x37, 0x61, 0x63, 0x76, 0x3f]}}}]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:18 executing program 1 (fault-call:8 fault-nth:29): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:38:18 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) [ 495.861837][ T1452] FAULT_INJECTION: forcing a failure. [ 495.861837][ T1452] name failslab, interval 1, probability 0, space 0, times 0 [ 495.875503][ T1452] CPU: 1 PID: 1452 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 495.883399][ T1452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.893462][ T1452] Call Trace: [ 495.896768][ T1452] dump_stack+0x172/0x1f0 [ 495.901112][ T1452] should_fail.cold+0xa/0x15 [ 495.905715][ T1452] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.911531][ T1452] ? ___might_sleep+0x163/0x280 [ 495.916400][ T1452] __should_failslab+0x121/0x190 [ 495.921346][ T1452] ? proc_i_callback+0x30/0x30 [ 495.926124][ T1452] should_failslab+0x9/0x14 [ 495.930636][ T1452] kmem_cache_alloc+0x2b2/0x6f0 [ 495.935491][ T1452] ? get_pid_task+0xc9/0x190 [ 495.940091][ T1452] ? find_held_lock+0x35/0x130 [ 495.944860][ T1452] ? proc_i_callback+0x30/0x30 [ 495.949625][ T1452] proc_alloc_inode+0x1c/0x1a0 [ 495.954404][ T1452] alloc_inode+0x66/0x190 [ 495.958742][ T1452] new_inode_pseudo+0x19/0xf0 [ 495.963452][ T1452] new_inode+0x1f/0x40 [ 495.967532][ T1452] proc_pid_make_inode+0x22/0x230 [ 495.972571][ T1452] proc_pident_instantiate+0x82/0x2a0 [ 495.977953][ T1452] proc_pident_lookup+0x1ad/0x210 [ 495.982996][ T1452] proc_tgid_base_lookup+0x2c/0x40 [ 495.988115][ T1452] __lookup_slow+0x27e/0x500 [ 495.992716][ T1452] ? vfs_unlink+0x560/0x560 [ 495.997346][ T1452] lookup_slow+0x58/0x80 [ 496.001611][ T1452] walk_component+0x74b/0x2000 [ 496.006400][ T1452] ? refcount_dec_not_one+0x1f0/0x1f0 14:38:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x04', &(0x7f0000000000)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="eb7fc86d4f66732ee6617400020441ec0400077008f80000d8c32d7b233ce96528c1fe1a000001000000000000000006", 0x30}], 0x0, 0x0) 14:38:18 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xb7f, 0x200) ioctl$VT_DISALLOCATE(r1, 0x5608) 14:38:18 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000040)={0xf80, 0x80f6af, 0x1000, 0xfffffffffffffffe, 0x2, 0x6bd}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000840)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000880)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x79, r2}) memfd_create(&(0x7f00000000c0)='/dev/audio\x00', 0x4) 14:38:18 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) [ 496.011795][ T1452] ? kasan_check_read+0x11/0x20 [ 496.016659][ T1452] ? path_init+0x18f0/0x18f0 [ 496.021260][ T1452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.027508][ T1452] ? security_inode_permission+0xd5/0x110 [ 496.033231][ T1452] ? inode_permission+0xb4/0x570 [ 496.033275][ T1452] link_path_walk.part.0+0x594/0x1340 [ 496.033297][ T1452] ? walk_component+0x2000/0x2000 [ 496.033314][ T1452] ? save_stack+0x45/0xd0 [ 496.033330][ T1452] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 496.033345][ T1452] ? getname_kernel+0x40/0x370 [ 496.033372][ T1452] path_lookupat.isra.0+0xe3/0x8d0 [ 496.033389][ T1452] ? do_syscall_64+0x103/0x610 [ 496.033414][ T1452] ? path_parentat.isra.0+0x160/0x160 [ 496.078812][ T1452] ? mark_held_locks+0xa4/0xf0 [ 496.083589][ T1452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.089068][ T1452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.094538][ T1452] ? lockdep_hardirqs_on+0x418/0x5d0 [ 496.099833][ T1452] ? retint_kernel+0x2d/0x2d [ 496.100091][ T1445] gfs2: invalid mount option: pcr=00000000000000000051 [ 496.104434][ T1452] ? trace_hardirqs_on_caller+0x6a/0x220 [ 496.104454][ T1452] filename_lookup+0x1b0/0x410 [ 496.104473][ T1452] ? nd_jump_link+0x1d0/0x1d0 [ 496.104506][ T1452] ? simple_attr_release+0x50/0x50 [ 496.104527][ T1452] ? retint_kernel+0x2d/0x2d [ 496.104545][ T1452] ? memcpy+0x46/0x50 [ 496.104561][ T1452] ? getname_kernel+0x223/0x370 [ 496.104578][ T1452] kern_path+0x36/0x40 [ 496.104597][ T1452] tomoyo_realpath_nofollow+0x74/0xdb [ 496.104614][ T1452] ? tomoyo_realpath_from_path+0x730/0x730 [ 496.104631][ T1452] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 496.104646][ T1452] ? tomoyo_init_request_info+0x105/0x1d0 [ 496.104668][ T1452] tomoyo_find_next_domain+0x28c/0x1f8a [ 496.104685][ T1452] ? mark_held_locks+0xf0/0xf0 [ 496.104706][ T1452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.104725][ T1452] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.104744][ T1452] ? tomoyo_dump_page+0x510/0x510 [ 496.104761][ T1452] ? lock_acquire+0x16f/0x3f0 [ 496.104778][ T1452] ? tomoyo_bprm_check_security+0xe3/0x1b0 14:38:18 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb903000600008498"], 0x17) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) [ 496.104802][ T1452] tomoyo_bprm_check_security+0x12a/0x1b0 [ 496.104818][ T1452] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 496.104838][ T1452] security_bprm_check+0x69/0xb0 [ 496.104859][ T1452] search_binary_handler+0x77/0x570 [ 496.104876][ T1452] ? kasan_check_read+0x11/0x20 [ 496.104913][ T1452] __do_execve_file.isra.0+0x1394/0x23f0 [ 496.166107][ T1445] gfs2: can't parse mount arguments [ 496.166735][ T1452] ? copy_strings_kernel+0x110/0x110 [ 496.166759][ T1452] ? strncpy_from_user+0x2a8/0x380 [ 496.257070][ T1452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:38:18 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x101002) r2 = syz_open_dev$cec(&(0x7f0000000540)='/dev/cec#\x00', 0x2, 0x2) accept4$ax25(r2, &(0x7f0000000580)={{0x3, @default}, [@default, @bcast, @null, @null, @default, @default]}, &(0x7f0000000600)=0x48, 0x800) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x17, 0x9, @scatter={0x3, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/30, 0x1e}, {&(0x7f0000000080)=""/146, 0x92}, {&(0x7f0000000140)=""/150, 0x96}]}, &(0x7f0000000240)="70d0314f250993e6fa9cb00caa32b9dbc8006fbade0436", &(0x7f0000000280)=""/107, 0x101, 0x10005, 0x3, &(0x7f0000000300)}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x1c1200, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000480)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, {&(0x7f0000000400)=""/54, 0x36}, &(0x7f0000000440), 0x6}, 0xa0) unshare(0x40000) [ 496.263330][ T1452] __x64_sys_execveat+0xed/0x130 [ 496.268289][ T1452] do_syscall_64+0x103/0x610 [ 496.272895][ T1452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.278795][ T1452] RIP: 0033:0x458da9 [ 496.282700][ T1452] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.302316][ T1452] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 496.310748][ T1452] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 496.318728][ T1452] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 496.326703][ T1452] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 496.334684][ T1452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 496.342663][ T1452] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 14:38:18 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0xfffffffffffffffd) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) 14:38:18 executing program 1 (fault-call:8 fault-nth:30): clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xff) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x340195f4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 496.480718][ T1445] gfs2: invalid mount option: pcr=00000000000000000051 [ 496.522646][ T1589] FAULT_INJECTION: forcing a failure. [ 496.522646][ T1589] name failslab, interval 1, probability 0, space 0, times 0 [ 496.535469][ T1589] CPU: 0 PID: 1589 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 496.543378][ T1589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.553439][ T1589] Call Trace: [ 496.556750][ T1589] dump_stack+0x172/0x1f0 [ 496.561090][ T1589] should_fail.cold+0xa/0x15 [ 496.565691][ T1589] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.571514][ T1589] ? ___might_sleep+0x163/0x280 [ 496.576390][ T1589] __should_failslab+0x121/0x190 [ 496.581350][ T1589] should_failslab+0x9/0x14 [ 496.585880][ T1589] __kmalloc+0x2dc/0x740 [ 496.590136][ T1589] ? tomoyo_realpath_from_path+0xba/0x730 [ 496.595870][ T1589] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.601592][ T1589] ? tomoyo_realpath_from_path+0xc7/0x730 [ 496.607321][ T1589] tomoyo_realpath_from_path+0xc7/0x730 [ 496.612899][ T1589] tomoyo_realpath_nofollow+0xc8/0xdb [ 496.618280][ T1589] ? tomoyo_realpath_from_path+0x730/0x730 [ 496.624125][ T1589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 496.630384][ T1589] ? tomoyo_init_request_info+0x105/0x1d0 [ 496.636119][ T1589] tomoyo_find_next_domain+0x28c/0x1f8a [ 496.641673][ T1589] ? mark_held_locks+0xf0/0xf0 [ 496.646459][ T1589] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.651930][ T1589] ? tomoyo_dump_page+0x510/0x510 [ 496.656968][ T1589] ? lock_acquire+0x16f/0x3f0 [ 496.659105][ T1445] gfs2: can't parse mount arguments [ 496.661670][ T1589] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 496.672679][ T1589] tomoyo_bprm_check_security+0x12a/0x1b0 [ 496.678409][ T1589] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 496.678432][ T1589] security_bprm_check+0x69/0xb0 [ 496.678455][ T1589] search_binary_handler+0x77/0x570 [ 496.694379][ T1589] ? kasan_check_read+0x11/0x20 [ 496.699257][ T1589] __do_execve_file.isra.0+0x1394/0x23f0 [ 496.704908][ T1589] ? copy_strings_kernel+0x110/0x110 [ 496.704925][ T1589] ? strncpy_from_user+0x2a8/0x380 [ 496.704945][ T1589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.704966][ T1589] __x64_sys_execveat+0xed/0x130 [ 496.704988][ T1589] do_syscall_64+0x103/0x610 [ 496.705010][ T1589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.737021][ T1589] RIP: 0033:0x458da9 [ 496.740926][ T1589] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.760544][ T1589] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 14:38:18 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e2) r1 = dup(r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) [ 496.768973][ T1589] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 496.776956][ T1589] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 496.784942][ T1589] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 496.792924][ T1589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 496.800906][ T1589] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 496.821907][ T1589] ERROR: Out of memory at tomoyo_realpath_from_path. [ 496.828920][ T1589] Kernel panic - not syncing: MAC Initialization failed. [ 496.836070][ T1589] CPU: 0 PID: 1589 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #96 [ 496.843982][ T1589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.854144][ T1589] Call Trace: [ 496.857459][ T1589] dump_stack+0x172/0x1f0 [ 496.861802][ T1589] panic+0x2cb/0x65c [ 496.865712][ T1589] ? __warn_printk+0xf3/0xf3 [ 496.870325][ T1589] ? tomoyo_realpath_from_path+0x394/0x730 [ 496.876145][ T1589] ? tomoyo_warn_oom.cold+0x24/0x43 [ 496.881366][ T1589] tomoyo_warn_oom.cold+0x35/0x43 [ 496.886416][ T1589] tomoyo_realpath_from_path+0x3a8/0x730 [ 496.892076][ T1589] tomoyo_realpath_nofollow+0xc8/0xdb [ 496.897462][ T1589] ? tomoyo_realpath_from_path+0x730/0x730 [ 496.903282][ T1589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 496.909531][ T1589] ? tomoyo_init_request_info+0x105/0x1d0 [ 496.915268][ T1589] tomoyo_find_next_domain+0x28c/0x1f8a [ 496.920854][ T1589] ? mark_held_locks+0xf0/0xf0 [ 496.925633][ T1589] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.931102][ T1589] ? tomoyo_dump_page+0x510/0x510 [ 496.936134][ T1589] ? lock_acquire+0x16f/0x3f0 [ 496.940814][ T1589] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 496.946632][ T1589] tomoyo_bprm_check_security+0x12a/0x1b0 [ 496.952374][ T1589] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 496.958195][ T1589] security_bprm_check+0x69/0xb0 [ 496.963141][ T1589] search_binary_handler+0x77/0x570 [ 496.968366][ T1589] ? kasan_check_read+0x11/0x20 [ 496.973234][ T1589] __do_execve_file.isra.0+0x1394/0x23f0 [ 496.978886][ T1589] ? copy_strings_kernel+0x110/0x110 [ 496.984182][ T1589] ? strncpy_from_user+0x2a8/0x380 [ 496.989304][ T1589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.995561][ T1589] __x64_sys_execveat+0xed/0x130 [ 497.000527][ T1589] do_syscall_64+0x103/0x610 [ 497.005127][ T1589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.011025][ T1589] RIP: 0033:0x458da9 [ 497.014923][ T1589] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.034650][ T1589] RSP: 002b:00007f393f967c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 497.043071][ T1589] RAX: ffffffffffffffda RBX: 00007f393f967c90 RCX: 0000000000458da9 [ 497.051046][ T1589] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 497.059024][ T1589] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 497.067004][ T1589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f393f9686d4 [ 497.074983][ T1589] R13: 00000000004bf3b0 R14: 00000000004d05f0 R15: 0000000000000007 [ 497.084651][ T1589] Kernel Offset: disabled [ 497.088983][ T1589] Rebooting in 86400 seconds..