_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r1], 0x2) 10:01:48 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 10:01:48 executing program 1: r0 = io_uring_setup(0xba4, &(0x7f0000000100)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r1], 0x2) [ 149.549389][ T38] audit: type=1400 audit(1575021708.966:63): avc: denied { block_suspend } for pid=17637 comm="syz-executor.1" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 149.549864][T17638] 8021q: VLANs not supported on hsr0 [ 149.581523][T17633] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 10:01:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) 10:01:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'hsr0\x00'}) [ 149.617618][T17657] 8021q: VLANs not supported on hsr0 10:01:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'hsr0\x00'}) 10:01:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) [ 149.647741][T17662] 8021q: VLANs not supported on hsr0 10:01:49 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 10:01:49 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 149.714478][T17633] REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 10:01:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) 10:01:49 executing program 4: io_setup(0x0, &(0x7f0000000580)) 10:01:49 executing program 2: r0 = io_uring_setup(0xba4, &(0x7f0000000100)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r1], 0x2) 10:01:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 10:01:49 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 10:01:49 executing program 1: r0 = io_uring_setup(0xba4, &(0x7f0000000100)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r1], 0x2) 10:01:49 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x90d0, 0x0) 10:01:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 10:01:49 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) 10:01:49 executing program 2: r0 = io_uring_setup(0xba4, &(0x7f0000000100)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r1], 0x2) 10:01:49 executing program 1: r0 = io_uring_setup(0xba4, &(0x7f0000000100)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r1], 0x2) 10:01:49 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x0) 10:01:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 10:01:49 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) 10:01:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, 0x0, 0x0) 10:01:49 executing program 3: ppoll(0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 10:01:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) write$selinux_user(r0, &(0x7f0000000140)={'system_u:object_r:faillog_t:s0', 0x20, 'sysadm_u\x00'}, 0x28) 10:01:49 executing program 0: fsmount(0xffffffffffffffff, 0x3, 0x0) 10:01:49 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 10:01:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f0000001680)={0xffffffffffffffff, 0x0, 0x0}, 0x0) 10:01:49 executing program 2: msgctl$IPC_SET(0x0, 0x1, 0x0) 10:01:49 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 10:01:49 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 10:01:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x8, r0, r0) 10:01:49 executing program 5: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:49 executing program 3: dup(0xffffffffffffffff) 10:01:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f0000001680)={0xffffffffffffffff, 0x0, 0x0}, 0x0) 10:01:49 executing program 4: getcwd(0x0, 0x0) 10:01:49 executing program 0: io_uring_setup(0x572, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x21d}) 10:01:49 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 10:01:49 executing program 4: semget$private(0x0, 0x0, 0x0) 10:01:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f0000001680)={0xffffffffffffffff, 0x0, 0x0}, 0x0) 10:01:49 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 10:01:49 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 150.485748][ T38] audit: type=1804 audit(1575021709.906:64): pid=17794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir013325355/syzkaller.EYLGPV/525/file0" dev="sda1" ino=17051 res=1 10:01:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f0000001680)={0xffffffffffffffff, 0x0, 0x0}, 0x0) 10:01:49 executing program 5: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:49 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 10:01:49 executing program 0: io_uring_setup(0x572, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x21d}) [ 150.627100][ T38] audit: type=1804 audit(1575021710.046:65): pid=17817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir013325355/syzkaller.EYLGPV/526/file0" dev="sda1" ino=17078 res=1 10:01:50 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 10:01:50 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 150.677723][ T38] audit: type=1804 audit(1575021710.046:66): pid=17818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/syzkaller-testdir204784112/syzkaller.OoFUB3/516/file0" dev="sda1" ino=17079 res=1 10:01:50 executing program 5: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'rdma'}, {0x0, 'pids'}, {0x0, 'cpu'}]}, 0x11) 10:01:50 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 10:01:50 executing program 1: rename(&(0x7f0000000080)='./file0\x00', 0x0) [ 150.714193][ T38] audit: type=1804 audit(1575021710.096:67): pid=17831 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/syzkaller-testdir204784112/syzkaller.OoFUB3/517/file0" dev="sda1" ino=17068 res=1 [ 150.746550][ T38] audit: type=1400 audit(1575021710.136:68): avc: denied { write } for pid=17832 comm="syz-executor.1" path="socket:[65669]" dev="sockfs" ino=65669 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 10:01:50 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 10:01:50 executing program 0: io_uring_setup(0x572, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x21d}) 10:01:50 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x141, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 150.853894][ T38] audit: type=1804 audit(1575021710.266:69): pid=17837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir013325355/syzkaller.EYLGPV/527/file0" dev="sda1" ino=17067 res=1 10:01:50 executing program 5: syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 150.945161][ T38] audit: type=1804 audit(1575021710.366:70): pid=17851 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/syzkaller-testdir204784112/syzkaller.OoFUB3/518/file0" dev="sda1" ino=17072 res=1 10:01:50 executing program 0: io_uring_setup(0x572, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x21d}) 10:01:50 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, 0x0) [ 151.026295][ T38] audit: type=1804 audit(1575021710.446:71): pid=17867 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/syzkaller-testdir013325355/syzkaller.EYLGPV/528/file0" dev="sda1" ino=17065 res=1 10:01:50 executing program 4: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:01:50 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x160000) 10:01:50 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)) getpgid(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) 10:01:50 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 10:01:50 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x24}, 0x0) 10:01:50 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 10:01:50 executing program 4: syz_emit_ethernet(0xfffffdef, &(0x7f0000000180)={@remote, @empty, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "1a"}}}}}, &(0x7f0000000240)={0x0, 0x4, [0x0, 0xa56]}) 10:01:50 executing program 5: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 10:01:50 executing program 4: openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x6001, 0x0) 10:01:50 executing program 3: r0 = getpgid(0x0) wait4(r0, 0x0, 0x0, 0x0) 10:01:50 executing program 0: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x6) 10:01:50 executing program 5: prctl$PR_GET_THP_DISABLE(0xd) 10:01:50 executing program 3: getxattr(0x0, 0x0, 0x0, 0x0) 10:01:50 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)) 10:01:50 executing program 0: fsopen(0x0, 0x2) 10:01:50 executing program 5: syz_open_dev$mouse(&(0x7f00000068c0)='/dev/input/mouse#\x00', 0x9, 0x0) 10:01:50 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3000, 0x0) 10:01:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) lseek(r0, 0x0, 0x6) 10:01:50 executing program 0: syslog(0x4, &(0x7f0000000100)=""/243, 0x6f) 10:01:50 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 10:01:50 executing program 3: lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) 10:01:51 executing program 4: msgsnd(0x0, &(0x7f0000000000)={0x5}, 0x8, 0x0) 10:01:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmmsg$inet(r0, &(0x7f0000004b00)=[{{&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xffffffaa, 0x0}}], 0x4000000000002b1, 0x0) 10:01:51 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 10:01:51 executing program 0: prctl$PR_SET_TIMERSLACK(0x1d, 0x6) 10:01:51 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 10:01:51 executing program 5: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) 10:01:51 executing program 3: pivot_root(0x0, 0x0) 10:01:51 executing program 0: r0 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) 10:01:51 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 10:01:51 executing program 1: accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:01:51 executing program 4: select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) 10:01:51 executing program 3: request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 10:01:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 10:01:51 executing program 3: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 10:01:51 executing program 1: pipe2(&(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 10:01:51 executing program 4: move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x55) 10:01:51 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 10:01:51 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x4, @tid=0xffffffffffffffff}, 0x0) 10:01:51 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x42, 0x0) 10:01:51 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'syzkaller1\x00'}) 10:01:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) 10:01:51 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x5281, 0x0) 10:01:51 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) [ 151.869049][ T38] audit: type=1400 audit(1575021711.286:72): avc: denied { write } for pid=18008 comm="syz-executor.0" name="net" dev="proc" ino=63983 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 10:01:51 executing program 3: keyctl$get_security(0x11, 0x0, 0x0, 0x0) 10:01:51 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmmsg$inet(r0, &(0x7f0000004b00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x40000}}], 0x1, 0x0) [ 151.902841][T18017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18017 comm=syz-executor.1 10:01:51 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x42, 0x0) 10:01:51 executing program 4: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x8}, 0x0) 10:01:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x1, &(0x7f0000000380)=@raw=[@func], &(0x7f0000000340)='GPL\x00', 0x80000000, 0xeb, &(0x7f0000000080)=""/235, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:51 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000036c0)={'vxcan1\x00'}) 10:01:51 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='schedstat\x00') 10:01:51 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x42, 0x0) 10:01:51 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(&(0x7f0000000400)='bdev', &(0x7f0000000440)='./file0\x00', 0x0, 0x2000, 0x0) [ 151.961222][ T38] audit: type=1400 audit(1575021711.326:73): avc: denied { add_name } for pid=18008 comm="syz-executor.0" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 10:01:51 executing program 1: io_setup(0x10001, &(0x7f0000000380)) 10:01:51 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/set/pfWey\x06\x00', 0x0, 0x0) 10:01:51 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 10:01:51 executing program 5: ioprio_set$pid(0x2, 0x0, 0x0) 10:01:51 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x42, 0x0) 10:01:51 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 10:01:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 152.059875][ T38] audit: type=1400 audit(1575021711.326:74): avc: denied { create } for pid=18008 comm="syz-executor.0" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 10:01:51 executing program 1: bpf$MAP_CREATE(0x7, &(0x7f0000000040), 0x3c) 10:01:51 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 10:01:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x1, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:51 executing program 3: setpgid(0x0, 0x0) 10:01:51 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x3, 0x2) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, 0x0) 10:01:51 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) 10:01:51 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 10:01:51 executing program 3: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 10:01:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x1, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:51 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind(r0, 0x0, 0x1d) 10:01:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x1, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:51 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x24}, 0x0) 10:01:51 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000c40)='/selinux/enforce\x00', 0x481, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000d00)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "ef0100", "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"}}, 0x110) 10:01:51 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) 10:01:51 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) 10:01:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x6, 0x90, [0x20000900, 0x0, 0x0, 0x20000bec, 0x20000f18], 0x0, 0x0, &(0x7f0000000900)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x108) 10:01:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x1, &(0x7f00000000c0)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:51 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) preadv(r0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/143, 0x8f}], 0x1, 0x0) 10:01:51 executing program 1: sysfs$3(0x3) 10:01:51 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$binderN(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) clone3(&(0x7f0000000e40)={0x20000, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000d40)=""/66, 0x42, 0x0, 0x0}, 0x50) 10:01:51 executing program 4: nanosleep(0x0, 0x0) 10:01:51 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:01:51 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000000), 0x0, 0x8) 10:01:51 executing program 5: sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x4}}]}) 10:01:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x1, 0x200, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) 10:01:51 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:01:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x1e, r0, 0x0) 10:01:51 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000b40)={@link_local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "ff57fe", 0x8, 0x0, 0x0, @remote, @remote, {[], @icmpv6=@echo_reply}}}}}, 0x0) [ 152.504281][T18138] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:51 executing program 4: socket$rxrpc(0x21, 0x2, 0xa) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:51 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:01:51 executing program 3: setrlimit(0x0, &(0x7f0000000000)) 10:01:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x100000) 10:01:51 executing program 3: dup(0xffffffffffffffff) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 10:01:52 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$audion(&(0x7f0000001d00)='/dev/audio#\x00', 0x0, 0x240001) syz_open_dev$midi(0x0, 0x0, 0x0) 10:01:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) [ 152.654664][T18167] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:52 executing program 5: sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x4}}]}) 10:01:52 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:01:52 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0xe9411babd63a4d21) 10:01:52 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$audion(&(0x7f0000001d00)='/dev/audio#\x00', 0x0, 0x240001) syz_open_dev$midi(0x0, 0x0, 0x0) 10:01:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x11, r0, r1) 10:01:52 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x40, 0x0) 10:01:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), 0x4) 10:01:52 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$audion(&(0x7f0000001d00)='/dev/audio#\x00', 0x0, 0x240001) syz_open_dev$midi(0x0, 0x0, 0x0) 10:01:52 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid\x00') fcntl$setpipe(r0, 0x407, 0x0) 10:01:52 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x4000) [ 152.848556][T18199] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:52 executing program 2: setuid(0x0) 10:01:52 executing program 3: syz_genetlink_get_family_id$devlink(0x0) 10:01:52 executing program 5: sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x4}}]}) 10:01:52 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:01:52 executing program 1: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 10:01:52 executing program 0: uname(0x0) 10:01:52 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$audion(&(0x7f0000001d00)='/dev/audio#\x00', 0x0, 0x240001) syz_open_dev$midi(0x0, 0x0, 0x0) 10:01:52 executing program 3: mlockall(0x2) 10:01:52 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 10:01:52 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000001980)=0x9, 0x4) 10:01:52 executing program 0: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x1, &(0x7f00000012c0)=[{0x0}], 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid', 0x3d, {[], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x38], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12a28a6574ef9e8]}}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<'}}]}) 10:01:52 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x0, 0x3}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0xe8) [ 153.070174][T18240] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:52 executing program 4: futex(&(0x7f0000000080), 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) [ 153.100793][T18251] FAT-fs (loop0): Unrecognized mount option "fsuuid=" or missing value 10:01:52 executing program 3: fanotify_init(0xa, 0x0) 10:01:52 executing program 5: sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x4}}]}) 10:01:52 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 10:01:52 executing program 1: setgroups(0x0, 0x0) 10:01:52 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 10:01:52 executing program 0: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x1, &(0x7f00000012c0)=[{0x0}], 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid', 0x3d, {[], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x38], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12a28a6574ef9e8]}}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<'}}]}) 10:01:52 executing program 3: keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 10:01:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x4, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xc}, @call, @initr0], &(0x7f0000000100)='GPL\x00', 0x5, 0xcc, &(0x7f0000000140)=""/204, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:52 executing program 4: r0 = getpgid(0x0) kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:01:52 executing program 3: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xce6b124c7f4b4c23, 0x0) 10:01:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00'}, 0x45c) [ 153.302652][T18277] FAT-fs (loop0): Unrecognized mount option "fsuuid=" or missing value [ 153.318072][T18283] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00'}, 0x45c) 10:01:52 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/50) 10:01:52 executing program 0: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x1, &(0x7f00000012c0)=[{0x0}], 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid', 0x3d, {[], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x38], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12a28a6574ef9e8]}}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<'}}]}) 10:01:52 executing program 1: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) getresgid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) 10:01:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00'}, 0x45c) 10:01:52 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:52 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) [ 153.522119][T18318] FAT-fs (loop0): Unrecognized mount option "fsuuid=" or missing value 10:01:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 10:01:52 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x0) [ 153.539960][T18319] [EXFAT] trying to mount... 10:01:52 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) 10:01:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00'}, 0x45c) [ 153.555080][T18319] [EXFAT] ffsMountVol failed 10:01:53 executing program 0: syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x1, &(0x7f00000012c0)=[{0x0}], 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid', 0x3d, {[], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x38], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12a28a6574ef9e8]}}}, {@pcr={'pcr'}}, {@fowner_lt={'fowner<'}}]}) 10:01:53 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) 10:01:53 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) 10:01:53 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) [ 153.683038][T18331] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, 0x0, 0x0) 10:01:53 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) [ 153.726217][T18350] FAT-fs (loop0): Unrecognized mount option "fsuuid=" or missing value 10:01:53 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) 10:01:53 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) [ 153.900569][T18331] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:53 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001080)) 10:01:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, 0x0, 0x0) 10:01:53 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) 10:01:53 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) 10:01:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 10:01:53 executing program 0: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 10:01:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80401, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) dup2(r1, r0) 10:01:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, 0x0, 0x0) 10:01:53 executing program 0: clock_gettime(0x4, &(0x7f00000005c0)) 10:01:53 executing program 2: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, 0x0, 0x0) 10:01:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:53 executing program 0: syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x6}, 0x0) 10:01:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, 0x0, 0x0) 10:01:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80401, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) dup2(r1, r0) 10:01:53 executing program 2: listxattr(0x0, 0x0, 0x0) [ 154.221572][T18398] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:53 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) [ 154.289872][T18400] ISOFS: Unable to identify CD-ROM format. 10:01:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80401, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) dup2(r1, r0) 10:01:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSFLAGS(r0, 0x80108906, 0x0) 10:01:53 executing program 0: syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x6}, 0x0) 10:01:53 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 10:01:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 10:01:53 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) [ 154.476312][T18434] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80401, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) dup2(r1, r0) 10:01:53 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x9d0000, 0x7, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u32=0x0}}) 10:01:53 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) [ 154.528496][T18439] ISOFS: Unable to identify CD-ROM format. 10:01:53 executing program 0: syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x6}, 0x0) 10:01:53 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000100)="e3f746a47711ef829c30700d6a1d87d270e71e93c125a3117b537218b512c8000000000000000000366a000000000000"}, 0xb3) 10:01:54 executing program 0: syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) select(0x40, &(0x7f0000000000)={0x9}, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x6}, 0x0) 10:01:54 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x20002, 0x0) 10:01:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:54 executing program 2: move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x13) 10:01:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)={[{@data_writeback='data=writeback'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset%%$\\'}}, {@smackfshat={'smackfshat', 0x3d, 'keyring#-vboxnet0bdev,proc'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) 10:01:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:54 executing program 4: io_uring_setup(0x0, 0x0) 10:01:54 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x20002, 0x0) 10:01:54 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x2) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) 10:01:54 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 154.735987][T18476] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:01:54 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x20002, 0x0) [ 154.775337][T18483] ISOFS: Unable to identify CD-ROM format. 10:01:54 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) 10:01:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@statfs_quantum={'statfs_quantum'}}, {@commit={'commit', 0x3d, 0x8}}]}) 10:01:54 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x20002, 0x0) 10:01:54 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000001980), 0x4) 10:01:54 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup2(0xffffffffffffffff, r0) 10:01:54 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000001980)=0x2, 0xffed) 10:01:54 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$usbfs(r0, &(0x7f0000000600)=""/212, 0x200006d4) 10:01:54 executing program 1: bpf$MAP_LOOKUP_ELEM(0x12, 0x0, 0x0) 10:01:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:54 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 10:01:54 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) [ 154.999624][T18516] gfs2: not a GFS2 filesystem 10:01:54 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:01:54 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) [ 155.124895][T18537] ISOFS: Unable to identify CD-ROM format. 10:01:54 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) 10:01:54 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0xf843b84ea8b060b2, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) 10:01:54 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 10:01:54 executing program 0: prctl$PR_SET_PDEATHSIG(0x1, 0x0) 10:01:54 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:01:54 executing program 0: syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:54 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0}) 10:01:54 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 155.317613][T18557] ceph: device name is missing path (no : separator in /dev/loop0) 10:01:54 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 10:01:54 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f0000000900)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "7e082c8c5bd815366c9d665e009c2737f0955fb072966f07f9c1efd216745ca488089d1f442e736185274e8c4a3c2ecf0a4526b6956a48493d4484afbafcef", 0x18}, 0x60) 10:01:54 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RCREATE(r0, 0x0, 0x0) 10:01:54 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:01:54 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) 10:01:54 executing program 5: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@session={'session'}}]}) 10:01:54 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:01:54 executing program 3: renameat(0xffffffffffffffff, &(0x7f0000002040)='./file0\x00', 0xffffffffffffffff, 0x0) 10:01:54 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 155.489854][T18557] ceph: device name is missing path (no : separator in /dev/loop0) [ 155.584786][T18593] hfs: invalid session number or type of track [ 155.596688][T18593] hfs: can't find a HFS filesystem on dev loop5 10:01:55 executing program 1: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) 10:01:55 executing program 4: mknod$loop(0x0, 0x0, 0x1) 10:01:55 executing program 3: waitid(0x2, 0x0, 0x0, 0x8, 0x0) 10:01:55 executing program 0: syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:55 executing program 1: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x2, 0x0) 10:01:55 executing program 3: fsopen(&(0x7f0000000640)='hugetlbfs\x00', 0x0) [ 155.711076][T18626] ceph: device name is missing path (no : separator in /dev/loop0) 10:01:55 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/snapshot\x00', 0x802, 0x0) [ 155.735716][T18593] hfs: invalid session number or type of track 10:01:55 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) [ 155.749362][T18593] hfs: can't find a HFS filesystem on dev loop5 10:01:55 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) 10:01:55 executing program 3: getresgid(0x0, 0x0, 0x0) 10:01:55 executing program 0: syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:55 executing program 1: syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x800) 10:01:55 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x2, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(r1, r0) 10:01:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 10:01:55 executing program 3: timer_getoverrun(0x0) 10:01:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 10:01:55 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000100)={{0x0, @name="8ff15e7b2fbf977f46424589d7f08be90008d2ee1ab65868729fe545f3faf12e"}, 0x8}) 10:01:55 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) [ 155.952086][T18659] ceph: device name is missing path (no : separator in /dev/loop0) 10:01:55 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) 10:01:55 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x28, 0x0, 0x0, "e838046409595c1635bf4fdf727babe717"}], 0x28}}], 0x1, 0x0) [ 155.974827][ T38] audit: type=1400 audit(1575021715.396:75): avc: denied { name_bind } for pid=18665 comm="syz-executor.5" src=20002 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 10:01:55 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) 10:01:55 executing program 4: munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) [ 156.024271][ T38] audit: type=1400 audit(1575021715.426:76): avc: denied { node_bind } for pid=18665 comm="syz-executor.5" saddr=172.20.20.18 src=20002 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 10:01:55 executing program 0: syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:55 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x28, 0x0, 0x0, "e838046409595c1635bf4fdf727babe717"}], 0x28}}], 0x1, 0x0) 10:01:55 executing program 2: r0 = io_uring_setup(0x755, &(0x7f0000000140)) r1 = io_uring_setup(0x755, &(0x7f0000000140)) pipe2(0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r1], 0x3) 10:01:55 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000005c0)) 10:01:55 executing program 4: socket$inet(0x2, 0xa, 0x7d) [ 156.083750][T18692] ceph: device name is missing path (no : separator in /dev/loop0) 10:01:55 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) 10:01:55 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x28, 0x0, 0x0, "e838046409595c1635bf4fdf727babe717"}], 0x28}}], 0x1, 0x0) 10:01:55 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000005c0)) 10:01:55 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) 10:01:55 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmmsg(r0, &(0x7f00000034c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[{0x28, 0x0, 0x0, "e838046409595c1635bf4fdf727babe717"}], 0x28}}], 0x1, 0x0) 10:01:55 executing program 4: socket$bt_cmtp(0x1f, 0x3, 0x5) 10:01:55 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 10:01:55 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000005c0)) 10:01:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 10:01:55 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x0, 0x989680}}) 10:01:55 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000001980), 0x4) 10:01:55 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCMSET(r0, 0x5418, 0x0) 10:01:55 executing program 1: io_uring_setup(0x0, &(0x7f0000000880)={0x0, 0x0, 0x14}) 10:01:55 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, 0x0) 10:01:55 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000005c0)) 10:01:55 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x7, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u32=0x0}}) 10:01:55 executing program 5: set_mempolicy(0x8003, &(0x7f0000000840), 0x0) 10:01:55 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, 0x0, 0x0) 10:01:55 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/btrfs-control\x00', 0x200000, 0x0) 10:01:55 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x7, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u32=0x0}}) 10:01:55 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:01:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 10:01:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4000, 0x400}, 0x3c) 10:01:55 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x7, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u32=0x0}}) 10:01:56 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, 0x0) 10:01:56 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, 0x0, 0x0) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x0) [ 156.598507][T18779] hfs: can't find a HFS filesystem on dev loop3 10:01:56 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, 0x0, 0x0) 10:01:56 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x7, 0x0, [], &(0x7f0000000080)={0x0, 0x0, [], @p_u32=0x0}}) [ 156.614678][ T38] audit: type=1400 audit(1575021716.026:77): avc: denied { setattr } for pid=18796 comm="syz-executor.5" name="fscreate" dev="proc" ino=67697 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 10:01:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4000, 0x400}, 0x3c) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x0) 10:01:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4000, 0x400}, 0x3c) 10:01:56 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, 0x0, 0x0) [ 156.704502][T18779] hfs: can't find a HFS filesystem on dev loop3 10:01:56 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, 0x0) 10:01:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x0) 10:01:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x4000, 0x400}, 0x3c) 10:01:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 10:01:56 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, 0x0) 10:01:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x0) 10:01:56 executing program 0: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) stat(0x0, 0x0) creat(0x0, 0x0) clone3(&(0x7f0000000e40)={0x20000, &(0x7f0000000c80), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:01:56 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) 10:01:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 10:01:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 10:01:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) [ 157.002468][T18861] debugfs: File '18853' in directory 'proc' already present! 10:01:56 executing program 5: migrate_pages(0x0, 0x5, 0x0, &(0x7f00000004c0)=0x8001) 10:01:56 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='\x00', 0x1) 10:01:56 executing program 0: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 10:01:56 executing program 5: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) 10:01:56 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, 0x0) 10:01:56 executing program 0: r0 = getpgid(0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) 10:01:56 executing program 5: msgget$private(0x0, 0x0) 10:01:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 10:01:56 executing program 2: r0 = io_uring_setup(0xba4, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 10:01:56 executing program 0: openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x0) 10:01:56 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x408) 10:01:56 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)) 10:01:56 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 10:01:56 executing program 3: r0 = inotify_init() ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) 10:01:56 executing program 4: syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x408) 10:01:56 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r0, 0x4, 0x0, 0x0, 0x0) [ 157.282910][T18920] debugfs: File '18918' in directory 'proc' already present! 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x408) 10:01:56 executing program 1: socket$unix(0x1, 0x2, 0x0) 10:01:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 10:01:56 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@quota='quota'}], [{@context={'context', 0x3d, 'staff_u'}}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000007c0)) geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x37], 0x2d, [0x65, 0x0, 0x0, 0x36], 0x2d, [0x0, 0x63, 0x33, 0x33], 0x2d, [0x0, 0x0, 0x66], 0x2d, [0x0, 0x38, 0x0, 0x0, 0x38]}}}, {@euid_gt={'euid>'}}, {@smackfsfloor={'smackfsfloor'}}, {@euid_gt={'euid>'}}]}) 10:01:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000280)={0x0, 0x0, 0x0, @stepwise}) 10:01:56 executing program 3: syz_open_dev$mouse(&(0x7f0000002a40)='/dev/input/mouse#\x00', 0x0, 0x0) 10:01:56 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x19, 0x0, 0x0) 10:01:56 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fchmod(r0, 0x408) 10:01:56 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) epoll_wait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0) 10:01:56 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) 10:01:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x4061a50, r0, 0x0) 10:01:56 executing program 2: msgctl$IPC_INFO(0xffffffffffffffff, 0x3, 0x0) 10:01:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@usrquota='usrquota'}, {@nodiscard='nodiscard'}], [{@context={'context', 0x3d, 'staff_u'}}, {@dont_appraise='dont_appraise'}]}) 10:01:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid'}}]}) [ 157.547175][T18973] jfs: Unrecognized mount option "dont_appraise" or missing value 10:01:56 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$sock(r0, &(0x7f0000000800)={&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000140)="01c47b1547d1cf5226be9196dcd80e532ae7588b7783290221dde96c08cb7eed91c3716cabd5f9cb3e4abc473600454c3f20ce0ffa7f34242ba675c7d519f2575e8cc7d0dbc3d557f442e45e6dcffe094085a25da2ec78b8c1f32731529fdb62a2809fd372a97e56737d203bdbb645734afd7cd3fd913581f53387445450bba0e58cf5ed561636805c", 0x89}, {&(0x7f0000000200)="55c433936ddee11ea8e4151a23e4ec7ed19a9d2a86ed16643e76d4c763baaaa8ca6cf26a9fac49a68652ff9eaa23dffac8223181f394c5157d2e58ca69897cc06a19896420f5da5f547d5dbc214b9e3020ce53247484e436c877e478ebb69c4a50f056b74c901f45af5538a89eb35884353f3c1508611b9008a70a6077c74df788b9e85783dab3a0497e762b9da78fa759d9e187de16b85ccf018738a3f6fe1f0c343d031d053e722926a8005aec66a87215e0f9e868991682441c76f562349adabb655f8a40b4086930", 0xca}, {&(0x7f0000000300)="bb86db7e8cc9e70c90f7b2f51da0ce71e0ccc4e52b4324f9e22f0f539a32d1408821c5ef086d9dc05c51f6c0032925eb6825996d369e2011cd2e43e175dd2ffe580fed29b23437435714f6c83eaddb229570c746b04c23d3ae2478d3457e1d626ee6b6951c0cd368f1774e633d8c3f73e2f1062aba422f3d1f80a64a349051684f99dcd2a7e07086995223b8", 0x8c}, {&(0x7f00000003c0)="ecfe0e6eef6a91203f0308ca4f56aa95222c262edb", 0x15}, {&(0x7f0000000400)="359720dbd7cfa913e77d21ca0e0572ffeb24968ad303aa5217e6d999d4250a3c00c935ef2f", 0x25}], 0x5}, 0x0) 10:01:56 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x24000, 0x0) syz_open_dev$mouse(&(0x7f00000068c0)='/dev/input/mouse#\x00', 0x9, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) connect(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000006a40)='./file0\x00', 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000006f40)='/dev/sequencer\x00', 0x20440, 0x0) 10:01:57 executing program 4: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 10:01:57 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000100)='big_key\x00', 0x0, 0x0, 0x0, r0) 10:01:57 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(r0, 0x0, 0x0) [ 157.616858][T18979] FAT-fs (loop1): Unrecognized mount option "fsuuid=" or missing value [ 157.629148][T18973] jfs: Unrecognized mount option "dont_appraise" or missing value 10:01:57 executing program 2: setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 10:01:57 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x400) 10:01:57 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)) 10:01:57 executing program 4: io_setup(0xb849, &(0x7f0000000240)=0x0) io_destroy(r0) 10:01:57 executing program 5: inotify_init1(0x0) [ 157.765450][T18979] FAT-fs (loop1): Unrecognized mount option "fsuuid=" or missing value 10:01:57 executing program 0: clone3(&(0x7f0000000700)={0xc0831000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:01:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x200, 0x400, 0x142}, 0x3c) 10:01:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x8, r0, r1) 10:01:57 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) 10:01:57 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x7, 0x0) 10:01:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid'}}]}) 10:01:57 executing program 2: futex(&(0x7f0000000000), 0x3, 0x0, 0x0, 0x0, 0x0) 10:01:57 executing program 3: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffe) 10:01:57 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read(r0, &(0x7f0000000080)=""/136, 0x88) 10:01:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0}, 0x70) 10:01:57 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendmsg$alg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:01:57 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:57 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') [ 157.965922][T19045] FAT-fs (loop1): Unrecognized mount option "fsuuid=" or missing value 10:01:57 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000001980), 0x4) 10:01:57 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:57 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:57 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid'}}]}) 10:01:57 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 10:01:57 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) [ 158.133219][T19068] FAT-fs (loop1): Unrecognized mount option "fsuuid=" or missing value 10:01:58 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 10:01:58 executing program 5: timerfd_create(0x0, 0x0) 10:01:58 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:58 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@fat=@debug='debug'}, {@fat=@errors_remount='errors=remount-ro'}, {@fat=@errors_continue='errors=continue'}, {@fat=@nocase='nocase'}], [{@fsuuid={'fsuuid'}}]}) 10:01:58 executing program 0: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:58 executing program 5: bpf$PROG_LOAD(0x14, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 158.794807][T19090] FAT-fs (loop1): Unrecognized mount option "fsuuid=" or missing value 10:01:58 executing program 2: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:58 executing program 3: openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000880)='/dev/dsp\x00', 0x4000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/status\x00', 0x0, 0x0) 10:01:58 executing program 4: bpf$MAP_CREATE(0x6, &(0x7f0000000040), 0x3c) 10:01:58 executing program 5: setreuid(0x0, 0xee00) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 10:01:58 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:01:58 executing program 4: bpf$MAP_CREATE(0x18, 0x0, 0x0) 10:01:58 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 10:01:58 executing program 0: waitid(0x0, 0x0, 0x0, 0x8, 0x0) 10:01:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r0, &(0x7f0000000280)=""/41, 0x29) 10:01:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r0, &(0x7f0000000280)=""/41, 0x29) 10:01:58 executing program 4: clock_gettime(0x2, &(0x7f0000000200)) 10:01:58 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read(r0, 0x0, 0x0) 10:01:58 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 10:01:58 executing program 5: memfd_create(0x0, 0x0) 10:01:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000080)) 10:01:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r0, &(0x7f0000000280)=""/41, 0x29) 10:01:58 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='[\x00', 0x0, 0x0) 10:01:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, 0x0}, 0x70) 10:01:58 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 10:01:58 executing program 5: unlinkat(0xffffffffffffffff, 0x0, 0x0) [ 159.138526][T19148] FAT-fs (loop4): bogus number of reserved sectors [ 159.148850][T19148] FAT-fs (loop4): Can't find a valid FAT filesystem 10:01:58 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_security(0x11, r0, &(0x7f0000000280)=""/41, 0x29) 10:01:58 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 10:01:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 10:01:58 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 10:01:58 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) 10:01:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f00000000c0)) [ 159.232265][T19148] FAT-fs (loop4): bogus number of reserved sectors [ 159.262182][T19148] FAT-fs (loop4): Can't find a valid FAT filesystem 10:01:58 executing program 4: syz_mount_image$nfs(&(0x7f00000002c0)='nfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:58 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, 0x0) 10:01:58 executing program 2: flistxattr(0xffffffffffffffff, 0x0, 0x0) 10:01:58 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) 10:01:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 10:01:58 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/235, 0xeb}, {&(0x7f0000000380)=""/109, 0x6d}], 0x4}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000b00)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000001c40)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x38) syz_open_dev$swradio(&(0x7f0000001c80)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FLOPPY_FDDEFPRM(0xffffffffffffffff, 0x40200243, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x8, 0x4c44, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000002600)) getgroups(0x0, 0x0) 10:01:58 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) 10:01:58 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x5}, 0x0, 0x0) 10:01:58 executing program 2: prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 10:01:58 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/235, 0xeb}, {&(0x7f0000000380)=""/109, 0x6d}], 0x4}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000b00)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000001c40)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x38) syz_open_dev$swradio(&(0x7f0000001c80)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FLOPPY_FDDEFPRM(0xffffffffffffffff, 0x40200243, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x8, 0x4c44, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000002600)) getgroups(0x0, 0x0) 10:01:58 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, &(0x7f0000000040)) 10:01:58 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0) 10:01:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 10:01:59 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/235, 0xeb}, {&(0x7f0000000380)=""/109, 0x6d}], 0x4}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000b00)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000001c40)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x38) syz_open_dev$swradio(&(0x7f0000001c80)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FLOPPY_FDDEFPRM(0xffffffffffffffff, 0x40200243, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x8, 0x4c44, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000002600)) getgroups(0x0, 0x0) 10:01:59 executing program 1: bpf$PROG_LOAD(0x16, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:59 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 10:01:59 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000002c0)) 10:01:59 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000000)=""/224, 0xffffffffffffff9a) 10:01:59 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, 0x0, 0x0) 10:01:59 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x0, 0x0) ppoll(&(0x7f0000000280)=[{r0}], 0x1, 0x0, 0x0, 0x0) 10:01:59 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000001980), 0x4) 10:01:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=';', 0x1}], 0x1) 10:01:59 executing program 1: clone3(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffefc}, 0xffffffffffffffd7) 10:01:59 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/235, 0xeb}, {&(0x7f0000000380)=""/109, 0x6d}], 0x4}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000b00)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000001c40)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x38) syz_open_dev$swradio(&(0x7f0000001c80)='/dev/swradio#\x00', 0x1, 0x2) ioctl$FLOPPY_FDDEFPRM(0xffffffffffffffff, 0x40200243, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x8, 0x4c44, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000002600)) getgroups(0x0, 0x0) 10:01:59 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000002c0)={'mangle\x00'}, &(0x7f0000000340)=0x54) 10:01:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x46d5048d0628df56, 0x0) 10:01:59 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:01:59 executing program 2: syz_emit_ethernet(0x11, &(0x7f0000000180)={@broadcast, @empty, [], {@llc_tr={0x11, {@llc={0x0, 0x0, "1a"}}}}}, 0x0) 10:01:59 executing program 5: r0 = userfaultfd(0x0) fcntl$addseals(r0, 0x409, 0x0) 10:01:59 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 10:01:59 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, 0x0) 10:01:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) 10:01:59 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 10:01:59 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:01:59 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:01:59 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 10:01:59 executing program 2: clock_nanosleep(0x0, 0x0, 0x0, 0x0) 10:01:59 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) read(r0, &(0x7f0000000080)=""/136, 0x88) 10:01:59 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:01:59 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:02:00 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, 0x0) 10:02:00 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:02:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}}, 0x42a) 10:02:00 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 10:02:00 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/\awt/pfkey\x00', 0x0, 0x0) 10:02:00 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 10:02:00 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 10:02:00 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0xc, @raw_data="e038c38c45bdcec3d1ba11da99da3a3b96a42365f151d3e852e784ce43d17b022cf925240a01b5ec03e895e245bb7110d879edd2aa04905695d6a6486c5d5233719d621e1be7650c9bb58b23120f9fc433576c45862171bd95bdf6950d68ec6114c3ba29b5f017b4e0fcb9a58aa11284e2ef43ce7b54de3f629b82a5a2da8ca1cd5aac0a68978998dbb32522da0f85d0be9fe280c74a841eae2de242d1972100f32549ea7e13b94fa14a03dd5bd8cd7638c71472ef5f61c0c24d938ce3fe22d8dc86270b4ca9cec8"}) 10:02:00 executing program 2: openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x104080, 0x0) 10:02:00 executing program 3: syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='iocharset=default,errors=continue,utf8,fmask=00000000000000000010000,dmask=0']) 10:02:00 executing program 1: add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 10:02:00 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 10:02:00 executing program 1: get_robust_list(0x0, 0x0, &(0x7f0000000240)) 10:02:00 executing program 0: mount$9p_rdma(&(0x7f0000000880)='127.0.0.1\x00', 0x0, 0x0, 0x0, 0x0) 10:02:00 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000002440)='team\x00') [ 160.798983][T19357] [EXFAT] trying to mount... [ 160.829401][T19357] [EXFAT] ffsMountVol failed 10:02:00 executing program 0: io_uring_setup(0xba4, &(0x7f0000000100)) 10:02:00 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000180), &(0x7f0000000100)=0xffffffffffffff2f) 10:02:00 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000002440)='team\x00') 10:02:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c}, 0x1c}}, 0x0) 10:02:00 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 10:02:00 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[], [{@euid_gt={'euid>'}}]}) geteuid() syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x36], 0x2d, [0x65], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) [ 160.914415][T19357] [EXFAT] trying to mount... [ 160.921067][T19357] [EXFAT] ffsMountVol failed 10:02:00 executing program 3: syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='iocharset=default,errors=continue,utf8,fmask=00000000000000000010000,dmask=0']) 10:02:00 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000002440)='team\x00') 10:02:00 executing program 1: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)='m', 0x1) 10:02:00 executing program 0: migrate_pages(0x0, 0x401, &(0x7f0000000080), &(0x7f00000000c0)=0x3) 10:02:00 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:02:00 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000002440)='team\x00') 10:02:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgrou\b\x00\x00\x00\x00\x00\x00\x00z1\x00', 0x1ff) 10:02:00 executing program 0: epoll_pwait(0xffffffffffffffff, &(0x7f0000001680)=[{}], 0x1, 0x0, &(0x7f0000001700)={0x4}, 0x8) 10:02:00 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:02:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgrou\b\x00\x00\x00\x00\x00\x00\x00z1\x00', 0x1ff) 10:02:00 executing program 2: get_robust_list(0xffffffffffffffff, 0x0, 0x0) [ 161.164431][T19419] [EXFAT] trying to mount... [ 161.172992][T19419] [EXFAT] ffsMountVol failed 10:02:00 executing program 2: open(&(0x7f0000001e40)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000002300)='./file0\x00', 0x0) 10:02:00 executing program 3: syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='iocharset=default,errors=continue,utf8,fmask=00000000000000000010000,dmask=0']) 10:02:00 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000140)={0x0, 0x3, 0x5, 0x8, 0x2, 0x6}) r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0), 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x9, &(0x7f0000000240)=0x3, 0x4) syz_open_dev$mice(&(0x7f0000001a40)='/dev/input/mice\x00', 0x0, 0x826000) 10:02:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgrou\b\x00\x00\x00\x00\x00\x00\x00z1\x00', 0x1ff) 10:02:00 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:02:00 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[], [{@euid_gt={'euid>'}}]}) geteuid() syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x36], 0x2d, [0x65], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:02:00 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:02:00 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgrou\b\x00\x00\x00\x00\x00\x00\x00z1\x00', 0x1ff) [ 161.303789][T19459] [EXFAT] trying to mount... 10:02:00 executing program 2: request_key(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) [ 161.348086][T19459] [EXFAT] ffsMountVol failed 10:02:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') 10:02:00 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) 10:02:00 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[], [{@euid_gt={'euid>'}}]}) geteuid() syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x36], 0x2d, [0x65], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:02:00 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) flock(r0, 0x7) 10:02:00 executing program 3: syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='iocharset=default,errors=continue,utf8,fmask=00000000000000000010000,dmask=0']) 10:02:00 executing program 2: request_key(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) 10:02:00 executing program 1: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) 10:02:00 executing program 0: io_setup(0x6, &(0x7f0000000000)) 10:02:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:00 executing program 2: request_key(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) 10:02:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x1e, r0, r1) 10:02:01 executing program 2: request_key(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0xfffffffffffffffd) 10:02:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) [ 161.644202][T19501] [EXFAT] trying to mount... [ 161.650453][T19501] [EXFAT] ffsMountVol failed 10:02:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) [ 161.668436][T19513] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:02:01 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[], [{@euid_gt={'euid>'}}]}) geteuid() syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x36], 0x2d, [0x65], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:02:01 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x9260000, 0x0) [ 161.763297][T19513] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:02:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x6, r0, 0x0) 10:02:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) 10:02:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x6, r0, 0x0) 10:02:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) 10:02:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:01 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1, 0x76c) 10:02:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x6, r0, 0x0) 10:02:01 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40001, 0x0) 10:02:01 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4}) 10:02:01 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/55) 10:02:01 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/55) 10:02:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x6, r0, 0x0) 10:02:01 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$netlink(r0, &(0x7f0000003400)={&(0x7f0000000000), 0xc, &(0x7f0000003340)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 10:02:01 executing program 3: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) [ 162.193990][T19572] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:02:01 executing program 0: clone3(&(0x7f0000000700)={0xc0831000, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:02:01 executing program 4: fanotify_init(0x10, 0x0) 10:02:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:01 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x0, 0x0) 10:02:01 executing program 0: syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x2, 0x2) 10:02:01 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/55) 10:02:01 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_netdev_private(r0, 0x89ff, 0x0) 10:02:01 executing program 3: add_key(&(0x7f0000000040)='.dead\x00', 0x0, 0x0, 0x0, 0x0) 10:02:01 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:01 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000080)='big_key\x00', 0x0, 0x0) 10:02:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x2}, 0x3c) [ 162.392361][T19611] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:02:01 executing program 2: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 10:02:01 executing program 1: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/55) 10:02:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:01 executing program 4: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:02:01 executing program 3: msgctl$IPC_STAT(0x0, 0x2, 0x0) 10:02:01 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 10:02:01 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f00000003c0)={[{@usrquota='usrquota'}, {@inode64='inode64'}], [{@hash='hash'}]}) 10:02:01 executing program 2: mmap$IORING_OFF_SQ_RING(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 162.531472][T19644] XFS (loop1): unknown mount option [hash]. 10:02:01 executing program 4: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) geteuid() mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:01 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) [ 162.546877][T19652] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 10:02:01 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:01 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5d}) 10:02:02 executing program 3: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 162.630122][T19644] XFS (loop1): unknown mount option [hash]. 10:02:02 executing program 2: chown(&(0x7f0000000000)='.\x00', 0x0, 0x0) 10:02:02 executing program 0: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:02 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) 10:02:02 executing program 5: keyctl$get_keyring_id(0x0, 0x0, 0x0) 10:02:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, @generic={0x0, "6024c699f10d3f66e0d82ad08888"}, @xdp, @ipx={0x4, 0x0, 0x0, "89478def7186"}}) 10:02:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000100)=""/195, 0x32, 0xc3, 0x1}, 0x20) 10:02:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 10:02:02 executing program 4: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000100)={0xfff, 0x39565559, 0x3, @discrete={0x6, 0x9}}) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x20000, 0x0) syz_open_dev$vcsa(0x0, 0x3fa, 0x10000) 10:02:02 executing program 3: clock_settime(0x7, 0x0) 10:02:02 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)) 10:02:02 executing program 5: bpf$MAP_CREATE(0x4, &(0x7f0000000040), 0x3c) 10:02:02 executing program 1: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 10:02:02 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 10:02:02 executing program 5: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 10:02:02 executing program 2: r0 = memfd_create(&(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0) fallocate(r0, 0x10, 0x0, 0x3) 10:02:02 executing program 3: rseq(0x0, 0x0, 0x0, 0x0) 10:02:02 executing program 3: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/206) 10:02:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 10:02:02 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/capi/capi20\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 10:02:02 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, 0x0) 10:02:02 executing program 2: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 10:02:02 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:02 executing program 5: ptrace$setregset(0x4205, 0xffffffffffffffff, 0x0, 0x0) 10:02:03 executing program 1: setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) 10:02:03 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000200)=""/5, 0x5}], 0x1) 10:02:03 executing program 2: shmdt(0x0) 10:02:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000040)={0xb, @sliced}) 10:02:03 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) tee(r0, r1, 0x71a, 0x0) 10:02:03 executing program 5: io_uring_setup(0xba4, &(0x7f0000000100)={0x0, 0x0, 0xc}) 10:02:03 executing program 2: syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001580)=[{0x0}, {0x0, 0x0, 0x80000000}]) 10:02:03 executing program 5: rt_sigsuspend(&(0x7f0000000140), 0x8) 10:02:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 10:02:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) 10:02:03 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x3c54cc187f1accd6, r0, 0x0) 10:02:03 executing program 3: syz_init_net_socket$llc(0x1a, 0x2, 0x0) 10:02:03 executing program 2: syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001580)=[{0x0}, {0x0, 0x0, 0x80000000}]) 10:02:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 10:02:03 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000640)={{0x77359400}}, 0x0) 10:02:03 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) 10:02:03 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x8, r0) 10:02:03 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000800)='/dev/udmabuf\x00', 0x2) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000840)=0x64090af573edb9d3) 10:02:03 executing program 0: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x402c00) ioctl$FLOPPY_FDTWADDLE(r0, 0x259) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet(0x2, 0xd27ecb7b00332d9d, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x40000, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000400)={0x2}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x8, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8095}, 0x20000003) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x88101024}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x8, r6, 0x804, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40c0040}, 0x2020) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r8, 0x8983, &(0x7f0000000440)={0x0, 'vcan0\x00', {0x1}, 0x5}) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f00000001c0)={0x1, 0x1}) 10:02:04 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$rfkill(r0, 0x0, 0x0) 10:02:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) 10:02:04 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) 10:02:04 executing program 2: syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001580)=[{0x0}, {0x0, 0x0, 0x80000000}]) 10:02:04 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x8, r0) 10:02:04 executing program 0: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x402c00) ioctl$FLOPPY_FDTWADDLE(r0, 0x259) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet(0x2, 0xd27ecb7b00332d9d, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x40000, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000400)={0x2}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x8, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8095}, 0x20000003) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x88101024}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x8, r6, 0x804, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40c0040}, 0x2020) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r8, 0x8983, &(0x7f0000000440)={0x0, 'vcan0\x00', {0x1}, 0x5}) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f00000001c0)={0x1, 0x1}) [ 164.780750][T19830] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=19830 comm=syz-executor.3 10:02:04 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x8, r0) 10:02:04 executing program 0: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x402c00) ioctl$FLOPPY_FDTWADDLE(r0, 0x259) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet(0x2, 0xd27ecb7b00332d9d, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x40000, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000400)={0x2}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x8, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8095}, 0x20000003) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x88101024}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x8, r6, 0x804, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40c0040}, 0x2020) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r8, 0x8983, &(0x7f0000000440)={0x0, 'vcan0\x00', {0x1}, 0x5}) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f00000001c0)={0x1, 0x1}) 10:02:04 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x100}, {r1}], 0x2, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) 10:02:04 executing program 5: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:02:04 executing program 2: syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001580)=[{0x0}, {0x0, 0x0, 0x80000000}]) 10:02:04 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) 10:02:04 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x8, r0) 10:02:04 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) [ 164.989723][T19866] fuse: Bad value for 'fd' 10:02:04 executing program 0: socket$l2tp(0x18, 0x1, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x402c00) ioctl$FLOPPY_FDTWADDLE(r0, 0x259) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet(0x2, 0xd27ecb7b00332d9d, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x40000, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000400)={0x2}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r4, 0x8, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8095}, 0x20000003) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x88101024}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x8, r6, 0x804, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40c0040}, 0x2020) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r8, 0x8983, &(0x7f0000000440)={0x0, 'vcan0\x00', {0x1}, 0x5}) ioctl$KDSETKEYCODE(r7, 0x4b4d, &(0x7f00000001c0)={0x1, 0x1}) 10:02:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) fchmod(r0, 0x0) 10:02:04 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x3d2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:02:04 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) 10:02:04 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) ioctl$SIOCNRDECOBS(r0, 0x89e2) 10:02:04 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) 10:02:04 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) [ 165.190653][T19866] fuse: Bad value for 'fd' 10:02:04 executing program 5: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:02:04 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x0, 0x0) 10:02:04 executing program 0: symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') 10:02:04 executing program 2: syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') 10:02:04 executing program 0: symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') 10:02:04 executing program 2: keyctl$set_timeout(0xf, 0x0, 0x0) 10:02:04 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, 0x0) 10:02:04 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) 10:02:04 executing program 0: symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') 10:02:04 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x440) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}], [{@seclabel='seclabel'}]}}) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000e40)='msdos\x00', &(0x7f0000000e80)='./file0\x00', 0x135900000000000, 0x2, &(0x7f00000012c0)=[{0x0, 0x0, 0xffff}, {0x0, 0x0, 0x8}], 0x2000, 0x0) 10:02:04 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/capi/capi20\x00', 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize'}}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}], [{@pcr={'pcr'}}]}}) 10:02:04 executing program 2: lookup_dcookie(0x0, 0x0, 0x0) [ 165.393033][T19920] fuse: Bad value for 'fd' 10:02:05 executing program 5: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:02:05 executing program 0: symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') 10:02:05 executing program 2: tgkill(0x0, 0x0, 0x0) 10:02:05 executing program 3: msgsnd(0x0, &(0x7f0000000000), 0x8, 0x0) 10:02:05 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x40000) [ 165.681475][T19938] fuseblk: Unknown parameter 'pcr' 10:02:05 executing program 2: clone3(0x0, 0x0) 10:02:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, 0x0) 10:02:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0xe, 0x1, &(0x7f0000001480)=ANY=[@ANYBLOB="94907b677800000000000000e13801a4740140000000004996bd1a320c608089ede07db74d63661bb1eddb8056b2c02d681d83f003dfa0243e11d349790e1ddf67726ec70e6ed4ea3f30bbe639abafa7848c61de338be25e48c6cced03240c82e141e22c1fd218b7b821621e058b3109dde52f37434fc32c07c7fa00245b4b087555d4c9ebb90186b3f800a9162b3a0900000056882643ce5a0300a60c4a4c3590fd74a0c519c06e067d17aef5d1c84338f9995df045002a58221cb54761673176193c7edd739c92d617053bfb90a301e844b75fca73407dfe65d2c0ccacdb2d415fcebf43ef8aa7abfbb23a15e30d8adaa2f6b4"], &(0x7f0000000280)='GPL\x00', 0x3, 0x1000, &(0x7f00000002c0)=""/4096, 0x0, 0x6, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000012c0), 0x8, 0x10, &(0x7f0000001300), 0x10}, 0x70) 10:02:05 executing program 1: semget$private(0x0, 0x4, 0x0) 10:02:05 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) [ 165.744899][T19971] fuse: Bad value for 'fd' 10:02:05 executing program 0: clone3(&(0x7f0000000340)={0x180500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:02:05 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/capi/capi20\x00', 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize'}}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}], [{@pcr={'pcr'}}]}}) 10:02:05 executing program 5: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:02:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x5, 0x0, r0) 10:02:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x10001) 10:02:05 executing program 1: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) 10:02:05 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000180)={0xc, 0x0, "ab9f32a0"}, 0x0) 10:02:05 executing program 1: socket$caif_stream(0x25, 0x1, 0x4) 10:02:05 executing program 2: creat(&(0x7f0000000b00)='./file0\x00', 0x0) getpgid(0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) 10:02:05 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x24}, 0x0) [ 166.051002][T20008] fuseblk: Unknown parameter 'pcr' 10:02:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) 10:02:05 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/capi/capi20\x00', 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize'}}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}], [{@pcr={'pcr'}}]}}) [ 166.101756][T20019] fuse: Bad value for 'fd' 10:02:05 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x24}, 0x0) 10:02:05 executing program 0: getrlimit(0x0, &(0x7f0000000000)) 10:02:05 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, 0x0) 10:02:05 executing program 2: creat(&(0x7f0000000b00)='./file0\x00', 0x0) getpgid(0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) 10:02:05 executing program 1: fsopen(0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x1040, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 10:02:05 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x24}, 0x0) 10:02:05 executing program 1: fsopen(0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x1040, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 10:02:05 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x24}, 0x0) 10:02:05 executing program 2: creat(&(0x7f0000000b00)='./file0\x00', 0x0) getpgid(0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) 10:02:05 executing program 5: bpf$MAP_CREATE(0xd, &(0x7f0000000040), 0x3c) 10:02:05 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/capi/capi20\x00', 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize'}}, {@max_read={'max_read'}}, {@default_permissions='default_permissions'}], [{@pcr={'pcr'}}]}}) 10:02:05 executing program 5: request_key(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)='fowner>', 0xfffffffffffffffd) bind$x25(0xffffffffffffffff, 0x0, 0x0) io_setup(0x31, &(0x7f00000009c0)) timerfd_create(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001100)='children\x00') write$cgroup_subtree(r0, 0x0, 0x0) 10:02:05 executing program 1: fsopen(0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x1040, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 10:02:05 executing program 2: creat(&(0x7f0000000b00)='./file0\x00', 0x0) getpgid(0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) 10:02:05 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000100)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x90) 10:02:05 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, 0x0) 10:02:05 executing program 1: fsopen(0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x1040, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 10:02:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000200)) 10:02:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) 10:02:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000200)) 10:02:06 executing program 4: setregid(0x0, 0x0) 10:02:06 executing program 5: syz_open_dev$dri(&(0x7f0000002f40)='/dev/dri/card#\x00', 0x0, 0x0) 10:02:06 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000040)=""/155) 10:02:06 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x105400, 0x0) 10:02:06 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, 0x0) 10:02:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000200)) 10:02:06 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) 10:02:06 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x3391}, 0x20) 10:02:06 executing program 1: prctl$PR_GET_THP_DISABLE(0xf) 10:02:06 executing program 5: socket$netlink(0x10, 0x3, 0x5) 10:02:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000200)) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) 10:02:06 executing program 3: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 10:02:06 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x105400, 0x0) 10:02:06 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 10:02:06 executing program 2: openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) getgroups(0x2, &(0x7f0000002b40)=[0xee00, 0xee01]) setgroups(0x5, &(0x7f0000002b80)=[0x0, 0x0, 0x0, 0x0, r0]) 10:02:06 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x105400, 0x0) 10:02:06 executing program 0: syz_mount_image$hfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, 0x0) 10:02:06 executing program 3: clone3(&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) 10:02:06 executing program 2: semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) 10:02:06 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x105400, 0x0) 10:02:06 executing program 5: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x5080) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) 10:02:06 executing program 3: clone3(&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:02:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) 10:02:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) 10:02:06 executing program 3: clone3(&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:02:06 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) 10:02:06 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000140)='9i', 0x2, r0) 10:02:06 executing program 1: syslog(0x3, 0x0, 0x0) 10:02:06 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xf4b8692c39af92df, 0x10, r0, 0x10000000) 10:02:06 executing program 3: clone3(&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10:02:06 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) [ 167.170449][T20203] XFS (loop2): Invalid superblock magic number [ 167.180811][T20222] QAT: Invalid ioctl 10:02:06 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/capi/capi20\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000001b40)='/dev/adsp#\x00', 0x0, 0xffffffffffffffff) 10:02:06 executing program 3: getgroups(0x0, 0x0) 10:02:06 executing program 4: clock_settime(0x0, 0x0) [ 167.588371][T20203] XFS (loop2): Invalid superblock magic number 10:02:07 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 10:02:07 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) 10:02:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 10:02:07 executing program 1: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:02:07 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xc01, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@remote, @rand_addr=0x5}, 0x8) write$P9_RWRITE(r0, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x80000001}, 0xb) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000100)={0x3f, {{0x2, 0x4e24, @multicast2}}}, 0x88) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000200)={0xc1, 0x1, {0x2d, 0x11, 0xa, 0x6, 0x7, 0x8, 0x3, 0x8c, 0x1}}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x9, 0x14002) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000280)=@in={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000480)=[{&(0x7f00000002c0)="7931ffb924fd5e909efb3f8f1af256d687b891a0f0e22ebbae68fd70707ea7c274ba8d42a16aaf1a240e5b64caa60898f3b9de4a92aa7efe5254b9e0c88faf65b8022f8c4d0f49dd56ae5a2d825ff54e7b26bd0be3efc4f99aff7d4e283679143cb981b76ed72a9981e850d233a55ccfc80409d09c125777c4fb394278f53cfc66c8960d39c07d81e3f298daa3af61a0a21b5cf345458ec9ad6ce833aeddaf0f067ba974b9a057d6e46115a0ad8e11ac05550b043abe53dcfb64464d68d4602fabd42bdc58b7c316be1803fd64d0e6623aea4693", 0xd4}, {&(0x7f00000003c0)="080ee4578ccd34fdee89317227af63587e1f2f76ecfaad87dbb21862ae86f79d38baf91d14163ba2aa946c871605e44c71840e17e28ea8f70b636ae765db585941c8c4ae4ad01d05cc80d307f4ce054ba6ae65a0650e9f0236bd69f6fd1f92967b9fa6dde13799f82aca2d60994b3c5883498678b9cb39997ee8e52354", 0x7d}, {&(0x7f0000000440)="3e3783", 0x3}], 0x3, 0x0, 0x0, 0x20000000}, 0x800) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(r3, &(0x7f0000000500)=@pppol2tpv3in6, &(0x7f0000000580)=0x80) openat$md(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/md0\x00', 0x113140, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000680)={0x20000, &(0x7f0000000600)="ddd19513270795a0de6bc563ca8e3039a67531a1e282605ffde229c96eaf1d9ffd2abbdb516ab87da59cadb97d882a3ff69f79761326132778494d51ae05914324afeacb7a91c1a4ec403a569315f00fb93640710d748e5b01de5b5013c8d9a8f2c20e64e4c597dcc67232eda33b57a0c12125abbb2b0460141c1299e1"}) syz_open_dev$radio(&(0x7f00000006c0)='/dev/radio#\x00', 0x0, 0x2) 10:02:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) [ 167.923234][T20249] QAT: Invalid ioctl [ 167.933742][T20253] QAT: Invalid ioctl 10:02:07 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 10:02:07 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 10:02:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 10:02:07 executing program 1: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:02:07 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) [ 168.005077][T20259] QAT: Invalid ioctl [ 168.027523][T20269] QAT: Invalid ioctl 10:02:07 executing program 1: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:02:07 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) [ 168.058572][T20263] XFS (loop2): Invalid superblock magic number 10:02:07 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) [ 168.098268][T20287] QAT: Invalid ioctl 10:02:07 executing program 1: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 168.115262][T20290] QAT: Invalid ioctl 10:02:07 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 10:02:07 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) 10:02:07 executing program 4: syz_open_dev$cec(&(0x7f0000003e80)='/dev/cec#\x00', 0x2, 0x2) 10:02:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) 10:02:07 executing program 0: shmctl$SHM_UNLOCK(0x0, 0xc) 10:02:07 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) 10:02:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) 10:02:07 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 10:02:07 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, &(0x7f00000000c0), &(0x7f0000000140)={0x0}) 10:02:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) 10:02:07 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x0, 0x0}, 0x10) 10:02:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) 10:02:07 executing program 5: getgroups(0x1, &(0x7f0000000080)=[0xee01]) 10:02:07 executing program 3: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 10:02:07 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCSFLAGS(r0, 0x80047437, 0x0) 10:02:07 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) [ 168.540169][T20317] XFS (loop2): Invalid superblock magic number 10:02:07 executing program 5: r0 = getpgid(0x0) pidfd_open(r0, 0x0) 10:02:08 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0, 0x1746}], 0x1, 0x0, 0x0, 0x0) 10:02:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) 10:02:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x19) 10:02:08 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 10:02:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)}, 0x0) 10:02:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:02:08 executing program 1: socket$pppoe(0x18, 0x1, 0x0) 10:02:08 executing program 5: epoll_create(0x0) 10:02:08 executing program 1: sync() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:08 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x0) 10:02:08 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) 10:02:08 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000008c0)) 10:02:08 executing program 3: setfsgid(0x0) [ 169.077395][T20375] XFS (loop2): Invalid superblock magic number 10:02:08 executing program 4: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 10:02:08 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:08 executing program 3: clock_getres(0x98548ed015081fe4, 0x0) 10:02:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x16, 0x0, r0) 10:02:08 executing program 1: sync() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:08 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000200)) 10:02:08 executing program 4: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 10:02:08 executing program 0: read$char_usb(0xffffffffffffffff, 0x0, 0x0) 10:02:08 executing program 0: add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000280)="06", 0x1, 0xfffffffffffffffb) 10:02:08 executing program 2: r0 = getpgid(0x0) sched_setparam(r0, &(0x7f0000000000)) 10:02:08 executing program 3: syz_emit_ethernet(0x14e, &(0x7f0000000280)={@remote, @random="0c212d4c7215", [], {@ipv6={0x86dd, {0x0, 0x6, "3c10b0", 0x118, 0x0, 0x0, @loopback, @local, {[], @tcp={{0x4e22, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}, @eol, @generic={0x0, 0x6, "3cf9107f"}, @generic={0x0, 0x6, "a256c605"}]}}, {"7855690a5c7237a3e2e1c9612987532aec52e2e195d9a3635fc5c23c2ae4b369cee58c627c9140d1ebf3ea3e7d3e84915e6458e925171d249142342ff2cf2d5ca17d17297274a74ee178ba52b82410115de3236fa998ee852aed98626dc228d775a9aafece2b5d83e625b42b193d96e4ae80a75429105f28b7dbe3138c41d919f17202dd57dd87aa73dbca493f0b5e72e6cf276c40a5a1802bfaa1711d0b581f0e694840d75792fd71a02c0f2b3feac1145e6c015937a2510adb81e7ceeefaabf6c7069ca1ba3e43ae39e1a6d9b2de0ed71b4302ce4014730abfdb5ee6f1e12460345b7d2e24e49fdd6e50b140586a89"}}}}}}}, &(0x7f0000000240)={0x0, 0x4, [0x0, 0x4df]}) 10:02:08 executing program 2: signalfd(0xffffffffffffffff, 0x0, 0x0) 10:02:08 executing program 1: sync() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:08 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:08 executing program 4: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 10:02:08 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:08 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) 10:02:08 executing program 2: ustat(0x0, 0x0) 10:02:09 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:09 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) 10:02:09 executing program 4: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 10:02:09 executing program 1: sync() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:09 executing program 2: keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) 10:02:09 executing program 4: syz_emit_ethernet(0x146, &(0x7f0000000b40)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ff57fe", 0x110, 0x0, 0x0, @remote, @remote, {[@dstopts={0x0, 0xb, [], [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x48, {0x0, 0x10, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}, @dstopts={0x0, 0xe, [], [@generic={0x0, 0x70, "d2f21a88283e516202d17bdd53dff83f3ead4e5f8afb0f3b1b2dd76ef5245d3158bdcace08c6182e4ebbe5ac30447479f6e4bcd06b024968a1355a377edaa29ad0eb9dca012762b49969df3d5d97257da1cfa8664f4ebae2e07fadc538d96f7ca0dcb35828cc9093030cc9f47a656105"}]}], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "ba923d81d0bdd1024b6a42868c2eed698c0dad4d6ab3173b347b6eeb11a7fd91"}}}}}}, &(0x7f0000000240)={0x0, 0x2, [0x0, 0xffffffff]}) 10:02:09 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) 10:02:09 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:09 executing program 2: set_thread_area(0x0) 10:02:09 executing program 4: syz_emit_ethernet(0x146, &(0x7f0000000b40)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ff57fe", 0x110, 0x0, 0x0, @remote, @remote, {[@dstopts={0x0, 0xb, [], [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x48, {0x0, 0x10, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}, @dstopts={0x0, 0xe, [], [@generic={0x0, 0x70, "d2f21a88283e516202d17bdd53dff83f3ead4e5f8afb0f3b1b2dd76ef5245d3158bdcace08c6182e4ebbe5ac30447479f6e4bcd06b024968a1355a377edaa29ad0eb9dca012762b49969df3d5d97257da1cfa8664f4ebae2e07fadc538d96f7ca0dcb35828cc9093030cc9f47a656105"}]}], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "ba923d81d0bdd1024b6a42868c2eed698c0dad4d6ab3173b347b6eeb11a7fd91"}}}}}}, &(0x7f0000000240)={0x0, 0x2, [0x0, 0xffffffff]}) 10:02:09 executing program 5: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:09 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) 10:02:09 executing program 4: syz_emit_ethernet(0x146, &(0x7f0000000b40)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ff57fe", 0x110, 0x0, 0x0, @remote, @remote, {[@dstopts={0x0, 0xb, [], [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x48, {0x0, 0x10, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}, @dstopts={0x0, 0xe, [], [@generic={0x0, 0x70, "d2f21a88283e516202d17bdd53dff83f3ead4e5f8afb0f3b1b2dd76ef5245d3158bdcace08c6182e4ebbe5ac30447479f6e4bcd06b024968a1355a377edaa29ad0eb9dca012762b49969df3d5d97257da1cfa8664f4ebae2e07fadc538d96f7ca0dcb35828cc9093030cc9f47a656105"}]}], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "ba923d81d0bdd1024b6a42868c2eed698c0dad4d6ab3173b347b6eeb11a7fd91"}}}}}}, &(0x7f0000000240)={0x0, 0x2, [0x0, 0xffffffff]}) 10:02:09 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) 10:02:09 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x0) lseek(r0, 0x89, 0x0) 10:02:09 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="94", 0x1}, {0x0}, {&(0x7f0000000340)="81", 0x1}], 0x3) 10:02:09 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x3f, 0x5080) write$FUSE_LK(r0, 0x0, 0x0) syz_read_part_table(0x7f, 0x3, &(0x7f0000001580)=[{0x0, 0x0, 0x4}, {0x0, 0x0, 0x80000000}, {&(0x7f0000001480)="e567819aa3a6c5f9c2b5a045f952dd3184d4b4362a414bb202355098b457e918af321f0b7f636c8221f5dc6e42352a139ad64ab83737d6ed0af0261f5efa91", 0x3f, 0x1}]) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 10:02:09 executing program 4: syz_emit_ethernet(0x146, &(0x7f0000000b40)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ff57fe", 0x110, 0x0, 0x0, @remote, @remote, {[@dstopts={0x0, 0xb, [], [@hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x48, {0x0, 0x10, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}]}, @dstopts={0x0, 0xe, [], [@generic={0x0, 0x70, "d2f21a88283e516202d17bdd53dff83f3ead4e5f8afb0f3b1b2dd76ef5245d3158bdcace08c6182e4ebbe5ac30447479f6e4bcd06b024968a1355a377edaa29ad0eb9dca012762b49969df3d5d97257da1cfa8664f4ebae2e07fadc538d96f7ca0dcb35828cc9093030cc9f47a656105"}]}], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "ba923d81d0bdd1024b6a42868c2eed698c0dad4d6ab3173b347b6eeb11a7fd91"}}}}}}, &(0x7f0000000240)={0x0, 0x2, [0x0, 0xffffffff]}) 10:02:09 executing program 3: io_setup(0x31, &(0x7f00000009c0)=0x0) io_submit(r0, 0x3, &(0x7f0000001080)=[&(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0, 0x0]) 10:02:09 executing program 5: io_submit(0x0, 0x0, 0x0) 10:02:09 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 10:02:09 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="94", 0x1}, {0x0}, {&(0x7f0000000340)="81", 0x1}], 0x3) 10:02:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='$'], 0x1}, 0x0) 10:02:09 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) 10:02:09 executing program 2: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) 10:02:09 executing program 3: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) 10:02:09 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x1000000, 0x0) 10:02:09 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000380)='trusted.overlay.opaque\x00') 10:02:09 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="94", 0x1}, {0x0}, {&(0x7f0000000340)="81", 0x1}], 0x3) 10:02:09 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) 10:02:09 executing program 5: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:02:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:02:09 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000480)="94", 0x1}, {0x0}, {&(0x7f0000000340)="81", 0x1}], 0x3) 10:02:09 executing program 0: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 10:02:09 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/ipx\x00') 10:02:09 executing program 2: io_uring_setup(0x572, &(0x7f0000000000)={0x0, 0x0, 0x6}) 10:02:09 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) 10:02:09 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), 0x10) 10:02:09 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 10:02:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg(r0, &(0x7f0000001680)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="80000000000000000101000008000000"], 0x10}, 0x0) 10:02:09 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) getdents(r0, 0x0, 0x0) 10:02:09 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_int(r0, 0x1, 0x31, &(0x7f0000001980), 0x4) 10:02:09 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = dup(r0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x0, 0x4) 10:02:09 executing program 1: prctl$PR_GET_THP_DISABLE(0x19) [ 170.395399][ T38] audit: type=1400 audit(1575021729.816:78): avc: denied { map } for pid=20588 comm="syz-executor.3" path="/dev/snapshot" dev="devtmpfs" ino=18434 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:apm_bios_t:s0 tclass=chr_file permissive=1 10:02:09 executing program 4: clone(0x200400, 0x0, 0x0, 0x0, 0x0) 10:02:09 executing program 5: sync() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x0, 0x3}) 10:02:09 executing program 0: r0 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, 0x0) 10:02:09 executing program 4: clone(0x200400, 0x0, 0x0, 0x0, 0x0) 10:02:09 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x82003) vmsplice(r0, 0x0, 0x0, 0x0) 10:02:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)) 10:02:09 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x100) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@usrquota='usrquota'}, {@quota='quota'}]}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0x9}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x37, 0x0, 0x33, 0x0, 0x0, 0x0, 0x34], 0x2d, [0x0, 0x34, 0x0, 0x36], 0x2d, [0x0, 0x63], 0x2d, [0x0, 0x63, 0x66, 0x61], 0x2d, [0x35, 0x0, 0x38, 0x0, 0x38, 0x32, 0x38, 0x39]}}}, {@fowner_lt={'fowner<'}}, {@euid_gt={'euid>'}}]}) 10:02:09 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:02:09 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) recvfrom$rxrpc(r0, 0x0, 0xfffffffffffffd02, 0x32140, 0x0, 0x0) 10:02:10 executing program 3: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0xfff, 0x8, &(0x7f0000000700)=[{&(0x7f0000000140)="2ebb8d21c1050e2d01d96e607a3900bf0edfdde8a07b606cc054b1ada31cf2d15cacbf3e5fb43341b6d4628f", 0x2c, 0x7}, {&(0x7f0000000180)="60bb39b34852cf41e950cb4edc4c39fbb5b03b7b9ea955a313a478aef549ae4686948cd3d57431d435e88f2c270548901a0a30b49acb28d08b7862f4ade6232f25d02d699a925576a483537e600bbeba5168f2729e0d4febbbdb5a0b5d7e42467628775ab8f420d8c23b86c8577f9b9d927babb66e739b2b8803d7f1774b458f38d60ab5e137bdf5ae3ee5e8156bb3363408f1aeda891c487595fb5c5a4f5b91e883b22fe021f37bdba974e50bbef550816b2ae7091cbae926896a370f72ab7903a023c779b586820aa05603a7ec38974f33f5080842b131f324", 0xda, 0x2}, {&(0x7f0000000000)="4c263a6e6db6227aac87030cf51c49258d823a072db26844c53bf0b8cd6a2d53338cebe15cf7f9addb4d6b", 0x2b, 0x4}, {&(0x7f0000000340)="2232049036861614", 0x8, 0x9}, {&(0x7f0000000380)="08dd4c8cf23e78450d6885269a21d8342e299d3ea3cf64d41fc23ac9d0f90fe1892f0617dd7a368176848182977193c37ea2fe551b6631e293a7d5ed6afc3cfe9c266d21f7de76f31c955cb90cd8d1e31bb4bf689277608499d11e8bd5798c1b4439", 0x62, 0x7}, {&(0x7f0000000400)="b39adbcb0d251b4addf47d7b7397beb07c8189de9a466091ae4f78eeb112daedbbcfd9cfcc2cd5ae4028e2d401d6f8d9ab8718224ff6d1d8c3558aa81ced3d3f016a6e86d71784757525264c2ac8bfc5e1989744d87a9da8a4d219ada11b4028355b7af9cbc99ddfff5e377da3c8994b2b8e7b04e2cfeb5847f7a5004f983d01d119334121987cf315fba4e899c774ece13b93cf2881a1222f277a95ab40b6cbaf5e0a3f89384b56b6c36fbc180ea6afa8fbda9d3ea42cb38f355bf9f4375746bed08ab5", 0xc4, 0x2}, {&(0x7f0000000500)="5e54a3aedb2f79a15b59ad1a8bd6219af2ade2dc98011a7018f3ff13ef1372b2b12fb480a9fdcd1aafbb17b7cc3120729ec77f5133745a3bd34b0e88779e895c75872921fea5d48d57", 0x49, 0xaa}, {0x0}], 0x10000, &(0x7f0000000940)={[], [{@audit='audit'}]}) 10:02:10 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000980)='/dev/nbd#\x00', 0x0, 0x200) vmsplice(r0, &(0x7f0000002340)=[{&(0x7f0000000000)="a0", 0x1}], 0x1, 0x0) 10:02:10 executing program 2: prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_SECCOMP(0x15) sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB='data=writeback,noacl,context=root,smackfshat=cpuset%%$\\,smackfshat=keyring#-vboxnet0bdev,proc,rootcontext=user_u,uid=', @ANYRESDEC=r0, @ANYBLOB="2c7063723d303030303030303030303030303030303030308e6bd346b505e01f067f89e935abff342c00"]) [ 170.612593][T20641] jfs: Unrecognized mount option "audit" or missing value [ 170.625260][T20634] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:02:10 executing program 5: sync() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x0, 0x3}) 10:02:10 executing program 4: clone(0x200400, 0x0, 0x0, 0x0, 0x0) 10:02:10 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', {}, 0x8}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "ee5787edba9ff2f757c3c19e28ed6d9b24fd247a193b1de128a90d23329bc1f25c6dfc5ea3788b87e69187f10d1c813716a532f1a56aa00a223daa0bde5c196a16e91f62e856fb14610b5a432c1f947bdb684db701cf45d118731f3be4f3b92f4e54555e299ad82c5c57f4c47b0c40810cc7baaaa98b642c590f0d968847f2858fa1d9f45acf90c7bc0e6c8813c8126ee79091319efc80876fdec2a28fb8d5a4b35181b4f6a800138b147a50de0c2a08c49841f6ec5b72c6f0e994721d4b29efc04c"}, 0xc6) syz_read_part_table(0x8000000000000000, 0xaaaaaaaaaaaac77, &(0x7f0000000f80)=[{&(0x7f00000009c0)="7b55e8d2063244dbb2f65cfbf6f2c765c246f4b0e77afef838c5f0120f0fa7fdb973bf1c4ac547a97132eb2a259046ea3ccfc52745abc5c2bcab09d4f50f8524a5c2a4de5fc822d77cf3af7086bb024e452f8dd2dce8c2d26e8db6ac170269462c995c9d09f15a956334195ea053b36ff0cbeedc9491141c7936ec8fe89c87c8466e19b0be226e551a98bad957dd", 0x0, 0x9}, {&(0x7f0000000a80)="389589814b780b5cb5293cd1c9e912fed45f95c55e31fb390ec37e73d56c14f416a407b320e9305639a8bcc94e5df4907f86f37f117223cf16ff0de10cdfd603ee045969aaf27c6d7dc3215b1e38c5ad8a3c4c9cd26612344923", 0x0, 0x7ff}, {&(0x7f0000000b00)="c0ce01cd672385ba5f603103e38c5a5d09f407ad9f02858a6a008fe1a944eaffb7d9b2e4612818558daa7326d0fb4b1c59e78a2b1f19778f9ad68850b7cbe3da2f29de4580cc097da3dae0399ac2a418ed0b118dc9bf7e814e962db081dd53f00765c15232ca4f8d16c895785ebe29e5fd236532f350da5df43938a0029b07eff0848884dc250fddf9aa3495e15a313eefbe097a5429db00e477c9a5995df0cc1462db7e441000cf1d5b1d544a4dfe51fa4c9f2cfd0b4b0756bb22dc0c30c7e07ea3974efdcbb63f3196dd5d8648d76b52fd7a8674644a7455ca2a02c9b1982414d8e109b41982f2db07353acf7f7f72", 0x0, 0x8}, {&(0x7f0000000c00)="820de0d7e77b08a1579c34d8fea0dd9cccf9c53cc7136ee357cf4c381fa369ea326763e8372fb67c8da0", 0x0, 0x7}, {&(0x7f0000000c40)="bd9ad3b43055c08b9935b470bb1a71b64398902830b1bdd88d41308be10246cbc632c2b6e05bcb3649a7bb9134ac74416bbe3f51e8750e9e64258c63f56c4efad6376834e2c5b906e76460b745fa3012d40b787df25db661abed3574419a4e94d0b45682664a", 0x0, 0xcab}, {&(0x7f0000000cc0)="acbed27941a71dedeaf892ff8ad94e80c38956286ebc356cc0c4d3613a465e46feaa2ef93c0d206ddeb0f9b72e665177a0b3582bce66c52a14970238a2b13aa60a207372ee9a6450a13f8c", 0x0, 0x1f}, {&(0x7f0000000d40)="253807b2bdceb139e699ae0c55eec18f72650901bdf6625f432200fb4cf6f3d5bbda9e67b6cd2f120d645c0fa266da31ddb8769778b97d8f594b25b480c55879b7b5a9fb9f13fde0a4bff2da729d71d6a334ae2a368bb122ee7f3bccd57b5d3db26dfd59aaf45464d405975a217cbce274384c8b054a7523b4ba67d3a19cc122de42d218936bd22b667af7b8fa65181278ccc571df9948c2e05d50bdbc473249783e7a10493619558eb92ae86a58040d4d4a2574a200212f791d9fb3258df86d3ce5bf0af9fb855cbe095b9c17f139d806c2ac3dd28116062c8ad4750e93238cb866f21d9044e3ec", 0x0, 0x1}, {&(0x7f0000000e40)="5bc7d556b6af9c1cde5db18f34503eb654cd1fd8530fabbae18dfdfd1108ac14134515041c15984df649e768cb6873420bdd71b6034e5c235f6a8e2956b76ed3ff0682bb1d0a4e1c2dddc3a38da680c3607ab423", 0x0, 0x5}, {&(0x7f0000000ec0)="bf7b7eaac8222a50d9bed4811db2f927b2cee1a7d7415623a62d80391aaae6180148adac63d94654c5998e83f2f44171d190205e44d05058901cd83e6a188c9fedcf3789d4f0d85ad073f2a4f993105ee1b453ce1a486739585fa6940904dc511493554c7062fa3516075279c1fa58d485f11b2d0fe46919816e1c5d9156dced5e0b7164dee0e24b84232f855e7bc80c0332d37f251b9ebfc893a232395b005c9ca881", 0x0, 0x2}]) 10:02:10 executing program 4: clone(0x200400, 0x0, 0x0, 0x0, 0x0) 10:02:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x1, 'veth1_to_team\x00', {}, 0x1000}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c}, 0x1c}}, 0x0) 10:02:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000200)='\x00\x00\xed\xff\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x40, 0x0) [ 170.828446][T20662] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:02:10 executing program 1: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="4747ea9c6d7362583e65cfac67a1803c6aa4698d679b5cca807faa794680919d51cfe8cb52ee10253b37e472a04819e5cda091b3d5e41165", 0x38, 0x1}, {&(0x7f00000002c0)="a27a2e0fb535c28a89ab86036c38945383", 0x11, 0x2}, {&(0x7f0000000300)="e46b53f4bc4f216b39272bb4c46647e29f0c73e3ee056f3db26e4997e54a4933964c649b0323731fc1ff63a9bc68c559b8d4f2fe1a6363c5f19fcfcad4269eaeaae6dd179b5b85dcd46a88e60514d3b08b3b31b313cac804cb3fad08c9f557c4930211f80505", 0x66, 0x8}], 0x4008, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@data_writeback='data=writeback'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}, {@hostdata={'hostdata', 0x3d, 'mime_typeselinux,'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {0x0, 0x0, 0x80000000}], 0x8840, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x0000000000000015,unhide,\x00', @ANYRESDEC, @ANYBLOB="2c7569643e7673ba7e06551f0ceb915c2c9e947dc97eb7815ebfe9b3a2d536e6efa6282b93bdd6ea3972424bb30be59d83ce99d5c50d497fd774221418b885fe8d3c35278edd9f6fcb18c411f8a813079068f9138db973e5ec1129f7ccff880835fc97bbc8f5cd7da1c7e86eb77b0c365cc54aa0122328e57945246ceacdd0ec5f4d1f3226c71a09458f8abf1ee7e8b9bb965f304be38d2b1bf8d4e9034e2376691b40ce7e4113f64d00db75339cb2558f915eb9f31eee176e7084fb67402af8ab545aa817094c8d30"]) 10:02:10 executing program 5: sync() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x0, 0x3}) 10:02:10 executing program 3: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[], [{@euid_gt={'euid>'}}]}) geteuid() syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x36], 0x2d, [0x65], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) pidfd_send_signal(0xffffffffffffffff, 0x13, &(0x7f0000000000)={0x3b, 0x7fffffff, 0x7}, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) 10:02:10 executing program 2: prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_SECCOMP(0x15) sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB='data=writeback,noacl,context=root,smackfshat=cpuset%%$\\,smackfshat=keyring#-vboxnet0bdev,proc,rootcontext=user_u,uid=', @ANYRESDEC=r0, @ANYBLOB="2c7063723d303030303030303030303030303030303030308e6bd346b505e01f067f89e935abff342c00"]) 10:02:10 executing program 2: prctl$PR_GET_TIMERSLACK(0x1e) prctl$PR_GET_SECCOMP(0x15) sched_setparam(0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x9, &(0x7f0000001580)=[{&(0x7f00000000c0)="872c086d58683d6a909e0de1539dfed98f2474d7951d87887e26d73bc666221ac493ff13932368848538b4e81cd95e3d4573d739bf27b4c95b3a98b31bbd965bcef290228135dd434c88225d21e3a0460769f1246521098b8592a2bd5305cccceba5e06df1c8a2fd1d51deb108a6d724501f42a822e86a93c01eb7ad757596d6f2fdcff51bd29d4843c2331c0b24390e782b85dc84337f0cb059a8b9bb6a40823cf1fc8199d984f730d32cf27713674530361ea38d1903cf8183149d60cbcea31244ccab681e85ffe03a6fa7", 0xcc, 0x3}, {&(0x7f00000001c0)="76f44d07a0c352782c5c8f4ad06fa50f42a3e8c49f0447ca48dd91809c690a8696d6aeafbb7518947e8ee2d5c24f75cccf1f97b559fd0805008e55b01ec39317a6d50d600d2842", 0x47, 0x5}, {&(0x7f0000000240)="870b3ea881a0712b6cb955b5b1b58e902b1ea28026000fcd5cdaebb98d5d0a98d50167dd683c7ae01ed5c3ff9385c853274eee43023cf3b76912b5b21611bff5890b4fd060c5b65d882cbd7611561d922af47e562e260c99faf16f", 0x5b}, {&(0x7f00000002c0)="2e635416d79214d715f0d58bb07e22821a23de3958f97e7d7cbb0806197a1ec8d6d2ad7ad830d6be94be4a82c727ac89d83c12720bc2dffa8959d2638c4c46e3d58997f34d519014", 0x48, 0x6}, {&(0x7f0000000340)="6d5861d903e4458e84a68bedc92dc0e6df84471681ed6d6292", 0x19, 0x4}, {&(0x7f0000000380)="d773d79968874c3d1260963373ade46ec5266cbb541f0903c2068dba7c7802ddded564f08b3ea37c786d0716ac4b7afd1e0be70df76d087086dbf5e619c3b6d9ac567e8859a03544d7043e3a5ecc5bdbd0b6d983d878b00215b42e7ec2197a88ebbae24186b8aec756225f0df55b94a757806ccd92c54a6652b1efa1e36960a06c58e943dc35c4f223982c1ab1923d88a1beb2ab454ee20d480123923b10da5289fcf7bf8faf8baed26e71bec81bd30057605d70", 0xb4, 0x4}, {&(0x7f0000000440)="c272f83de040d26258401c9584db8b61aaef633419752bd6596450bccb86d2aeaaf1a6356e2f4d684ab6abfbc606aa10124cc28bf0ec0ba0a59c370150b3beb504184f0a45195e90f87029a728cdd2b7b86aeb697c8d5b6a076c947ac45179a6c76a92507288c9f5ee3f68bd6ace90aaa0ff48236bfc64d5442bfbe553600493bebbf4c16e4b26abaa5f6f9964ffd1ac648c280559c271f583cf23e912d657a1a744e463328980714e9b6df73ee5eb767ef38ee8991fa014df4a8bb93d1c074123a1", 0xc2, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x1}, {&(0x7f0000001540), 0x0, 0xfffffffffffffffe}], 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB='data=writeback,noacl,context=root,smackfshat=cpuset%%$\\,smackfshat=keyring#-vboxnet0bdev,proc,rootcontext=user_u,uid=', @ANYRESDEC=r0, @ANYBLOB="2c7063723d303030303030303030303030303030303030308e6bd346b505e01f067f89e935abff342c00"]) [ 171.077555][T20688] gfs2: not a GFS2 filesystem 10:02:10 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', {}, 0x8}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "ee5787edba9ff2f757c3c19e28ed6d9b24fd247a193b1de128a90d23329bc1f25c6dfc5ea3788b87e69187f10d1c813716a532f1a56aa00a223daa0bde5c196a16e91f62e856fb14610b5a432c1f947bdb684db701cf45d118731f3be4f3b92f4e54555e299ad82c5c57f4c47b0c40810cc7baaaa98b642c590f0d968847f2858fa1d9f45acf90c7bc0e6c8813c8126ee79091319efc80876fdec2a28fb8d5a4b35181b4f6a800138b147a50de0c2a08c49841f6ec5b72c6f0e994721d4b29efc04c"}, 0xc6) syz_read_part_table(0x8000000000000000, 0xaaaaaaaaaaaac77, &(0x7f0000000f80)=[{&(0x7f00000009c0)="7b55e8d2063244dbb2f65cfbf6f2c765c246f4b0e77afef838c5f0120f0fa7fdb973bf1c4ac547a97132eb2a259046ea3ccfc52745abc5c2bcab09d4f50f8524a5c2a4de5fc822d77cf3af7086bb024e452f8dd2dce8c2d26e8db6ac170269462c995c9d09f15a956334195ea053b36ff0cbeedc9491141c7936ec8fe89c87c8466e19b0be226e551a98bad957dd", 0x0, 0x9}, {&(0x7f0000000a80)="389589814b780b5cb5293cd1c9e912fed45f95c55e31fb390ec37e73d56c14f416a407b320e9305639a8bcc94e5df4907f86f37f117223cf16ff0de10cdfd603ee045969aaf27c6d7dc3215b1e38c5ad8a3c4c9cd26612344923", 0x0, 0x7ff}, {&(0x7f0000000b00)="c0ce01cd672385ba5f603103e38c5a5d09f407ad9f02858a6a008fe1a944eaffb7d9b2e4612818558daa7326d0fb4b1c59e78a2b1f19778f9ad68850b7cbe3da2f29de4580cc097da3dae0399ac2a418ed0b118dc9bf7e814e962db081dd53f00765c15232ca4f8d16c895785ebe29e5fd236532f350da5df43938a0029b07eff0848884dc250fddf9aa3495e15a313eefbe097a5429db00e477c9a5995df0cc1462db7e441000cf1d5b1d544a4dfe51fa4c9f2cfd0b4b0756bb22dc0c30c7e07ea3974efdcbb63f3196dd5d8648d76b52fd7a8674644a7455ca2a02c9b1982414d8e109b41982f2db07353acf7f7f72", 0x0, 0x8}, {&(0x7f0000000c00)="820de0d7e77b08a1579c34d8fea0dd9cccf9c53cc7136ee357cf4c381fa369ea326763e8372fb67c8da0", 0x0, 0x7}, {&(0x7f0000000c40)="bd9ad3b43055c08b9935b470bb1a71b64398902830b1bdd88d41308be10246cbc632c2b6e05bcb3649a7bb9134ac74416bbe3f51e8750e9e64258c63f56c4efad6376834e2c5b906e76460b745fa3012d40b787df25db661abed3574419a4e94d0b45682664a", 0x0, 0xcab}, {&(0x7f0000000cc0)="acbed27941a71dedeaf892ff8ad94e80c38956286ebc356cc0c4d3613a465e46feaa2ef93c0d206ddeb0f9b72e665177a0b3582bce66c52a14970238a2b13aa60a207372ee9a6450a13f8c", 0x0, 0x1f}, {&(0x7f0000000d40)="253807b2bdceb139e699ae0c55eec18f72650901bdf6625f432200fb4cf6f3d5bbda9e67b6cd2f120d645c0fa266da31ddb8769778b97d8f594b25b480c55879b7b5a9fb9f13fde0a4bff2da729d71d6a334ae2a368bb122ee7f3bccd57b5d3db26dfd59aaf45464d405975a217cbce274384c8b054a7523b4ba67d3a19cc122de42d218936bd22b667af7b8fa65181278ccc571df9948c2e05d50bdbc473249783e7a10493619558eb92ae86a58040d4d4a2574a200212f791d9fb3258df86d3ce5bf0af9fb855cbe095b9c17f139d806c2ac3dd28116062c8ad4750e93238cb866f21d9044e3ec", 0x0, 0x1}, {&(0x7f0000000e40)="5bc7d556b6af9c1cde5db18f34503eb654cd1fd8530fabbae18dfdfd1108ac14134515041c15984df649e768cb6873420bdd71b6034e5c235f6a8e2956b76ed3ff0682bb1d0a4e1c2dddc3a38da680c3607ab423", 0x0, 0x5}, {&(0x7f0000000ec0)="bf7b7eaac8222a50d9bed4811db2f927b2cee1a7d7415623a62d80391aaae6180148adac63d94654c5998e83f2f44171d190205e44d05058901cd83e6a188c9fedcf3789d4f0d85ad073f2a4f993105ee1b453ce1a486739585fa6940904dc511493554c7062fa3516075279c1fa58d485f11b2d0fe46919816e1c5d9156dced5e0b7164dee0e24b84232f855e7bc80c0332d37f251b9ebfc893a232395b005c9ca881", 0x0, 0x2}]) 10:02:10 executing program 5: sync() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x0, 0x3}) 10:02:10 executing program 4: r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', {}, 0x8}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "ee5787edba9ff2f757c3c19e28ed6d9b24fd247a193b1de128a90d23329bc1f25c6dfc5ea3788b87e69187f10d1c813716a532f1a56aa00a223daa0bde5c196a16e91f62e856fb14610b5a432c1f947bdb684db701cf45d118731f3be4f3b92f4e54555e299ad82c5c57f4c47b0c40810cc7baaaa98b642c590f0d968847f2858fa1d9f45acf90c7bc0e6c8813c8126ee79091319efc80876fdec2a28fb8d5a4b35181b4f6a800138b147a50de0c2a08c49841f6ec5b72c6f0e994721d4b29efc04c"}, 0xc6) syz_read_part_table(0x8000000000000000, 0xaaaaaaaaaaaac77, &(0x7f0000000f80)=[{&(0x7f00000009c0)="7b55e8d2063244dbb2f65cfbf6f2c765c246f4b0e77afef838c5f0120f0fa7fdb973bf1c4ac547a97132eb2a259046ea3ccfc52745abc5c2bcab09d4f50f8524a5c2a4de5fc822d77cf3af7086bb024e452f8dd2dce8c2d26e8db6ac170269462c995c9d09f15a956334195ea053b36ff0cbeedc9491141c7936ec8fe89c87c8466e19b0be226e551a98bad957dd", 0x0, 0x9}, {&(0x7f0000000a80)="389589814b780b5cb5293cd1c9e912fed45f95c55e31fb390ec37e73d56c14f416a407b320e9305639a8bcc94e5df4907f86f37f117223cf16ff0de10cdfd603ee045969aaf27c6d7dc3215b1e38c5ad8a3c4c9cd26612344923", 0x0, 0x7ff}, {&(0x7f0000000b00)="c0ce01cd672385ba5f603103e38c5a5d09f407ad9f02858a6a008fe1a944eaffb7d9b2e4612818558daa7326d0fb4b1c59e78a2b1f19778f9ad68850b7cbe3da2f29de4580cc097da3dae0399ac2a418ed0b118dc9bf7e814e962db081dd53f00765c15232ca4f8d16c895785ebe29e5fd236532f350da5df43938a0029b07eff0848884dc250fddf9aa3495e15a313eefbe097a5429db00e477c9a5995df0cc1462db7e441000cf1d5b1d544a4dfe51fa4c9f2cfd0b4b0756bb22dc0c30c7e07ea3974efdcbb63f3196dd5d8648d76b52fd7a8674644a7455ca2a02c9b1982414d8e109b41982f2db07353acf7f7f72", 0x0, 0x8}, {&(0x7f0000000c00)="820de0d7e77b08a1579c34d8fea0dd9cccf9c53cc7136ee357cf4c381fa369ea326763e8372fb67c8da0", 0x0, 0x7}, {&(0x7f0000000c40)="bd9ad3b43055c08b9935b470bb1a71b64398902830b1bdd88d41308be10246cbc632c2b6e05bcb3649a7bb9134ac74416bbe3f51e8750e9e64258c63f56c4efad6376834e2c5b906e76460b745fa3012d40b787df25db661abed3574419a4e94d0b45682664a", 0x0, 0xcab}, {&(0x7f0000000cc0)="acbed27941a71dedeaf892ff8ad94e80c38956286ebc356cc0c4d3613a465e46feaa2ef93c0d206ddeb0f9b72e665177a0b3582bce66c52a14970238a2b13aa60a207372ee9a6450a13f8c", 0x0, 0x1f}, {&(0x7f0000000d40)="253807b2bdceb139e699ae0c55eec18f72650901bdf6625f432200fb4cf6f3d5bbda9e67b6cd2f120d645c0fa266da31ddb8769778b97d8f594b25b480c55879b7b5a9fb9f13fde0a4bff2da729d71d6a334ae2a368bb122ee7f3bccd57b5d3db26dfd59aaf45464d405975a217cbce274384c8b054a7523b4ba67d3a19cc122de42d218936bd22b667af7b8fa65181278ccc571df9948c2e05d50bdbc473249783e7a10493619558eb92ae86a58040d4d4a2574a200212f791d9fb3258df86d3ce5bf0af9fb855cbe095b9c17f139d806c2ac3dd28116062c8ad4750e93238cb866f21d9044e3ec", 0x0, 0x1}, {&(0x7f0000000e40)="5bc7d556b6af9c1cde5db18f34503eb654cd1fd8530fabbae18dfdfd1108ac14134515041c15984df649e768cb6873420bdd71b6034e5c235f6a8e2956b76ed3ff0682bb1d0a4e1c2dddc3a38da680c3607ab423", 0x0, 0x5}, {&(0x7f0000000ec0)="bf7b7eaac8222a50d9bed4811db2f927b2cee1a7d7415623a62d80391aaae6180148adac63d94654c5998e83f2f44171d190205e44d05058901cd83e6a188c9fedcf3789d4f0d85ad073f2a4f993105ee1b453ce1a486739585fa6940904dc511493554c7062fa3516075279c1fa58d485f11b2d0fe46919816e1c5d9156dced5e0b7164dee0e24b84232f855e7bc80c0332d37f251b9ebfc893a232395b005c9ca881", 0x0, 0x2}]) 10:02:10 executing program 1: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="4747ea9c6d7362583e65cfac67a1803c6aa4698d679b5cca807faa794680919d51cfe8cb52ee10253b37e472a04819e5cda091b3d5e41165", 0x38, 0x1}, {&(0x7f00000002c0)="a27a2e0fb535c28a89ab86036c38945383", 0x11, 0x2}, {&(0x7f0000000300)="e46b53f4bc4f216b39272bb4c46647e29f0c73e3ee056f3db26e4997e54a4933964c649b0323731fc1ff63a9bc68c559b8d4f2fe1a6363c5f19fcfcad4269eaeaae6dd179b5b85dcd46a88e60514d3b08b3b31b313cac804cb3fad08c9f557c4930211f80505", 0x66, 0x8}], 0x4008, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@data_writeback='data=writeback'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}, {@hostdata={'hostdata', 0x3d, 'mime_typeselinux,'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {0x0, 0x0, 0x80000000}], 0x8840, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x0000000000000015,unhide,\x00', @ANYRESDEC, @ANYBLOB="2c7569643e7673ba7e06551f0ceb915c2c9e947dc97eb7815ebfe9b3a2d536e6efa6282b93bdd6ea3972424bb30be59d83ce99d5c50d497fd774221418b885fe8d3c35278edd9f6fcb18c411f8a813079068f9138db973e5ec1129f7ccff880835fc97bbc8f5cd7da1c7e86eb77b0c365cc54aa0122328e57945246ceacdd0ec5f4d1f3226c71a09458f8abf1ee7e8b9bb965f304be38d2b1bf8d4e9034e2376691b40ce7e4113f64d00db75339cb2558f915eb9f31eee176e7084fb67402af8ab545aa817094c8d30"]) 10:02:10 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', {}, 0x8}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "ee5787edba9ff2f757c3c19e28ed6d9b24fd247a193b1de128a90d23329bc1f25c6dfc5ea3788b87e69187f10d1c813716a532f1a56aa00a223daa0bde5c196a16e91f62e856fb14610b5a432c1f947bdb684db701cf45d118731f3be4f3b92f4e54555e299ad82c5c57f4c47b0c40810cc7baaaa98b642c590f0d968847f2858fa1d9f45acf90c7bc0e6c8813c8126ee79091319efc80876fdec2a28fb8d5a4b35181b4f6a800138b147a50de0c2a08c49841f6ec5b72c6f0e994721d4b29efc04c"}, 0xc6) syz_read_part_table(0x8000000000000000, 0xaaaaaaaaaaaac77, &(0x7f0000000f80)=[{&(0x7f00000009c0)="7b55e8d2063244dbb2f65cfbf6f2c765c246f4b0e77afef838c5f0120f0fa7fdb973bf1c4ac547a97132eb2a259046ea3ccfc52745abc5c2bcab09d4f50f8524a5c2a4de5fc822d77cf3af7086bb024e452f8dd2dce8c2d26e8db6ac170269462c995c9d09f15a956334195ea053b36ff0cbeedc9491141c7936ec8fe89c87c8466e19b0be226e551a98bad957dd", 0x0, 0x9}, {&(0x7f0000000a80)="389589814b780b5cb5293cd1c9e912fed45f95c55e31fb390ec37e73d56c14f416a407b320e9305639a8bcc94e5df4907f86f37f117223cf16ff0de10cdfd603ee045969aaf27c6d7dc3215b1e38c5ad8a3c4c9cd26612344923", 0x0, 0x7ff}, {&(0x7f0000000b00)="c0ce01cd672385ba5f603103e38c5a5d09f407ad9f02858a6a008fe1a944eaffb7d9b2e4612818558daa7326d0fb4b1c59e78a2b1f19778f9ad68850b7cbe3da2f29de4580cc097da3dae0399ac2a418ed0b118dc9bf7e814e962db081dd53f00765c15232ca4f8d16c895785ebe29e5fd236532f350da5df43938a0029b07eff0848884dc250fddf9aa3495e15a313eefbe097a5429db00e477c9a5995df0cc1462db7e441000cf1d5b1d544a4dfe51fa4c9f2cfd0b4b0756bb22dc0c30c7e07ea3974efdcbb63f3196dd5d8648d76b52fd7a8674644a7455ca2a02c9b1982414d8e109b41982f2db07353acf7f7f72", 0x0, 0x8}, {&(0x7f0000000c00)="820de0d7e77b08a1579c34d8fea0dd9cccf9c53cc7136ee357cf4c381fa369ea326763e8372fb67c8da0", 0x0, 0x7}, {&(0x7f0000000c40)="bd9ad3b43055c08b9935b470bb1a71b64398902830b1bdd88d41308be10246cbc632c2b6e05bcb3649a7bb9134ac74416bbe3f51e8750e9e64258c63f56c4efad6376834e2c5b906e76460b745fa3012d40b787df25db661abed3574419a4e94d0b45682664a", 0x0, 0xcab}, {&(0x7f0000000cc0)="acbed27941a71dedeaf892ff8ad94e80c38956286ebc356cc0c4d3613a465e46feaa2ef93c0d206ddeb0f9b72e665177a0b3582bce66c52a14970238a2b13aa60a207372ee9a6450a13f8c", 0x0, 0x1f}, {&(0x7f0000000d40)="253807b2bdceb139e699ae0c55eec18f72650901bdf6625f432200fb4cf6f3d5bbda9e67b6cd2f120d645c0fa266da31ddb8769778b97d8f594b25b480c55879b7b5a9fb9f13fde0a4bff2da729d71d6a334ae2a368bb122ee7f3bccd57b5d3db26dfd59aaf45464d405975a217cbce274384c8b054a7523b4ba67d3a19cc122de42d218936bd22b667af7b8fa65181278ccc571df9948c2e05d50bdbc473249783e7a10493619558eb92ae86a58040d4d4a2574a200212f791d9fb3258df86d3ce5bf0af9fb855cbe095b9c17f139d806c2ac3dd28116062c8ad4750e93238cb866f21d9044e3ec", 0x0, 0x1}, {&(0x7f0000000e40)="5bc7d556b6af9c1cde5db18f34503eb654cd1fd8530fabbae18dfdfd1108ac14134515041c15984df649e768cb6873420bdd71b6034e5c235f6a8e2956b76ed3ff0682bb1d0a4e1c2dddc3a38da680c3607ab423", 0x0, 0x5}, {&(0x7f0000000ec0)="bf7b7eaac8222a50d9bed4811db2f927b2cee1a7d7415623a62d80391aaae6180148adac63d94654c5998e83f2f44171d190205e44d05058901cd83e6a188c9fedcf3789d4f0d85ad073f2a4f993105ee1b453ce1a486739585fa6940904dc511493554c7062fa3516075279c1fa58d485f11b2d0fe46919816e1c5d9156dced5e0b7164dee0e24b84232f855e7bc80c0332d37f251b9ebfc893a232395b005c9ca881", 0x0, 0x2}]) 10:02:10 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="4747ea9c6d7362583e65cfac67a1803c6aa4698d679b5cca807faa794680919d51cfe8cb52ee10253b37e472a04819e5cda091b3d5e41165", 0x38, 0x1}, {&(0x7f00000002c0)="a27a2e0fb535c28a89ab86036c38945383", 0x11, 0x2}, {&(0x7f0000000300)="e46b53f4bc4f216b39272bb4c46647e29f0c73e3ee056f3db26e4997e54a4933964c649b0323731fc1ff63a9bc68c559b8d4f2fe1a6363c5f19fcfcad4269eaeaae6dd179b5b85dcd46a88e60514d3b08b3b31b313cac804cb3fad08c9f557c4930211f80505", 0x66, 0x8}], 0x4008, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@data_writeback='data=writeback'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}, {@hostdata={'hostdata', 0x3d, 'mime_typeselinux,'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {0x0, 0x0, 0x80000000}], 0x8840, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x0000000000000015,unhide,\x00', @ANYRESDEC, @ANYBLOB="2c7569643e7673ba7e06551f0ceb915c2c9e947dc97eb7815ebfe9b3a2d536e6efa6282b93bdd6ea3972424bb30be59d83ce99d5c50d497fd774221418b885fe8d3c35278edd9f6fcb18c411f8a813079068f9138db973e5ec1129f7ccff880835fc97bbc8f5cd7da1c7e86eb77b0c365cc54aa0122328e57945246ceacdd0ec5f4d1f3226c71a09458f8abf1ee7e8b9bb965f304be38d2b1bf8d4e9034e2376691b40ce7e4113f64d00db75339cb2558f915eb9f31eee176e7084fb67402af8ab545aa817094c8d30"]) [ 171.363065][T20718] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "smackfshat=cpuset%%$\" 10:02:10 executing program 3: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[], [{@euid_gt={'euid>'}}]}) geteuid() syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x400, &(0x7f0000000340)={[{@mode={'mode'}}], [{@euid_eq={'euid'}}, {@euid_gt={'euid>'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x36], 0x2d, [0x65], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38]}}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) pidfd_send_signal(0xffffffffffffffff, 0x13, &(0x7f0000000000)={0x3b, 0x7fffffff, 0x7}, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x0, 0x0) [ 171.392089][T20727] gfs2: not a GFS2 filesystem 10:02:10 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0xaab1, 0x3, 0x0, 0xc93}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000080)=0x1) symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') [ 171.498216][T20724] gfs2: not a GFS2 filesystem 10:02:10 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x4) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/214, 0xd6) 10:02:11 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="4747ea9c6d7362583e65cfac67a1803c6aa4698d679b5cca807faa794680919d51cfe8cb52ee10253b37e472a04819e5cda091b3d5e41165", 0x38, 0x1}, {&(0x7f00000002c0)="a27a2e0fb535c28a89ab86036c38945383", 0x11, 0x2}, {&(0x7f0000000300)="e46b53f4bc4f216b39272bb4c46647e29f0c73e3ee056f3db26e4997e54a4933964c649b0323731fc1ff63a9bc68c559b8d4f2fe1a6363c5f19fcfcad4269eaeaae6dd179b5b85dcd46a88e60514d3b08b3b31b313cac804cb3fad08c9f557c4930211f80505", 0x66, 0x8}], 0x4008, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@data_writeback='data=writeback'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}, {@hostdata={'hostdata', 0x3d, 'mime_typeselinux,'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {0x0, 0x0, 0x80000000}], 0x8840, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x0000000000000015,unhide,\x00', @ANYRESDEC, @ANYBLOB="2c7569643e7673ba7e06551f0ceb915c2c9e947dc97eb7815ebfe9b3a2d536e6efa6282b93bdd6ea3972424bb30be59d83ce99d5c50d497fd774221418b885fe8d3c35278edd9f6fcb18c411f8a813079068f9138db973e5ec1129f7ccff880835fc97bbc8f5cd7da1c7e86eb77b0c365cc54aa0122328e57945246ceacdd0ec5f4d1f3226c71a09458f8abf1ee7e8b9bb965f304be38d2b1bf8d4e9034e2376691b40ce7e4113f64d00db75339cb2558f915eb9f31eee176e7084fb67402af8ab545aa817094c8d30"]) 10:02:11 executing program 3: syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, 0x0, 0x0) ioctl$TCGETX(r2, 0x5432, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$x25(r0, 0x0, 0x0) 10:02:11 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='.proc\x19\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x9, 0x8, 0x1491, 0x0, 0x101}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, 0x0, 0x0) 10:02:11 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x4) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/214, 0xd6) 10:02:11 executing program 1: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="4747ea9c6d7362583e65cfac67a1803c6aa4698d679b5cca807faa794680919d51cfe8cb52ee10253b37e472a04819e5cda091b3d5e41165", 0x38, 0x1}, {&(0x7f00000002c0)="a27a2e0fb535c28a89ab86036c38945383", 0x11, 0x2}, {&(0x7f0000000300)="e46b53f4bc4f216b39272bb4c46647e29f0c73e3ee056f3db26e4997e54a4933964c649b0323731fc1ff63a9bc68c559b8d4f2fe1a6363c5f19fcfcad4269eaeaae6dd179b5b85dcd46a88e60514d3b08b3b31b313cac804cb3fad08c9f557c4930211f80505", 0x66, 0x8}], 0x4008, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@data_writeback='data=writeback'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}, {@hostdata={'hostdata', 0x3d, 'mime_typeselinux,'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {0x0, 0x0, 0x80000000}], 0x8840, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x0000000000000015,unhide,\x00', @ANYRESDEC, @ANYBLOB="2c7569643e7673ba7e06551f0ceb915c2c9e947dc97eb7815ebfe9b3a2d536e6efa6282b93bdd6ea3972424bb30be59d83ce99d5c50d497fd774221418b885fe8d3c35278edd9f6fcb18c411f8a813079068f9138db973e5ec1129f7ccff880835fc97bbc8f5cd7da1c7e86eb77b0c365cc54aa0122328e57945246ceacdd0ec5f4d1f3226c71a09458f8abf1ee7e8b9bb965f304be38d2b1bf8d4e9034e2376691b40ce7e4113f64d00db75339cb2558f915eb9f31eee176e7084fb67402af8ab545aa817094c8d30"]) [ 171.838338][T20760] gfs2: not a GFS2 filesystem 10:02:11 executing program 0: r0 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', {}, 0x8}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "ee5787edba9ff2f757c3c19e28ed6d9b24fd247a193b1de128a90d23329bc1f25c6dfc5ea3788b87e69187f10d1c813716a532f1a56aa00a223daa0bde5c196a16e91f62e856fb14610b5a432c1f947bdb684db701cf45d118731f3be4f3b92f4e54555e299ad82c5c57f4c47b0c40810cc7baaaa98b642c590f0d968847f2858fa1d9f45acf90c7bc0e6c8813c8126ee79091319efc80876fdec2a28fb8d5a4b35181b4f6a800138b147a50de0c2a08c49841f6ec5b72c6f0e994721d4b29efc04c"}, 0xc6) syz_read_part_table(0x8000000000000000, 0xaaaaaaaaaaaac77, &(0x7f0000000f80)=[{&(0x7f00000009c0)="7b55e8d2063244dbb2f65cfbf6f2c765c246f4b0e77afef838c5f0120f0fa7fdb973bf1c4ac547a97132eb2a259046ea3ccfc52745abc5c2bcab09d4f50f8524a5c2a4de5fc822d77cf3af7086bb024e452f8dd2dce8c2d26e8db6ac170269462c995c9d09f15a956334195ea053b36ff0cbeedc9491141c7936ec8fe89c87c8466e19b0be226e551a98bad957dd", 0x0, 0x9}, {&(0x7f0000000a80)="389589814b780b5cb5293cd1c9e912fed45f95c55e31fb390ec37e73d56c14f416a407b320e9305639a8bcc94e5df4907f86f37f117223cf16ff0de10cdfd603ee045969aaf27c6d7dc3215b1e38c5ad8a3c4c9cd26612344923", 0x0, 0x7ff}, {&(0x7f0000000b00)="c0ce01cd672385ba5f603103e38c5a5d09f407ad9f02858a6a008fe1a944eaffb7d9b2e4612818558daa7326d0fb4b1c59e78a2b1f19778f9ad68850b7cbe3da2f29de4580cc097da3dae0399ac2a418ed0b118dc9bf7e814e962db081dd53f00765c15232ca4f8d16c895785ebe29e5fd236532f350da5df43938a0029b07eff0848884dc250fddf9aa3495e15a313eefbe097a5429db00e477c9a5995df0cc1462db7e441000cf1d5b1d544a4dfe51fa4c9f2cfd0b4b0756bb22dc0c30c7e07ea3974efdcbb63f3196dd5d8648d76b52fd7a8674644a7455ca2a02c9b1982414d8e109b41982f2db07353acf7f7f72", 0x0, 0x8}, {&(0x7f0000000c00)="820de0d7e77b08a1579c34d8fea0dd9cccf9c53cc7136ee357cf4c381fa369ea326763e8372fb67c8da0", 0x0, 0x7}, {&(0x7f0000000c40)="bd9ad3b43055c08b9935b470bb1a71b64398902830b1bdd88d41308be10246cbc632c2b6e05bcb3649a7bb9134ac74416bbe3f51e8750e9e64258c63f56c4efad6376834e2c5b906e76460b745fa3012d40b787df25db661abed3574419a4e94d0b45682664a", 0x0, 0xcab}, {&(0x7f0000000cc0)="acbed27941a71dedeaf892ff8ad94e80c38956286ebc356cc0c4d3613a465e46feaa2ef93c0d206ddeb0f9b72e665177a0b3582bce66c52a14970238a2b13aa60a207372ee9a6450a13f8c", 0x0, 0x1f}, {&(0x7f0000000d40)="253807b2bdceb139e699ae0c55eec18f72650901bdf6625f432200fb4cf6f3d5bbda9e67b6cd2f120d645c0fa266da31ddb8769778b97d8f594b25b480c55879b7b5a9fb9f13fde0a4bff2da729d71d6a334ae2a368bb122ee7f3bccd57b5d3db26dfd59aaf45464d405975a217cbce274384c8b054a7523b4ba67d3a19cc122de42d218936bd22b667af7b8fa65181278ccc571df9948c2e05d50bdbc473249783e7a10493619558eb92ae86a58040d4d4a2574a200212f791d9fb3258df86d3ce5bf0af9fb855cbe095b9c17f139d806c2ac3dd28116062c8ad4750e93238cb866f21d9044e3ec", 0x0, 0x1}, {&(0x7f0000000e40)="5bc7d556b6af9c1cde5db18f34503eb654cd1fd8530fabbae18dfdfd1108ac14134515041c15984df649e768cb6873420bdd71b6034e5c235f6a8e2956b76ed3ff0682bb1d0a4e1c2dddc3a38da680c3607ab423", 0x0, 0x5}, {&(0x7f0000000ec0)="bf7b7eaac8222a50d9bed4811db2f927b2cee1a7d7415623a62d80391aaae6180148adac63d94654c5998e83f2f44171d190205e44d05058901cd83e6a188c9fedcf3789d4f0d85ad073f2a4f993105ee1b453ce1a486739585fa6940904dc511493554c7062fa3516075279c1fa58d485f11b2d0fe46919816e1c5d9156dced5e0b7164dee0e24b84232f855e7bc80c0332d37f251b9ebfc893a232395b005c9ca881", 0x0, 0x2}]) 10:02:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xad1f, 0x2000) socket$pptp(0x18, 0x1, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'dummy0\x00', 0x0}) bind$packet(r0, &(0x7f0000003440)={0x11, 0xb, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 10:02:11 executing program 4: r0 = gettid() ioprio_set$pid(0x2, r0, 0x52) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) 10:02:11 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xa, &(0x7f00000001c0)=@framed={{}, [@ldst={0x2, 0x0, 0x0, 0x1, 0xb, 0x1, 0x36b0b87bcc955f3a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x7}, @exit, @jmp={0x5, 0x0, 0x0, 0x0, 0xd, 0x526cb121f4e364ec, 0xfffffffffffffffc}, @map={0x18, 0x7, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='\x00\x00\x80\x00Q6\xac\xb3\xdb\xdc\xfe\xd1\xa6{\xbb\"2\xb7<6\x8c\x956\x02\x9fQ\x97\x9dm\xfe\x97\xe1\xe6U\x11\xbb\xdfR\xc2\xbc\xfa\xd10\x8a:\xd1\xfd\x1acS\v\r\x83\xf2\xd5\x1e\xd1u\x9a\x8aY]\x99\x15\x1c\xac\'(0x0, 0x3}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e21}}, 0x3ff, 0x7}, 0x90) semop(0x0, &(0x7f0000000180)=[{0x0, 0x3ff, 0x800}, {0x0, 0x8e, 0x800}, {0x9, 0x7, 0x800}, {0x2, 0x40, 0x800}, {0x0, 0x8}, {0x3, 0x9d, 0x1000}], 0x6) syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x17, r0, 0x0) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'\x00', 0x0}, &(0x7f00000001c0)='\x00', r0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x82800, 0x0) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000040)={0xa78, 0x7, 0x1f, 0x9, 0x7, 0x5e58}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000240)={0x7, 0x0, {0x1, 0x0, 0x6, 0x0, 0x2}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f0000000200)={0x8, 'ip_vti0\x00', {'gretap0\x00'}, 0x7fff}) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)=r2) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x2, 0xfffffffffffffcf2) 10:02:11 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xa, &(0x7f00000001c0)=@framed={{}, [@ldst={0x2, 0x0, 0x0, 0x1, 0xb, 0x1, 0x36b0b87bcc955f3a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x7}, @exit, @jmp={0x5, 0x0, 0x0, 0x0, 0xd, 0x526cb121f4e364ec, 0xfffffffffffffffc}, @map={0x18, 0x7, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='\x00\x00\x80\x00Q6\xac\xb3\xdb\xdc\xfe\xd1\xa6{\xbb\"2\xb7<6\x8c\x956\x02\x9fQ\x97\x9dm\xfe\x97\xe1\xe6U\x11\xbb\xdfR\xc2\xbc\xfa\xd10\x8a:\xd1\xfd\x1acS\v\r\x83\xf2\xd5\x1e\xd1u\x9a\x8aY]\x99\x15\x1c\xac\'( 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.711880][T27374] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 246.711880][T27374] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 246.711880][T27374] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 246.711880][T27374] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 246.711880][T27374] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f7b351d76d4 [ 246.711880][T27374] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 246.901925][T27364] ISOFS: Invalid session number 10:03:26 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:26 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 246.963466][T27382] gfs2: Unknown parameter 'obj_type' [ 246.977296][T27390] FAULT_INJECTION: forcing a failure. [ 246.977296][T27390] name failslab, interval 1, probability 0, space 0, times 0 [ 246.990473][T27390] CPU: 1 PID: 27390 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 246.998284][T27393] FAULT_INJECTION: forcing a failure. [ 246.998284][T27393] name failslab, interval 1, probability 0, space 0, times 0 [ 246.999074][T27390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 247.013880][T27390] Call Trace: [ 247.013880][T27390] dump_stack+0x197/0x210 [ 247.013880][T27390] should_fail.cold+0xa/0x15 [ 247.013880][T27390] ? fault_create_debugfs_attr+0x180/0x180 [ 247.013880][T27390] ? ___might_sleep+0x163/0x2c0 [ 247.013880][T27390] __should_failslab+0x121/0x190 [ 247.013880][T27390] should_failslab+0x9/0x14 [ 247.013880][T27390] __kmalloc+0x2e0/0x770 [ 247.013880][T27390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 247.013880][T27390] ? fput_many+0x12c/0x1a0 [ 247.013880][T27390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.013880][T27390] ? strnlen_user+0x1ed/0x2e0 [ 247.013880][T27390] ? __x64_sys_memfd_create+0x13c/0x470 [ 247.013880][T27390] __x64_sys_memfd_create+0x13c/0x470 [ 247.013880][T27390] ? memfd_fcntl+0x18c0/0x18c0 [ 247.013880][T27390] ? do_syscall_64+0x26/0x790 [ 247.013880][T27390] ? lockdep_hardirqs_on+0x421/0x5e0 [ 247.013880][T27390] ? trace_hardirqs_on+0x67/0x240 [ 247.013880][T27390] do_syscall_64+0xfa/0x790 [ 247.013880][T27390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.013880][T27390] RIP: 0033:0x45a759 [ 247.013880][T27390] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.013880][T27390] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.013880][T27390] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 247.013880][T27390] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 247.013880][T27390] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 247.013880][T27390] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 247.013880][T27390] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x17, r0, 0x0) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'\x00', 0x0}, &(0x7f00000001c0)='\x00', r0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) [ 247.199721][T27393] CPU: 3 PID: 27393 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 10:03:26 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 247.203873][T27393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 247.203873][T27393] Call Trace: [ 247.203873][T27393] dump_stack+0x197/0x210 [ 247.203873][T27393] should_fail.cold+0xa/0x15 [ 247.203873][T27393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.203873][T27393] ? fault_create_debugfs_attr+0x180/0x180 [ 247.203873][T27393] ? ___might_sleep+0x163/0x2c0 [ 247.203873][T27393] __should_failslab+0x121/0x190 [ 247.203873][T27393] ? shmem_destroy_inode+0x80/0x80 [ 247.203873][T27393] should_failslab+0x9/0x14 [ 247.203873][T27393] kmem_cache_alloc+0x2aa/0x710 [ 247.203873][T27393] ? __alloc_fd+0x487/0x620 [ 247.203873][T27393] ? shmem_destroy_inode+0x80/0x80 [ 247.203873][T27393] shmem_alloc_inode+0x1c/0x50 [ 247.203873][T27393] alloc_inode+0x68/0x1e0 [ 247.203873][T27393] new_inode_pseudo+0x19/0xf0 [ 247.203873][T27393] new_inode+0x1f/0x40 [ 247.203873][T27393] shmem_get_inode+0x84/0x7e0 [ 247.203873][T27393] __shmem_file_setup.part.0+0x7e/0x2b0 [ 247.203873][T27393] shmem_file_setup+0x66/0x90 [ 247.203873][T27393] __x64_sys_memfd_create+0x2a2/0x470 [ 247.203873][T27393] ? memfd_fcntl+0x18c0/0x18c0 [ 247.203873][T27393] ? do_syscall_64+0x26/0x790 [ 247.203873][T27393] ? lockdep_hardirqs_on+0x421/0x5e0 [ 247.203873][T27393] ? trace_hardirqs_on+0x67/0x240 [ 247.203873][T27393] do_syscall_64+0xfa/0x790 [ 247.230129][T27393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.230129][T27393] RIP: 0033:0x45a759 [ 247.230129][T27393] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.230129][T27393] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.230129][T27393] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 247.230129][T27393] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 247.230129][T27393] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 247.230129][T27393] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f7b351d76d4 [ 247.230129][T27393] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:26 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 247.510030][T27398] FAULT_INJECTION: forcing a failure. [ 247.510030][T27398] name failslab, interval 1, probability 0, space 0, times 0 10:03:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x17, r0, 0x0) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'\x00', 0x0}, &(0x7f00000001c0)='\x00', r0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) [ 247.533505][T27398] CPU: 2 PID: 27398 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 247.533911][T27398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 247.543598][T27404] FAULT_INJECTION: forcing a failure. [ 247.543598][T27404] name failslab, interval 1, probability 0, space 0, times 0 [ 247.543992][T27398] Call Trace: [ 247.543992][T27398] dump_stack+0x197/0x210 [ 247.543992][T27398] should_fail.cold+0xa/0x15 [ 247.543992][T27398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.543992][T27398] ? fault_create_debugfs_attr+0x180/0x180 [ 247.543992][T27398] ? ___might_sleep+0x163/0x2c0 [ 247.543992][T27398] __should_failslab+0x121/0x190 [ 247.543992][T27398] ? shmem_destroy_inode+0x80/0x80 [ 247.543992][T27398] should_failslab+0x9/0x14 [ 247.543992][T27398] kmem_cache_alloc+0x2aa/0x710 [ 247.543992][T27398] ? __alloc_fd+0x487/0x620 [ 247.543992][T27398] ? shmem_destroy_inode+0x80/0x80 [ 247.543992][T27398] shmem_alloc_inode+0x1c/0x50 [ 247.543992][T27398] alloc_inode+0x68/0x1e0 [ 247.543992][T27398] new_inode_pseudo+0x19/0xf0 [ 247.543992][T27398] new_inode+0x1f/0x40 [ 247.543992][T27398] shmem_get_inode+0x84/0x7e0 [ 247.543992][T27398] __shmem_file_setup.part.0+0x7e/0x2b0 [ 247.543992][T27398] shmem_file_setup+0x66/0x90 [ 247.543992][T27398] __x64_sys_memfd_create+0x2a2/0x470 [ 247.543992][T27398] ? memfd_fcntl+0x18c0/0x18c0 [ 247.543992][T27398] ? do_syscall_64+0x26/0x790 [ 247.543992][T27398] ? lockdep_hardirqs_on+0x421/0x5e0 [ 247.543992][T27398] ? trace_hardirqs_on+0x67/0x240 [ 247.543992][T27398] do_syscall_64+0xfa/0x790 [ 247.543992][T27398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.543992][T27398] RIP: 0033:0x45a759 [ 247.543992][T27398] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.543992][T27398] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.543992][T27398] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 247.543992][T27398] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 247.543992][T27398] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 247.543992][T27398] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 247.543992][T27398] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 247.780878][T27404] CPU: 1 PID: 27404 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 247.783881][T27404] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 247.794786][T27404] Call Trace: [ 247.794786][T27404] dump_stack+0x197/0x210 [ 247.794786][T27404] should_fail.cold+0xa/0x15 [ 247.794786][T27404] ? fault_create_debugfs_attr+0x180/0x180 [ 247.794786][T27404] ? ___might_sleep+0x163/0x2c0 10:03:27 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:27 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 247.794786][T27404] __should_failslab+0x121/0x190 [ 247.794786][T27404] should_failslab+0x9/0x14 [ 247.794786][T27404] kmem_cache_alloc+0x2aa/0x710 [ 247.794786][T27404] ? __put_user_ns+0x70/0x70 [ 247.794786][T27404] ? percpu_ref_put_many+0xb1/0x180 [ 247.794786][T27404] security_inode_alloc+0x39/0x160 [ 247.794786][T27404] inode_init_always+0x56e/0xba0 [ 247.794786][T27404] alloc_inode+0x89/0x1e0 [ 247.794786][T27404] new_inode_pseudo+0x19/0xf0 [ 247.840384][T27407] FAULT_INJECTION: forcing a failure. [ 247.840384][T27407] name failslab, interval 1, probability 0, space 0, times 0 [ 247.842641][T27404] new_inode+0x1f/0x40 [ 247.853171][T27409] FAULT_INJECTION: forcing a failure. 10:03:27 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 247.853171][T27409] name failslab, interval 1, probability 0, space 0, times 0 [ 247.842641][T27404] shmem_get_inode+0x84/0x7e0 [ 247.842641][T27404] __shmem_file_setup.part.0+0x7e/0x2b0 [ 247.842641][T27404] shmem_file_setup+0x66/0x90 [ 247.842641][T27404] __x64_sys_memfd_create+0x2a2/0x470 [ 247.842641][T27404] ? memfd_fcntl+0x18c0/0x18c0 [ 247.842641][T27404] ? do_syscall_64+0x26/0x790 [ 247.842641][T27404] ? lockdep_hardirqs_on+0x421/0x5e0 10:03:27 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x4008, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:27 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x17, r0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)) [ 247.842641][T27404] ? trace_hardirqs_on+0x67/0x240 [ 247.842641][T27404] do_syscall_64+0xfa/0x790 [ 247.842641][T27404] entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:03:27 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 247.842641][T27404] RIP: 0033:0x45a759 [ 247.842641][T27404] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.842641][T27404] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.842641][T27404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 10:03:27 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:27 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)) [ 247.842641][T27404] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 247.842641][T27404] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 247.842641][T27404] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f7b351d76d4 [ 247.842641][T27404] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 247.854385][T27407] CPU: 2 PID: 27407 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 247.876585][T27407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 247.876585][T27407] Call Trace: [ 247.876585][T27407] dump_stack+0x197/0x210 [ 247.876585][T27407] should_fail.cold+0xa/0x15 [ 247.876585][T27407] ? fault_create_debugfs_attr+0x180/0x180 [ 247.876585][T27407] ? ___might_sleep+0x163/0x2c0 [ 247.876585][T27407] __should_failslab+0x121/0x190 [ 247.876585][T27407] should_failslab+0x9/0x14 [ 247.876585][T27407] __kmalloc+0x2e0/0x770 [ 247.876585][T27407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 247.876585][T27407] ? fput_many+0x12c/0x1a0 [ 247.876585][T27407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.876585][T27407] ? strnlen_user+0x1ed/0x2e0 [ 247.876585][T27407] ? __x64_sys_memfd_create+0x13c/0x470 [ 247.876585][T27407] __x64_sys_memfd_create+0x13c/0x470 [ 247.876585][T27407] ? memfd_fcntl+0x18c0/0x18c0 [ 247.876585][T27407] ? do_syscall_64+0x26/0x790 [ 247.876585][T27407] ? lockdep_hardirqs_on+0x421/0x5e0 [ 247.876585][T27407] ? trace_hardirqs_on+0x67/0x240 [ 247.876585][T27407] do_syscall_64+0xfa/0x790 [ 247.876585][T27407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.876585][T27407] RIP: 0033:0x45a759 [ 247.876585][T27407] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.876585][T27407] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.887959][T27407] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 247.887959][T27407] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 247.887959][T27407] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 247.887959][T27407] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f30143396d4 [ 247.887959][T27407] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 247.918955][T27409] CPU: 1 PID: 27409 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 247.918962][T27409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 247.918966][T27409] Call Trace: [ 247.918980][T27409] dump_stack+0x197/0x210 [ 247.918995][T27409] should_fail.cold+0xa/0x15 [ 247.919006][T27409] ? fault_create_debugfs_attr+0x180/0x180 [ 247.919018][T27409] ? ___might_sleep+0x163/0x2c0 [ 247.919030][T27409] __should_failslab+0x121/0x190 [ 247.919053][T27409] should_failslab+0x9/0x14 [ 247.919062][T27409] kmem_cache_alloc+0x2aa/0x710 [ 247.919071][T27409] ? __put_user_ns+0x70/0x70 [ 247.919080][T27409] ? percpu_ref_put_many+0xb1/0x180 [ 247.919091][T27409] security_inode_alloc+0x39/0x160 [ 247.919102][T27409] inode_init_always+0x56e/0xba0 [ 247.919111][T27409] alloc_inode+0x89/0x1e0 [ 247.919120][T27409] new_inode_pseudo+0x19/0xf0 [ 247.919128][T27409] new_inode+0x1f/0x40 [ 247.919136][T27409] shmem_get_inode+0x84/0x7e0 [ 247.919152][T27409] __shmem_file_setup.part.0+0x7e/0x2b0 [ 247.925645][T27409] shmem_file_setup+0x66/0x90 [ 247.925645][T27409] __x64_sys_memfd_create+0x2a2/0x470 [ 247.925645][T27409] ? memfd_fcntl+0x18c0/0x18c0 [ 247.925645][T27409] ? do_syscall_64+0x26/0x790 [ 247.925645][T27409] ? lockdep_hardirqs_on+0x421/0x5e0 [ 247.925645][T27409] ? trace_hardirqs_on+0x67/0x240 [ 247.925645][T27409] do_syscall_64+0xfa/0x790 [ 247.925645][T27409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.925645][T27409] RIP: 0033:0x45a759 [ 247.925645][T27409] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.925645][T27409] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 247.925645][T27409] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 247.925645][T27409] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 247.925645][T27409] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 247.925645][T27409] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 247.925645][T27409] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 247.999215][T27414] gfs2: Unknown parameter 'obj_type' [ 248.572013][T27427] FAULT_INJECTION: forcing a failure. [ 248.572013][T27427] name failslab, interval 1, probability 0, space 0, times 0 [ 248.576674][T27428] FAULT_INJECTION: forcing a failure. [ 248.576674][T27428] name failslab, interval 1, probability 0, space 0, times 0 [ 248.597144][T27428] CPU: 1 PID: 27428 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 248.605297][T27428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 248.612246][T27428] Call Trace: [ 248.612246][T27428] dump_stack+0x197/0x210 [ 248.612246][T27428] should_fail.cold+0xa/0x15 [ 248.612246][T27428] ? fault_create_debugfs_attr+0x180/0x180 [ 248.612246][T27428] ? ___might_sleep+0x163/0x2c0 [ 248.612246][T27428] __should_failslab+0x121/0x190 [ 248.612246][T27428] should_failslab+0x9/0x14 [ 248.612246][T27428] kmem_cache_alloc+0x2aa/0x710 [ 248.612246][T27428] ? current_time+0x6b/0x110 [ 248.612246][T27428] ? ktime_get_coarse_real_ts64+0xeb/0x2a0 [ 248.612246][T27428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.612246][T27428] ? timestamp_truncate+0x20f/0x2f0 [ 248.612246][T27428] __d_alloc+0x2e/0x8c0 [ 248.612246][T27428] d_alloc_pseudo+0x1e/0x70 [ 248.612246][T27428] alloc_file_pseudo+0xe2/0x280 [ 248.612246][T27428] ? alloc_file+0x4d0/0x4d0 [ 248.612246][T27428] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 248.612246][T27428] __shmem_file_setup.part.0+0x108/0x2b0 [ 248.612246][T27428] shmem_file_setup+0x66/0x90 [ 248.612246][T27428] __x64_sys_memfd_create+0x2a2/0x470 [ 248.612246][T27428] ? memfd_fcntl+0x18c0/0x18c0 [ 248.612246][T27428] ? do_syscall_64+0x26/0x790 [ 248.612246][T27428] ? lockdep_hardirqs_on+0x421/0x5e0 [ 248.612246][T27428] ? trace_hardirqs_on+0x67/0x240 [ 248.612246][T27428] do_syscall_64+0xfa/0x790 [ 248.612246][T27428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.612246][T27428] RIP: 0033:0x45a759 [ 248.612246][T27428] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.612246][T27428] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 248.612246][T27428] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 248.612246][T27428] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 248.612246][T27428] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 248.612246][T27428] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 248.612246][T27428] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:28 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 248.811781][T27427] CPU: 2 PID: 27427 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 10:03:28 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)) [ 248.813875][T27427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 10:03:28 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 248.813875][T27427] Call Trace: [ 248.813875][T27427] dump_stack+0x197/0x210 [ 248.813875][T27427] should_fail.cold+0xa/0x15 [ 248.813875][T27427] ? fault_create_debugfs_attr+0x180/0x180 [ 248.813875][T27427] ? ___might_sleep+0x163/0x2c0 [ 248.813875][T27427] __should_failslab+0x121/0x190 [ 248.813875][T27427] should_failslab+0x9/0x14 [ 248.813875][T27427] kmem_cache_alloc+0x2aa/0x710 [ 248.813875][T27427] ? current_time+0x6b/0x110 [ 248.813875][T27427] ? ktime_get_coarse_real_ts64+0xeb/0x2a0 [ 248.813875][T27427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.813875][T27427] ? timestamp_truncate+0x20f/0x2f0 [ 248.813875][T27427] __d_alloc+0x2e/0x8c0 [ 248.813875][T27427] d_alloc_pseudo+0x1e/0x70 [ 248.813875][T27427] alloc_file_pseudo+0xe2/0x280 [ 248.813875][T27427] ? alloc_file+0x4d0/0x4d0 [ 248.813875][T27427] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 248.813875][T27427] __shmem_file_setup.part.0+0x108/0x2b0 [ 248.813875][T27427] shmem_file_setup+0x66/0x90 [ 248.813875][T27427] __x64_sys_memfd_create+0x2a2/0x470 [ 248.813875][T27427] ? memfd_fcntl+0x18c0/0x18c0 [ 248.813875][T27427] ? do_syscall_64+0x26/0x790 [ 248.813875][T27427] ? lockdep_hardirqs_on+0x421/0x5e0 [ 248.813875][T27427] ? trace_hardirqs_on+0x67/0x240 [ 248.813875][T27427] do_syscall_64+0xfa/0x790 [ 248.813875][T27427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.813875][T27427] RIP: 0033:0x45a759 [ 248.813875][T27427] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.813875][T27427] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 248.813875][T27427] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 248.813875][T27427] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 248.813875][T27427] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 248.813875][T27427] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f7b351d76d4 [ 248.813875][T27427] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:28 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:28 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 249.120644][T27446] FAULT_INJECTION: forcing a failure. [ 249.120644][T27446] name failslab, interval 1, probability 0, space 0, times 0 [ 249.134940][T27442] FAULT_INJECTION: forcing a failure. [ 249.134940][T27442] name failslab, interval 1, probability 0, space 0, times 0 [ 249.135988][T27446] CPU: 1 PID: 27446 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 249.136109][T27447] gfs2: not a GFS2 filesystem [ 249.137182][T27451] FAULT_INJECTION: forcing a failure. [ 249.137182][T27451] name failslab, interval 1, probability 0, space 0, times 0 [ 249.150129][T27446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 249.150129][T27446] Call Trace: [ 249.150129][T27446] dump_stack+0x197/0x210 [ 249.150129][T27446] should_fail.cold+0xa/0x15 [ 249.150129][T27446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.150129][T27446] ? fault_create_debugfs_attr+0x180/0x180 [ 249.150129][T27446] ? ___might_sleep+0x163/0x2c0 [ 249.150129][T27446] __should_failslab+0x121/0x190 [ 249.150129][T27446] ? shmem_destroy_inode+0x80/0x80 [ 249.150129][T27446] should_failslab+0x9/0x14 [ 249.150129][T27446] kmem_cache_alloc+0x2aa/0x710 [ 249.150129][T27446] ? __alloc_fd+0x487/0x620 [ 249.150129][T27446] ? shmem_destroy_inode+0x80/0x80 [ 249.150129][T27446] shmem_alloc_inode+0x1c/0x50 [ 249.150129][T27446] alloc_inode+0x68/0x1e0 [ 249.150129][T27446] new_inode_pseudo+0x19/0xf0 [ 249.150129][T27446] new_inode+0x1f/0x40 [ 249.150129][T27446] shmem_get_inode+0x84/0x7e0 [ 249.150129][T27446] __shmem_file_setup.part.0+0x7e/0x2b0 [ 249.150129][T27446] shmem_file_setup+0x66/0x90 [ 249.150129][T27446] __x64_sys_memfd_create+0x2a2/0x470 [ 249.150129][T27446] ? memfd_fcntl+0x18c0/0x18c0 [ 249.150129][T27446] ? do_syscall_64+0x26/0x790 [ 249.150129][T27446] ? lockdep_hardirqs_on+0x421/0x5e0 [ 249.150129][T27446] ? trace_hardirqs_on+0x67/0x240 [ 249.150129][T27446] do_syscall_64+0xfa/0x790 [ 249.150129][T27446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.150129][T27446] RIP: 0033:0x45a759 [ 249.150129][T27446] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.150129][T27446] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.150129][T27446] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 249.150129][T27446] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 249.150129][T27446] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 249.150129][T27446] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f30143396d4 [ 249.150129][T27446] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:28 executing program 4: r0 = syz_open_dev$radio(0x0, 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)) [ 249.376391][T27442] CPU: 2 PID: 27442 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 249.378082][T27436] gfs2: not a GFS2 filesystem [ 249.383868][T27442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 249.383868][T27442] Call Trace: [ 249.383868][T27442] dump_stack+0x197/0x210 10:03:28 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 249.383868][T27442] should_fail.cold+0xa/0x15 [ 249.383868][T27442] ? fault_create_debugfs_attr+0x180/0x180 [ 249.383868][T27442] ? ___might_sleep+0x163/0x2c0 [ 249.383868][T27442] __should_failslab+0x121/0x190 [ 249.383868][T27442] should_failslab+0x9/0x14 [ 249.383868][T27442] kmem_cache_alloc+0x2aa/0x710 [ 249.383868][T27442] ? rwlock_bug.part.0+0x90/0x90 [ 249.383868][T27442] ? lock_downgrade+0x920/0x920 [ 249.383868][T27442] __alloc_file+0x27/0x340 [ 249.383868][T27442] alloc_empty_file+0x72/0x170 [ 249.383868][T27442] alloc_file+0x5e/0x4d0 [ 249.383868][T27442] alloc_file_pseudo+0x189/0x280 [ 249.383868][T27442] ? alloc_file+0x4d0/0x4d0 [ 249.383868][T27442] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 249.383868][T27442] __shmem_file_setup.part.0+0x108/0x2b0 [ 249.383868][T27442] shmem_file_setup+0x66/0x90 [ 249.383868][T27442] __x64_sys_memfd_create+0x2a2/0x470 [ 249.383868][T27442] ? memfd_fcntl+0x18c0/0x18c0 [ 249.383868][T27442] ? do_syscall_64+0x26/0x790 [ 249.383868][T27442] ? lockdep_hardirqs_on+0x421/0x5e0 [ 249.383868][T27442] ? trace_hardirqs_on+0x67/0x240 [ 249.383868][T27442] do_syscall_64+0xfa/0x790 [ 249.383868][T27442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.383868][T27442] RIP: 0033:0x45a759 [ 249.383868][T27442] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.383868][T27442] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.383868][T27442] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 249.383868][T27442] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 249.383868][T27442] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 249.383868][T27442] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 249.383868][T27442] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 249.592620][T27451] CPU: 1 PID: 27451 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 249.593867][T27451] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 249.593867][T27451] Call Trace: [ 249.593867][T27451] dump_stack+0x197/0x210 [ 249.593867][T27451] should_fail.cold+0xa/0x15 [ 249.593867][T27451] ? fault_create_debugfs_attr+0x180/0x180 [ 249.593867][T27451] ? ___might_sleep+0x163/0x2c0 [ 249.593867][T27451] __should_failslab+0x121/0x190 [ 249.593867][T27451] should_failslab+0x9/0x14 [ 249.593867][T27451] kmem_cache_alloc+0x2aa/0x710 [ 249.593867][T27451] ? rwlock_bug.part.0+0x90/0x90 10:03:29 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 249.593867][T27451] ? lock_downgrade+0x920/0x920 [ 249.642702][T27456] FAULT_INJECTION: forcing a failure. 10:03:29 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:29 executing program 4: r0 = syz_open_dev$radio(0x0, 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)) [ 249.642702][T27456] name failslab, interval 1, probability 0, space 0, times 0 [ 249.623505][T27451] __alloc_file+0x27/0x340 [ 249.623505][T27451] alloc_empty_file+0x72/0x170 [ 249.623505][T27451] alloc_file+0x5e/0x4d0 [ 249.623505][T27451] alloc_file_pseudo+0x189/0x280 [ 249.623505][T27451] ? alloc_file+0x4d0/0x4d0 [ 249.623505][T27451] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 249.623505][T27451] __shmem_file_setup.part.0+0x108/0x2b0 [ 249.623505][T27451] shmem_file_setup+0x66/0x90 [ 249.623505][T27451] __x64_sys_memfd_create+0x2a2/0x470 10:03:29 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 249.623505][T27451] ? memfd_fcntl+0x18c0/0x18c0 [ 249.623505][T27451] ? do_syscall_64+0x26/0x790 [ 249.654203][T27451] ? lockdep_hardirqs_on+0x421/0x5e0 [ 249.654203][T27451] ? trace_hardirqs_on+0x67/0x240 [ 249.654203][T27451] do_syscall_64+0xfa/0x790 [ 249.654203][T27451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.654203][T27451] RIP: 0033:0x45a759 [ 249.654203][T27451] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.654203][T27451] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.654203][T27451] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 249.654203][T27451] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 249.654203][T27451] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 249.654203][T27451] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f7b351d76d4 [ 249.654203][T27451] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 249.687812][T27456] CPU: 2 PID: 27456 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 249.687824][T27456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 249.687837][T27456] Call Trace: [ 249.691911][T27460] FAULT_INJECTION: forcing a failure. [ 249.691911][T27460] name failslab, interval 1, probability 0, space 0, times 0 [ 249.743940][T27456] dump_stack+0x197/0x210 [ 249.743940][T27456] should_fail.cold+0xa/0x15 [ 249.743940][T27456] ? fault_create_debugfs_attr+0x180/0x180 [ 249.743940][T27456] ? ___might_sleep+0x163/0x2c0 [ 249.743940][T27456] __should_failslab+0x121/0x190 [ 249.743940][T27456] should_failslab+0x9/0x14 [ 249.873925][T27456] kmem_cache_alloc+0x2aa/0x710 [ 249.873925][T27456] ? __put_user_ns+0x70/0x70 [ 249.873925][T27456] ? percpu_ref_put_many+0xb1/0x180 [ 249.873925][T27456] security_inode_alloc+0x39/0x160 [ 249.873925][T27456] inode_init_always+0x56e/0xba0 [ 249.873925][T27456] alloc_inode+0x89/0x1e0 [ 249.873925][T27456] new_inode_pseudo+0x19/0xf0 [ 249.873925][T27456] new_inode+0x1f/0x40 [ 249.873925][T27456] shmem_get_inode+0x84/0x7e0 [ 249.873925][T27456] __shmem_file_setup.part.0+0x7e/0x2b0 [ 249.873925][T27456] shmem_file_setup+0x66/0x90 [ 249.873925][T27456] __x64_sys_memfd_create+0x2a2/0x470 [ 249.873925][T27456] ? memfd_fcntl+0x18c0/0x18c0 [ 249.873925][T27456] ? do_syscall_64+0x26/0x790 [ 249.873925][T27456] ? lockdep_hardirqs_on+0x421/0x5e0 [ 249.873925][T27456] ? trace_hardirqs_on+0x67/0x240 [ 249.873925][T27456] do_syscall_64+0xfa/0x790 [ 249.873925][T27456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.873925][T27456] RIP: 0033:0x45a759 [ 249.873925][T27456] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.873925][T27456] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 249.873925][T27456] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 249.873925][T27456] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 249.873925][T27456] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 249.873925][T27456] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f30143396d4 [ 249.873925][T27456] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 250.037987][T27460] CPU: 0 PID: 27460 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 250.043869][T27460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 250.043869][T27460] Call Trace: [ 250.043869][T27460] dump_stack+0x197/0x210 [ 250.043869][T27460] should_fail.cold+0xa/0x15 10:03:29 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 250.043869][T27460] ? fault_create_debugfs_attr+0x180/0x180 [ 250.043869][T27460] ? ___might_sleep+0x163/0x2c0 [ 250.043869][T27460] __should_failslab+0x121/0x190 [ 250.043869][T27460] should_failslab+0x9/0x14 [ 250.043869][T27460] kmem_cache_alloc+0x2aa/0x710 [ 250.043869][T27460] ? kmem_cache_alloc+0x364/0x710 [ 250.043869][T27460] security_file_alloc+0x39/0x170 [ 250.043869][T27460] __alloc_file+0xde/0x340 [ 250.043869][T27460] alloc_empty_file+0x72/0x170 [ 250.076585][T27460] alloc_file+0x5e/0x4d0 [ 250.076585][T27460] alloc_file_pseudo+0x189/0x280 [ 250.076585][T27460] ? alloc_file+0x4d0/0x4d0 [ 250.076585][T27460] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 250.076585][T27460] __shmem_file_setup.part.0+0x108/0x2b0 [ 250.076585][T27460] shmem_file_setup+0x66/0x90 [ 250.076585][T27460] __x64_sys_memfd_create+0x2a2/0x470 [ 250.076585][T27460] ? memfd_fcntl+0x18c0/0x18c0 [ 250.076585][T27460] ? do_syscall_64+0x26/0x790 [ 250.076585][T27460] ? lockdep_hardirqs_on+0x421/0x5e0 [ 250.076585][T27460] ? trace_hardirqs_on+0x67/0x240 [ 250.076585][T27460] do_syscall_64+0xfa/0x790 [ 250.076585][T27460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.076585][T27460] RIP: 0033:0x45a759 [ 250.076585][T27460] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.076585][T27460] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 250.076585][T27460] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 250.076585][T27460] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 250.076585][T27460] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 250.076585][T27460] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 250.076585][T27460] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 250.260519][T27465] gfs2: not a GFS2 filesystem 10:03:29 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:29 executing program 4: r0 = syz_open_dev$radio(0x0, 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)) 10:03:29 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 250.268244][T27472] FAULT_INJECTION: forcing a failure. [ 250.268244][T27472] name failslab, interval 1, probability 0, space 0, times 0 [ 250.281675][T27472] CPU: 2 PID: 27472 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 250.290064][T27472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 250.291125][T27478] FAULT_INJECTION: forcing a failure. [ 250.291125][T27478] name failslab, interval 1, probability 0, space 0, times 0 [ 250.292306][T27479] FAULT_INJECTION: forcing a failure. 10:03:29 executing program 4: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) [ 250.292306][T27479] name failslab, interval 1, probability 0, space 0, times 0 [ 250.291332][T27472] Call Trace: [ 250.291332][T27472] dump_stack+0x197/0x210 [ 250.291332][T27472] should_fail.cold+0xa/0x15 [ 250.291332][T27472] ? fault_create_debugfs_attr+0x180/0x180 [ 250.291332][T27472] ? ___might_sleep+0x163/0x2c0 [ 250.291332][T27472] __should_failslab+0x121/0x190 [ 250.291332][T27472] should_failslab+0x9/0x14 [ 250.291332][T27472] kmem_cache_alloc+0x2aa/0x710 [ 250.291332][T27472] ? current_time+0x6b/0x110 [ 250.291332][T27472] ? ktime_get_coarse_real_ts64+0xeb/0x2a0 [ 250.291332][T27472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.291332][T27472] ? timestamp_truncate+0x20f/0x2f0 [ 250.291332][T27472] __d_alloc+0x2e/0x8c0 [ 250.291332][T27472] d_alloc_pseudo+0x1e/0x70 [ 250.291332][T27472] alloc_file_pseudo+0xe2/0x280 [ 250.291332][T27472] ? alloc_file+0x4d0/0x4d0 [ 250.291332][T27472] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 250.344024][T27472] __shmem_file_setup.part.0+0x108/0x2b0 [ 250.344024][T27472] shmem_file_setup+0x66/0x90 [ 250.344024][T27472] __x64_sys_memfd_create+0x2a2/0x470 [ 250.344024][T27472] ? memfd_fcntl+0x18c0/0x18c0 [ 250.344024][T27472] ? do_syscall_64+0x26/0x790 [ 250.433946][T27472] ? lockdep_hardirqs_on+0x421/0x5e0 [ 250.433946][T27472] ? trace_hardirqs_on+0x67/0x240 [ 250.433946][T27472] do_syscall_64+0xfa/0x790 [ 250.433946][T27472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.433946][T27472] RIP: 0033:0x45a759 [ 250.433946][T27472] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.433946][T27472] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 250.433946][T27472] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 250.433946][T27472] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 250.503996][T27472] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 250.503996][T27472] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f30143396d4 [ 250.503996][T27472] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 250.528123][T27479] CPU: 0 PID: 27479 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 250.534283][T27479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 250.534283][T27479] Call Trace: 10:03:29 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 250.545771][T27479] dump_stack+0x197/0x210 [ 250.545771][T27479] should_fail.cold+0xa/0x15 [ 250.545771][T27479] ? fault_create_debugfs_attr+0x180/0x180 [ 250.545771][T27479] ? ___might_sleep+0x163/0x2c0 [ 250.545771][T27479] __should_failslab+0x121/0x190 [ 250.545771][T27479] should_failslab+0x9/0x14 [ 250.545771][T27479] kmem_cache_alloc+0x2aa/0x710 [ 250.545771][T27479] ? kmem_cache_alloc+0x364/0x710 [ 250.545771][T27479] security_file_alloc+0x39/0x170 [ 250.545771][T27479] __alloc_file+0xde/0x340 [ 250.545771][T27479] alloc_empty_file+0x72/0x170 [ 250.545771][T27479] alloc_file+0x5e/0x4d0 [ 250.545771][T27479] alloc_file_pseudo+0x189/0x280 [ 250.545771][T27479] ? alloc_file+0x4d0/0x4d0 [ 250.545771][T27479] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 250.545771][T27479] __shmem_file_setup.part.0+0x108/0x2b0 [ 250.545771][T27479] shmem_file_setup+0x66/0x90 [ 250.545771][T27479] __x64_sys_memfd_create+0x2a2/0x470 [ 250.545771][T27479] ? memfd_fcntl+0x18c0/0x18c0 [ 250.545771][T27479] ? do_syscall_64+0x26/0x790 [ 250.545771][T27479] ? lockdep_hardirqs_on+0x421/0x5e0 [ 250.545771][T27479] ? trace_hardirqs_on+0x67/0x240 [ 250.545771][T27479] do_syscall_64+0xfa/0x790 [ 250.545771][T27479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.545771][T27479] RIP: 0033:0x45a759 [ 250.545771][T27479] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.545771][T27479] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 250.545771][T27479] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 250.545771][T27479] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 250.545771][T27479] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 250.545771][T27479] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f2e4d7216d4 [ 250.545771][T27479] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 250.742095][T27478] CPU: 1 PID: 27478 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 250.743866][T27478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 250.754596][T27478] Call Trace: [ 250.754596][T27478] dump_stack+0x197/0x210 [ 250.754596][T27478] should_fail.cold+0xa/0x15 [ 250.754596][T27478] ? fault_create_debugfs_attr+0x180/0x180 [ 250.754596][T27478] ? ___might_sleep+0x163/0x2c0 [ 250.754596][T27478] __should_failslab+0x121/0x190 [ 250.754596][T27478] should_failslab+0x9/0x14 [ 250.754596][T27478] kmem_cache_alloc+0x2aa/0x710 [ 250.754596][T27478] ? kmem_cache_alloc+0x364/0x710 [ 250.754596][T27478] security_file_alloc+0x39/0x170 [ 250.754596][T27478] __alloc_file+0xde/0x340 [ 250.754596][T27478] alloc_empty_file+0x72/0x170 [ 250.754596][T27478] alloc_file+0x5e/0x4d0 [ 250.754596][T27478] alloc_file_pseudo+0x189/0x280 [ 250.754596][T27478] ? alloc_file+0x4d0/0x4d0 [ 250.754596][T27478] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 250.754596][T27478] __shmem_file_setup.part.0+0x108/0x2b0 [ 250.754596][T27478] shmem_file_setup+0x66/0x90 [ 250.754596][T27478] __x64_sys_memfd_create+0x2a2/0x470 [ 250.754596][T27478] ? memfd_fcntl+0x18c0/0x18c0 [ 250.754596][T27478] ? do_syscall_64+0x26/0x790 [ 250.754596][T27478] ? lockdep_hardirqs_on+0x421/0x5e0 [ 250.754596][T27478] ? trace_hardirqs_on+0x67/0x240 [ 250.754596][T27478] do_syscall_64+0xfa/0x790 [ 250.754596][T27478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.754596][T27478] RIP: 0033:0x45a759 [ 250.754596][T27478] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.754596][T27478] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 250.754596][T27478] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 250.754596][T27478] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 250.754596][T27478] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 250.754596][T27478] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f7b351d76d4 [ 250.754596][T27478] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:30 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:30 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:30 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 250.987615][T27477] gfs2: not a GFS2 filesystem [ 250.989519][T27491] FAULT_INJECTION: forcing a failure. [ 250.989519][T27491] name failslab, interval 1, probability 0, space 0, times 0 [ 251.008349][T27491] CPU: 1 PID: 27491 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 251.013976][T27491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 251.013976][T27491] Call Trace: [ 251.013976][T27491] dump_stack+0x197/0x210 [ 251.013976][T27491] should_fail.cold+0xa/0x15 [ 251.013976][T27491] ? fault_create_debugfs_attr+0x180/0x180 [ 251.013976][T27491] ? ___might_sleep+0x163/0x2c0 [ 251.013976][T27491] __should_failslab+0x121/0x190 [ 251.013976][T27491] should_failslab+0x9/0x14 [ 251.053923][T27491] kmem_cache_alloc+0x2aa/0x710 [ 251.053923][T27491] ? rwlock_bug.part.0+0x90/0x90 [ 251.053923][T27491] ? lock_downgrade+0x920/0x920 [ 251.053923][T27491] __alloc_file+0x27/0x340 [ 251.053923][T27491] alloc_empty_file+0x72/0x170 [ 251.053923][T27491] alloc_file+0x5e/0x4d0 [ 251.053923][T27491] alloc_file_pseudo+0x189/0x280 [ 251.053923][T27491] ? alloc_file+0x4d0/0x4d0 [ 251.053923][T27491] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 251.053923][T27491] __shmem_file_setup.part.0+0x108/0x2b0 [ 251.053923][T27491] shmem_file_setup+0x66/0x90 [ 251.053923][T27491] __x64_sys_memfd_create+0x2a2/0x470 [ 251.053923][T27491] ? memfd_fcntl+0x18c0/0x18c0 [ 251.053923][T27491] ? do_syscall_64+0x26/0x790 [ 251.053923][T27491] ? lockdep_hardirqs_on+0x421/0x5e0 [ 251.053923][T27491] ? trace_hardirqs_on+0x67/0x240 [ 251.053923][T27491] do_syscall_64+0xfa/0x790 [ 251.053923][T27491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.053923][T27491] RIP: 0033:0x45a759 [ 251.053923][T27491] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.053923][T27491] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 251.053923][T27491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 251.053923][T27491] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 251.053923][T27491] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 251.053923][T27491] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f30143396d4 [ 251.053923][T27491] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:30 executing program 4: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) 10:03:30 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 251.245396][T27498] FAULT_INJECTION: forcing a failure. [ 251.245396][T27498] name failslab, interval 1, probability 0, space 0, times 0 [ 251.261083][T27494] gfs2: not a GFS2 filesystem [ 251.266064][T27498] CPU: 3 PID: 27498 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 251.273912][T27498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 251.281434][T27507] FAULT_INJECTION: forcing a failure. [ 251.281434][T27507] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 251.273912][T27498] Call Trace: [ 251.273912][T27498] dump_stack+0x197/0x210 [ 251.273912][T27498] should_fail.cold+0xa/0x15 [ 251.273912][T27498] ? fault_create_debugfs_attr+0x180/0x180 [ 251.273912][T27498] ? ___might_sleep+0x163/0x2c0 [ 251.273912][T27498] __should_failslab+0x121/0x190 [ 251.273912][T27498] should_failslab+0x9/0x14 [ 251.285675][T27508] FAULT_INJECTION: forcing a failure. [ 251.285675][T27508] name failslab, interval 1, probability 0, space 0, times 0 [ 251.273912][T27498] __kmalloc+0x2e0/0x770 [ 251.273912][T27498] ? mark_held_locks+0xf0/0xf0 [ 251.273912][T27498] ? stack_trace_save+0xac/0xe0 [ 251.273912][T27498] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 251.273912][T27498] tomoyo_realpath_from_path+0xcd/0x7b0 [ 251.273912][T27498] ? tomoyo_path_perm+0x1cb/0x430 [ 251.306606][T27504] gfs2: not a GFS2 filesystem [ 251.273912][T27498] tomoyo_path_perm+0x230/0x430 [ 251.273912][T27498] ? tomoyo_path_perm+0x1cb/0x430 [ 251.273912][T27498] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 251.273912][T27498] ? rcu_read_lock_held+0x9c/0xb0 [ 251.273912][T27498] ? rcu_read_lock_any_held+0xcd/0xf0 [ 251.273912][T27498] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 251.273912][T27498] tomoyo_path_truncate+0x1d/0x30 [ 251.273912][T27498] security_path_truncate+0xf2/0x150 [ 251.273912][T27498] do_sys_ftruncate+0x3d9/0x550 [ 251.273912][T27498] __x64_sys_ftruncate+0x59/0x80 [ 251.273912][T27498] do_syscall_64+0xfa/0x790 [ 251.273912][T27498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.273912][T27498] RIP: 0033:0x45a727 [ 251.273912][T27498] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.273912][T27498] RSP: 002b:00007f7b351d6a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 251.273912][T27498] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a727 [ 251.273912][T27498] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 251.273912][T27498] RBP: 00007f7b351d6ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 251.273912][T27498] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000004 [ 251.273912][T27498] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:30 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 251.511549][T27508] CPU: 1 PID: 27508 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 251.513673][T27498] ERROR: Out of memory at tomoyo_realpath_from_path. [ 251.513946][T27508] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 251.513946][T27508] Call Trace: [ 251.513946][T27508] dump_stack+0x197/0x210 [ 251.513946][T27508] should_fail.cold+0xa/0x15 [ 251.513946][T27508] ? fault_create_debugfs_attr+0x180/0x180 [ 251.513946][T27508] ? ___might_sleep+0x163/0x2c0 [ 251.513946][T27508] __should_failslab+0x121/0x190 [ 251.513946][T27508] should_failslab+0x9/0x14 [ 251.513946][T27508] kmem_cache_alloc+0x2aa/0x710 [ 251.513946][T27508] ? kmem_cache_alloc+0x364/0x710 [ 251.513946][T27508] security_file_alloc+0x39/0x170 [ 251.513946][T27508] __alloc_file+0xde/0x340 [ 251.513946][T27508] alloc_empty_file+0x72/0x170 [ 251.513946][T27508] alloc_file+0x5e/0x4d0 [ 251.513946][T27508] alloc_file_pseudo+0x189/0x280 [ 251.513946][T27508] ? alloc_file+0x4d0/0x4d0 [ 251.513946][T27508] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 251.513946][T27508] __shmem_file_setup.part.0+0x108/0x2b0 [ 251.513946][T27508] shmem_file_setup+0x66/0x90 [ 251.513946][T27508] __x64_sys_memfd_create+0x2a2/0x470 [ 251.513946][T27508] ? memfd_fcntl+0x18c0/0x18c0 [ 251.513946][T27508] ? do_syscall_64+0x26/0x790 [ 251.513946][T27508] ? lockdep_hardirqs_on+0x421/0x5e0 [ 251.513946][T27508] ? trace_hardirqs_on+0x67/0x240 [ 251.513946][T27508] do_syscall_64+0xfa/0x790 [ 251.513946][T27508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.513946][T27508] RIP: 0033:0x45a759 [ 251.513946][T27508] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.513946][T27508] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 251.513946][T27508] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a759 [ 251.513946][T27508] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004a6678 [ 251.513946][T27508] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 251.513946][T27508] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f30143396d4 [ 251.513946][T27508] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 251.532214][T27507] CPU: 0 PID: 27507 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 251.532214][T27507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 251.532214][T27507] Call Trace: [ 251.532214][T27507] dump_stack+0x197/0x210 [ 251.532214][T27507] should_fail.cold+0xa/0x15 [ 251.532214][T27507] ? fault_create_debugfs_attr+0x180/0x180 [ 251.532214][T27507] ? is_bpf_text_address+0xac/0x160 [ 251.532214][T27507] should_fail_alloc_page+0x50/0x60 [ 251.532214][T27507] __alloc_pages_nodemask+0x1a1/0x910 [ 251.532214][T27507] ? __alloc_pages_slowpath+0x2920/0x2920 [ 251.532214][T27507] ? __kasan_check_read+0x11/0x20 [ 251.532214][T27507] ? fault_create_debugfs_attr+0x180/0x180 [ 251.532214][T27507] cache_grow_begin+0x90/0xd00 [ 251.532214][T27507] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 251.532214][T27507] ? trace_hardirqs_off+0x62/0x240 [ 251.532214][T27507] __kmalloc+0x6b2/0x770 [ 251.532214][T27507] ? mark_held_locks+0xf0/0xf0 [ 251.532214][T27507] ? stack_trace_save+0xac/0xe0 [ 251.532214][T27507] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 251.532214][T27507] tomoyo_realpath_from_path+0xcd/0x7b0 [ 251.532214][T27507] ? tomoyo_path_perm+0x1cb/0x430 [ 251.532214][T27507] tomoyo_path_perm+0x230/0x430 [ 251.532214][T27507] ? tomoyo_path_perm+0x1cb/0x430 [ 251.532214][T27507] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 251.532214][T27507] ? rcu_read_lock_held+0x9c/0xb0 [ 251.532214][T27507] ? rcu_read_lock_any_held+0xcd/0xf0 [ 251.532214][T27507] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 251.532214][T27507] tomoyo_path_truncate+0x1d/0x30 [ 251.532214][T27507] security_path_truncate+0xf2/0x150 [ 251.532214][T27507] do_sys_ftruncate+0x3d9/0x550 [ 251.532214][T27507] __x64_sys_ftruncate+0x59/0x80 [ 251.532214][T27507] do_syscall_64+0xfa/0x790 [ 251.532214][T27507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.532214][T27507] RIP: 0033:0x45a727 [ 251.532214][T27507] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.532214][T27507] RSP: 002b:00007f2e4d720a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 251.532214][T27507] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a727 [ 251.532214][T27507] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 251.532214][T27507] RBP: 00007f2e4d720ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 251.532214][T27507] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000004 [ 251.532214][T27507] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:31 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:31 executing program 4: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) [ 252.053633][T27516] FAULT_INJECTION: forcing a failure. 10:03:31 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 252.053633][T27516] name failslab, interval 1, probability 0, space 0, times 0 10:03:31 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) [ 252.071359][T27516] CPU: 1 PID: 27516 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 252.076390][T27516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 252.076390][T27516] Call Trace: [ 252.076390][T27516] dump_stack+0x197/0x210 [ 252.076390][T27516] should_fail.cold+0xa/0x15 10:03:31 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 252.076390][T27516] ? fault_create_debugfs_attr+0x180/0x180 [ 252.076390][T27516] ? ___might_sleep+0x163/0x2c0 [ 252.076390][T27516] __should_failslab+0x121/0x190 [ 252.076390][T27516] should_failslab+0x9/0x14 [ 252.076390][T27516] __kmalloc+0x2e0/0x770 [ 252.076390][T27516] ? mark_held_locks+0xf0/0xf0 [ 252.076390][T27516] ? stack_trace_save+0xac/0xe0 [ 252.076390][T27516] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 252.076390][T27516] tomoyo_realpath_from_path+0xcd/0x7b0 [ 252.076390][T27516] ? tomoyo_path_perm+0x1cb/0x430 [ 252.076390][T27516] tomoyo_path_perm+0x230/0x430 [ 252.076390][T27516] ? tomoyo_path_perm+0x1cb/0x430 [ 252.076390][T27516] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 252.076390][T27516] ? rcu_read_lock_held+0x9c/0xb0 [ 252.076390][T27516] ? rcu_read_lock_any_held+0xcd/0xf0 [ 252.076390][T27516] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 252.076390][T27516] tomoyo_path_truncate+0x1d/0x30 [ 252.076390][T27516] security_path_truncate+0xf2/0x150 [ 252.076390][T27516] do_sys_ftruncate+0x3d9/0x550 [ 252.076390][T27516] __x64_sys_ftruncate+0x59/0x80 [ 252.076390][T27516] do_syscall_64+0xfa/0x790 [ 252.076390][T27516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.076390][T27516] RIP: 0033:0x45a727 [ 252.076390][T27516] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.076390][T27516] RSP: 002b:00007f3014338a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 252.076390][T27516] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a727 [ 252.253927][T27516] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 252.253927][T27516] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 252.264123][T27516] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000004 [ 252.264123][T27516] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 252.288002][T27516] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:31 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:03:31 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) 10:03:31 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 252.648054][T27519] gfs2: not a GFS2 filesystem 10:03:32 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:32 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, 0x0) 10:03:32 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 252.788784][T27553] FAULT_INJECTION: forcing a failure. [ 252.788784][T27553] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 252.798214][T27538] gfs2: not a GFS2 filesystem [ 252.798066][T27553] CPU: 0 PID: 27553 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 252.798066][T27553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 252.798066][T27553] Call Trace: [ 252.798066][T27553] dump_stack+0x197/0x210 [ 252.798066][T27553] should_fail.cold+0xa/0x15 [ 252.818802][T27553] ? fault_create_debugfs_attr+0x180/0x180 [ 252.818802][T27553] ? is_bpf_text_address+0xac/0x160 [ 252.818802][T27553] should_fail_alloc_page+0x50/0x60 [ 252.818802][T27553] __alloc_pages_nodemask+0x1a1/0x910 10:03:32 executing program 4: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f00000000c0)) [ 252.818802][T27553] ? __alloc_pages_slowpath+0x2920/0x2920 [ 252.818802][T27553] ? __kasan_check_read+0x11/0x20 [ 252.818802][T27553] ? fault_create_debugfs_attr+0x180/0x180 [ 252.818802][T27553] cache_grow_begin+0x90/0xd00 [ 252.818802][T27553] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 252.818802][T27553] ? trace_hardirqs_off+0x62/0x240 [ 252.818802][T27553] __kmalloc+0x6b2/0x770 [ 252.818802][T27553] ? mark_held_locks+0xf0/0xf0 [ 252.818802][T27553] ? stack_trace_save+0xac/0xe0 [ 252.818802][T27553] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 252.818802][T27553] tomoyo_realpath_from_path+0xcd/0x7b0 [ 252.818802][T27553] ? tomoyo_path_perm+0x1cb/0x430 [ 252.818802][T27553] tomoyo_path_perm+0x230/0x430 [ 252.818802][T27553] ? tomoyo_path_perm+0x1cb/0x430 [ 252.818802][T27553] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 252.818802][T27553] ? rcu_read_lock_held+0x9c/0xb0 [ 252.818802][T27553] ? rcu_read_lock_any_held+0xcd/0xf0 [ 252.818802][T27553] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 252.818802][T27553] tomoyo_path_truncate+0x1d/0x30 [ 252.818802][T27553] security_path_truncate+0xf2/0x150 [ 252.818802][T27553] do_sys_ftruncate+0x3d9/0x550 [ 252.818802][T27553] __x64_sys_ftruncate+0x59/0x80 [ 252.818802][T27553] do_syscall_64+0xfa/0x790 [ 252.818802][T27553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.818802][T27553] RIP: 0033:0x45a727 [ 252.818802][T27553] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.818802][T27553] RSP: 002b:00007f3014338a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 252.818802][T27553] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a727 [ 252.818802][T27553] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 252.818802][T27553] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 252.818802][T27553] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000004 [ 252.818802][T27553] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 10:03:32 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='\"so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:32 executing program 4: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:32 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:03:32 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='\"so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 253.192059][T27570] gfs2: not a GFS2 filesystem 10:03:32 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 253.335970][T27562] gfs2: not a GFS2 filesystem 10:03:32 executing program 4: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 253.477271][T27592] FAULT_INJECTION: forcing a failure. [ 253.477271][T27592] name failslab, interval 1, probability 0, space 0, times 0 [ 253.490212][T27592] CPU: 1 PID: 27592 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 253.498559][T27592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 253.504094][T27592] Call Trace: [ 253.504094][T27592] dump_stack+0x197/0x210 [ 253.504094][T27592] should_fail.cold+0xa/0x15 [ 253.504094][T27592] ? fault_create_debugfs_attr+0x180/0x180 [ 253.504094][T27592] ? ___might_sleep+0x163/0x2c0 [ 253.504094][T27592] __should_failslab+0x121/0x190 [ 253.504094][T27592] should_failslab+0x9/0x14 [ 253.504094][T27592] __kmalloc+0x2e0/0x770 [ 253.504094][T27592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.504094][T27592] ? simple_dname+0xd1/0x1f0 [ 253.504094][T27592] ? tomoyo_encode2.part.0+0xf5/0x400 [ 253.504094][T27592] tomoyo_encode2.part.0+0xf5/0x400 [ 253.504094][T27592] tomoyo_encode+0x2b/0x50 [ 253.504094][T27592] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 253.504094][T27592] ? tomoyo_path_perm+0x1cb/0x430 [ 253.504094][T27592] tomoyo_path_perm+0x230/0x430 [ 253.504094][T27592] ? tomoyo_path_perm+0x1cb/0x430 [ 253.504094][T27592] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 253.504094][T27592] ? rcu_read_lock_held+0x9c/0xb0 [ 253.504094][T27592] ? rcu_read_lock_any_held+0xcd/0xf0 [ 253.504094][T27592] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 253.504094][T27592] tomoyo_path_truncate+0x1d/0x30 [ 253.504094][T27592] security_path_truncate+0xf2/0x150 [ 253.504094][T27592] do_sys_ftruncate+0x3d9/0x550 [ 253.504094][T27592] __x64_sys_ftruncate+0x59/0x80 [ 253.504094][T27592] do_syscall_64+0xfa/0x790 [ 253.504094][T27592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.504094][T27592] RIP: 0033:0x45a727 [ 253.504094][T27592] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e5 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.504094][T27592] RSP: 002b:00007f3014338a98 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 253.504094][T27592] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a727 [ 253.504094][T27592] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 253.504094][T27592] RBP: 00007f3014338ca0 R08: 0000000000000000 R09: 00000000004a6544 [ 253.504094][T27592] R10: fe03f80fe03f80ff R11: 0000000000000217 R12: 0000000000000004 [ 253.504094][T27592] R13: 00000000004b117f R14: 00000000006f61e0 R15: 0000000000000003 [ 253.716222][T27592] ERROR: Out of memory at tomoyo_realpath_from_path. [ 253.749993][T27582] gfs2: not a GFS2 filesystem 10:03:33 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:33 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='%so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 253.770766][T27597] gfs2: not a GFS2 filesystem 10:03:33 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:03:33 executing program 4: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:33 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='%so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 254.001241][T27616] gfs2: not a GFS2 filesystem [ 254.007767][T27610] gfs2: not a GFS2 filesystem 10:03:33 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:33 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 254.107232][T27632] FAULT_INJECTION: forcing a failure. [ 254.107232][T27632] name failslab, interval 1, probability 0, space 0, times 0 10:03:33 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 254.121080][T27632] CPU: 1 PID: 27632 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 254.129788][T27632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 254.130874][T27632] Call Trace: [ 254.130874][T27632] dump_stack+0x197/0x210 [ 254.130874][T27632] should_fail.cold+0xa/0x15 [ 254.130874][T27632] ? is_bpf_text_address+0xce/0x160 [ 254.130874][T27632] ? fault_create_debugfs_attr+0x180/0x180 [ 254.130874][T27632] ? ___might_sleep+0x163/0x2c0 [ 254.130874][T27632] __should_failslab+0x121/0x190 [ 254.130874][T27632] should_failslab+0x9/0x14 [ 254.130874][T27632] kmem_cache_alloc+0x2aa/0x710 [ 254.130874][T27632] ? stack_trace_save+0xac/0xe0 [ 254.130874][T27632] ? stack_trace_consume_entry+0x190/0x190 [ 254.130874][T27632] __alloc_file+0x27/0x340 [ 254.130874][T27632] alloc_empty_file+0x72/0x170 [ 254.130874][T27632] path_openat+0xef/0x46d0 [ 254.130874][T27632] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 254.130874][T27632] ? kasan_slab_alloc+0xf/0x20 [ 254.130874][T27632] ? kmem_cache_alloc+0x121/0x710 [ 254.130874][T27632] ? getname_flags+0xd6/0x5b0 [ 254.130874][T27632] ? getname+0x1a/0x20 [ 254.130874][T27632] ? do_sys_open+0x2c9/0x5d0 [ 254.130874][T27632] ? __x64_sys_open+0x7e/0xc0 [ 254.130874][T27632] ? __kasan_check_read+0x11/0x20 [ 254.130874][T27632] ? mark_lock+0xc2/0x1220 [ 254.130874][T27632] ? __kasan_check_read+0x11/0x20 [ 254.130874][T27632] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 254.130874][T27632] ? __alloc_fd+0x487/0x620 [ 254.130874][T27632] do_filp_open+0x1a1/0x280 [ 254.130874][T27632] ? may_open_dev+0x100/0x100 [ 254.130874][T27632] ? lock_downgrade+0x920/0x920 [ 254.130874][T27632] ? rwlock_bug.part.0+0x90/0x90 [ 254.130874][T27632] ? do_raw_spin_unlock+0x178/0x270 [ 254.130874][T27632] ? _raw_spin_unlock+0x28/0x40 [ 254.130874][T27632] ? __alloc_fd+0x487/0x620 [ 254.130874][T27632] do_sys_open+0x3fe/0x5d0 [ 254.130874][T27632] ? filp_open+0x80/0x80 [ 254.130874][T27632] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 254.130874][T27632] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.130874][T27632] ? do_syscall_64+0x26/0x790 [ 254.130874][T27632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.130874][T27632] ? do_syscall_64+0x26/0x790 [ 254.130874][T27632] __x64_sys_open+0x7e/0xc0 [ 254.130874][T27632] do_syscall_64+0xfa/0x790 [ 254.130874][T27632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.130874][T27632] RIP: 0033:0x413f21 [ 254.130874][T27632] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 254.130874][T27632] RSP: 002b:00007f3014338a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 254.130874][T27632] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000413f21 [ 254.130874][T27632] RDX: 00007f3014338b1a RSI: 0000000000000002 RDI: 00007f3014338b10 [ 254.130874][T27632] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 254.130874][T27632] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 254.130874][T27632] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:33 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:33 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)=',so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 254.506102][T27625] gfs2: not a GFS2 filesystem [ 254.515794][T27637] gfs2: not a GFS2 filesystem [ 254.571458][T27651] FAULT_INJECTION: forcing a failure. [ 254.571458][T27651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 254.580479][T27651] CPU: 0 PID: 27651 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 254.580479][T27651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 254.580479][T27651] Call Trace: [ 254.580479][T27651] dump_stack+0x197/0x210 [ 254.580479][T27651] should_fail.cold+0xa/0x15 [ 254.580479][T27651] ? fault_create_debugfs_attr+0x180/0x180 [ 254.580479][T27651] ? __kasan_check_read+0x11/0x20 [ 254.580479][T27651] ? __lock_acquire+0x16f2/0x4a00 [ 254.580479][T27651] should_fail_alloc_page+0x50/0x60 [ 254.580479][T27651] __alloc_pages_nodemask+0x1a1/0x910 [ 254.580479][T27651] ? fs_reclaim_release+0xf/0x30 [ 254.580479][T27651] ? __alloc_pages_slowpath+0x2920/0x2920 [ 254.580479][T27651] ? fs_reclaim_release+0xf/0x30 [ 254.580479][T27651] ? do_truncate+0x187/0x220 [ 254.580479][T27651] ? fault_create_debugfs_attr+0x180/0x180 [ 254.580479][T27651] cache_grow_begin+0x90/0xd00 [ 254.580479][T27651] ? getname_flags+0xd6/0x5b0 [ 254.580479][T27651] ? trace_hardirqs_off+0x62/0x240 [ 254.580479][T27651] kmem_cache_alloc+0x64e/0x710 [ 254.580479][T27651] ? do_sys_ftruncate+0x41e/0x550 [ 254.580479][T27651] getname_flags+0xd6/0x5b0 [ 254.580479][T27651] getname+0x1a/0x20 [ 254.580479][T27651] do_sys_open+0x2c9/0x5d0 [ 254.580479][T27651] ? filp_open+0x80/0x80 [ 254.580479][T27651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 254.580479][T27651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.580479][T27651] ? do_syscall_64+0x26/0x790 [ 254.580479][T27651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.580479][T27651] ? do_syscall_64+0x26/0x790 [ 254.580479][T27651] __x64_sys_open+0x7e/0xc0 [ 254.580479][T27651] do_syscall_64+0xfa/0x790 [ 254.580479][T27651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.580479][T27651] RIP: 0033:0x413f21 [ 254.580479][T27651] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 254.580479][T27651] RSP: 002b:00007f3014338a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 254.580479][T27651] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000413f21 [ 254.580479][T27651] RDX: 00007f3014338b1a RSI: 0000000000000002 RDI: 00007f3014338b10 [ 254.580479][T27651] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 254.580479][T27651] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 254.580479][T27651] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:34 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)=',so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 255.034409][T27647] gfs2: Unknown parameter 'obj_type' 10:03:34 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:34 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:34 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='\\so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 255.337473][T27678] gfs2: not a GFS2 filesystem 10:03:34 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 255.394487][T27689] gfs2: Unknown parameter 'obj_type' 10:03:34 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 255.411198][T27700] FAULT_INJECTION: forcing a failure. [ 255.411198][T27700] name failslab, interval 1, probability 0, space 0, times 0 10:03:34 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 255.430431][T27700] CPU: 1 PID: 27700 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 255.434078][T27700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 255.434078][T27700] Call Trace: [ 255.434078][T27700] dump_stack+0x197/0x210 [ 255.434078][T27700] should_fail.cold+0xa/0x15 [ 255.434078][T27700] ? is_bpf_text_address+0xce/0x160 [ 255.434078][T27700] ? fault_create_debugfs_attr+0x180/0x180 [ 255.434078][T27700] ? ___might_sleep+0x163/0x2c0 [ 255.434078][T27700] __should_failslab+0x121/0x190 [ 255.434078][T27700] should_failslab+0x9/0x14 [ 255.434078][T27700] kmem_cache_alloc+0x2aa/0x710 [ 255.434078][T27700] ? stack_trace_save+0xac/0xe0 [ 255.434078][T27700] ? stack_trace_consume_entry+0x190/0x190 [ 255.434078][T27700] __alloc_file+0x27/0x340 [ 255.434078][T27700] alloc_empty_file+0x72/0x170 [ 255.434078][T27700] path_openat+0xef/0x46d0 [ 255.434078][T27700] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 255.434078][T27700] ? kasan_slab_alloc+0xf/0x20 [ 255.434078][T27700] ? kmem_cache_alloc+0x121/0x710 [ 255.434078][T27700] ? getname_flags+0xd6/0x5b0 [ 255.449027][T27700] ? getname+0x1a/0x20 [ 255.449027][T27700] ? do_sys_open+0x2c9/0x5d0 [ 255.449027][T27700] ? __x64_sys_open+0x7e/0xc0 [ 255.449027][T27700] ? __kasan_check_read+0x11/0x20 [ 255.449027][T27700] ? mark_lock+0xc2/0x1220 [ 255.449027][T27700] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 255.449027][T27700] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 255.449027][T27700] ? __alloc_fd+0x487/0x620 [ 255.449027][T27700] do_filp_open+0x1a1/0x280 [ 255.449027][T27700] ? may_open_dev+0x100/0x100 [ 255.449027][T27700] ? lock_downgrade+0x920/0x920 [ 255.449027][T27700] ? rwlock_bug.part.0+0x90/0x90 [ 255.449027][T27700] ? do_raw_spin_unlock+0x178/0x270 [ 255.449027][T27700] ? _raw_spin_unlock+0x28/0x40 [ 255.449027][T27700] ? __alloc_fd+0x487/0x620 [ 255.449027][T27700] do_sys_open+0x3fe/0x5d0 [ 255.449027][T27700] ? filp_open+0x80/0x80 [ 255.449027][T27700] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 255.449027][T27700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.449027][T27700] ? do_syscall_64+0x26/0x790 [ 255.449027][T27700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.449027][T27700] ? do_syscall_64+0x26/0x790 [ 255.449027][T27700] __x64_sys_open+0x7e/0xc0 [ 255.449027][T27700] do_syscall_64+0xfa/0x790 [ 255.449027][T27700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.449027][T27700] RIP: 0033:0x413f21 [ 255.449027][T27700] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 255.449027][T27700] RSP: 002b:00007f3014338a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 255.449027][T27700] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000413f21 [ 255.449027][T27700] RDX: 00007f3014338b1a RSI: 0000000000000002 RDI: 00007f3014338b10 [ 255.449027][T27700] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 255.449027][T27700] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 255.449027][T27700] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:35 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='\\so9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:35 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 255.896489][T27719] FAULT_INJECTION: forcing a failure. [ 255.896489][T27719] name failslab, interval 1, probability 0, space 0, times 0 [ 255.909660][T27719] CPU: 0 PID: 27719 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 255.918239][T27719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 255.919558][T27719] Call Trace: [ 255.919558][T27719] dump_stack+0x197/0x210 [ 255.919558][T27719] should_fail.cold+0xa/0x15 [ 255.919558][T27719] ? fault_create_debugfs_attr+0x180/0x180 [ 255.919558][T27719] ? ___might_sleep+0x163/0x2c0 [ 255.919558][T27719] __should_failslab+0x121/0x190 [ 255.919558][T27719] should_failslab+0x9/0x14 [ 255.919558][T27719] __kmalloc+0x2e0/0x770 [ 255.919558][T27719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.919558][T27719] ? d_absolute_path+0x11b/0x170 [ 255.919558][T27719] ? __d_path+0x140/0x140 [ 255.919558][T27719] ? tomoyo_encode2.part.0+0xf5/0x400 [ 255.919558][T27719] tomoyo_encode2.part.0+0xf5/0x400 [ 255.919558][T27719] tomoyo_encode+0x2b/0x50 [ 255.919558][T27719] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 255.919558][T27719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 255.919558][T27719] tomoyo_check_open_permission+0x2a3/0x3e0 [ 255.919558][T27719] ? tomoyo_path_number_perm+0x520/0x520 [ 255.919558][T27719] ? ___might_sleep+0x163/0x2c0 [ 256.024012][T27719] ? inode_has_perm+0x230/0x230 [ 256.024012][T27719] ? spin_dump+0xac/0xd0 [ 256.024012][T27719] tomoyo_file_open+0xa9/0xd0 [ 256.024012][T27719] security_file_open+0x71/0x300 [ 256.024012][T27719] do_dentry_open+0x37a/0x1380 [ 256.024012][T27719] ? __kasan_check_read+0x11/0x20 [ 256.024012][T27719] ? chown_common+0x5c0/0x5c0 [ 256.024012][T27719] ? inode_permission+0xb4/0x520 [ 256.024012][T27719] vfs_open+0xa0/0xd0 [ 256.024012][T27719] path_openat+0x10e4/0x46d0 [ 256.024012][T27719] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 256.024012][T27719] ? kasan_slab_alloc+0xf/0x20 [ 256.024012][T27719] ? kmem_cache_alloc+0x121/0x710 [ 256.024012][T27719] ? getname_flags+0xd6/0x5b0 [ 256.024012][T27719] ? getname+0x1a/0x20 [ 256.024012][T27719] ? do_sys_open+0x2c9/0x5d0 [ 256.024012][T27719] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 256.024012][T27719] ? __alloc_fd+0x487/0x620 [ 256.024012][T27719] do_filp_open+0x1a1/0x280 [ 256.024012][T27719] ? may_open_dev+0x100/0x100 [ 256.024012][T27719] ? do_raw_spin_unlock+0x178/0x270 [ 256.024012][T27719] ? _raw_spin_unlock+0x28/0x40 [ 256.024012][T27719] ? __alloc_fd+0x487/0x620 [ 256.024012][T27719] do_sys_open+0x3fe/0x5d0 [ 256.024012][T27719] ? filp_open+0x80/0x80 [ 256.024012][T27719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 256.024012][T27719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.024012][T27719] ? do_syscall_64+0x26/0x790 [ 256.024012][T27719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.024012][T27719] ? do_syscall_64+0x26/0x790 [ 256.024012][T27719] __x64_sys_open+0x7e/0xc0 [ 256.024012][T27719] do_syscall_64+0xfa/0x790 [ 256.024012][T27719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.024012][T27719] RIP: 0033:0x413f21 [ 256.024012][T27719] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 256.024012][T27719] RSP: 002b:00007f3014338a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 256.024012][T27719] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000413f21 [ 256.024012][T27719] RDX: 00007f3014338b1a RSI: 0000000000000002 RDI: 00007f3014338b10 [ 256.024012][T27719] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 256.024012][T27719] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 256.024012][T27719] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 256.268350][T27719] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:35 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 256.295570][T27713] gfs2: not a GFS2 filesystem 10:03:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:35 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i\"o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:35 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}]}) 10:03:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 256.454315][T27732] gfs2: Unknown parameter 'obj_type' 10:03:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:35 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 256.669783][T27758] FAULT_INJECTION: forcing a failure. 10:03:36 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 256.669783][T27758] name failslab, interval 1, probability 0, space 0, times 0 [ 256.683363][T27758] CPU: 0 PID: 27758 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 256.691849][T27758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 256.691861][T27758] Call Trace: [ 256.691876][T27758] dump_stack+0x197/0x210 [ 256.691891][T27758] should_fail.cold+0xa/0x15 [ 256.691904][T27758] ? fault_create_debugfs_attr+0x180/0x180 [ 256.691918][T27758] ? ___might_sleep+0x163/0x2c0 [ 256.691932][T27758] __should_failslab+0x121/0x190 [ 256.691946][T27758] should_failslab+0x9/0x14 [ 256.691955][T27758] __kmalloc+0x2e0/0x770 [ 256.691967][T27758] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 256.691978][T27758] tomoyo_realpath_from_path+0xcd/0x7b0 [ 256.691993][T27758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 256.693011][T27758] tomoyo_check_open_permission+0x2a3/0x3e0 [ 256.693011][T27758] ? tomoyo_path_number_perm+0x520/0x520 [ 256.693011][T27758] ? ___might_sleep+0x163/0x2c0 [ 256.693011][T27758] ? inode_has_perm+0x230/0x230 [ 256.693011][T27758] ? spin_dump+0xac/0xd0 [ 256.693011][T27758] tomoyo_file_open+0xa9/0xd0 [ 256.693011][T27758] security_file_open+0x71/0x300 [ 256.693011][T27758] do_dentry_open+0x37a/0x1380 [ 256.693011][T27758] ? __kasan_check_read+0x11/0x20 [ 256.711916][T27758] ? chown_common+0x5c0/0x5c0 [ 256.711916][T27758] ? inode_permission+0xb4/0x520 [ 256.711916][T27758] vfs_open+0xa0/0xd0 [ 256.711916][T27758] path_openat+0x10e4/0x46d0 [ 256.711916][T27758] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 256.711916][T27758] ? kasan_slab_alloc+0xf/0x20 [ 256.711916][T27758] ? kmem_cache_alloc+0x121/0x710 [ 256.711916][T27758] ? getname_flags+0xd6/0x5b0 [ 256.711916][T27758] ? getname+0x1a/0x20 [ 256.711916][T27758] ? do_sys_open+0x2c9/0x5d0 [ 256.711916][T27758] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 256.711916][T27758] ? __alloc_fd+0x487/0x620 [ 256.711916][T27758] do_filp_open+0x1a1/0x280 [ 256.711916][T27758] ? may_open_dev+0x100/0x100 [ 256.711916][T27758] ? do_raw_spin_unlock+0x178/0x270 [ 256.711916][T27758] ? _raw_spin_unlock+0x28/0x40 [ 256.711916][T27758] ? __alloc_fd+0x487/0x620 [ 256.711916][T27758] do_sys_open+0x3fe/0x5d0 [ 256.711916][T27758] ? filp_open+0x80/0x80 [ 256.711916][T27758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 256.711916][T27758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.711916][T27758] ? do_syscall_64+0x26/0x790 [ 256.711916][T27758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.711916][T27758] ? do_syscall_64+0x26/0x790 [ 256.711916][T27758] __x64_sys_open+0x7e/0xc0 [ 256.711916][T27758] do_syscall_64+0xfa/0x790 [ 256.711916][T27758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.711916][T27758] RIP: 0033:0x413f21 [ 256.711916][T27758] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 256.711916][T27758] RSP: 002b:00007f3014338a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 256.711916][T27758] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000413f21 [ 256.711916][T27758] RDX: 00007f3014338b1a RSI: 0000000000000002 RDI: 00007f3014338b10 [ 256.711916][T27758] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 256.711916][T27758] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 256.711916][T27758] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 257.014847][T27758] ERROR: Out of memory at tomoyo_realpath_from_path. [ 257.068312][T27749] gfs2: not a GFS2 filesystem 10:03:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:36 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i\"o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) [ 257.134132][T27771] gfs2: not a GFS2 filesystem 10:03:36 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:36 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 257.285013][T27785] FAULT_INJECTION: forcing a failure. 10:03:36 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i#o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 257.285013][T27785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 257.296106][T27785] CPU: 0 PID: 27785 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 257.296106][T27785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 257.296106][T27785] Call Trace: [ 257.296106][T27785] dump_stack+0x197/0x210 [ 257.296106][T27785] should_fail.cold+0xa/0x15 [ 257.296106][T27785] ? fault_create_debugfs_attr+0x180/0x180 [ 257.296106][T27785] ? __kasan_check_read+0x11/0x20 [ 257.296106][T27785] should_fail_alloc_page+0x50/0x60 [ 257.296106][T27785] __alloc_pages_nodemask+0x1a1/0x910 [ 257.296106][T27785] ? avc_has_extended_perms+0x8e4/0x10f0 [ 257.296106][T27785] ? __alloc_pages_slowpath+0x2920/0x2920 [ 257.296106][T27785] ? __kasan_check_read+0x11/0x20 [ 257.296106][T27785] ? fault_create_debugfs_attr+0x180/0x180 [ 257.296106][T27785] cache_grow_begin+0x90/0xd00 [ 257.296106][T27785] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 257.296106][T27785] ? trace_hardirqs_off+0x62/0x240 [ 257.296106][T27785] __kmalloc+0x6b2/0x770 [ 257.296106][T27785] ? mark_held_locks+0xf0/0xf0 [ 257.296106][T27785] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 257.296106][T27785] tomoyo_realpath_from_path+0xcd/0x7b0 [ 257.296106][T27785] ? tomoyo_path_number_perm+0x193/0x520 [ 257.296106][T27785] tomoyo_path_number_perm+0x1dd/0x520 [ 257.296106][T27785] ? tomoyo_path_number_perm+0x193/0x520 [ 257.296106][T27785] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 257.296106][T27785] ? ___might_sleep+0x163/0x2c0 [ 257.296106][T27785] ? selinux_file_mprotect+0x620/0x620 [ 257.296106][T27785] ? __fget+0x37f/0x550 [ 257.296106][T27785] ? ksys_dup3+0x3e0/0x3e0 [ 257.296106][T27785] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 257.296106][T27785] tomoyo_file_ioctl+0x23/0x30 [ 257.296106][T27785] security_file_ioctl+0x77/0xc0 [ 257.296106][T27785] ksys_ioctl+0x57/0xd0 [ 257.296106][T27785] __x64_sys_ioctl+0x73/0xb0 [ 257.296106][T27785] do_syscall_64+0xfa/0x790 [ 257.296106][T27785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.296106][T27785] RIP: 0033:0x45a5c7 [ 257.296106][T27785] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.296106][T27785] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.296106][T27785] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 257.296106][T27785] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 257.296106][T27785] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 257.296106][T27785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 257.296106][T27785] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:36 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}]}) 10:03:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 257.681883][T27803] gfs2: not a GFS2 filesystem 10:03:37 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i#o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:37 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}]}) 10:03:37 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i%o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 257.775007][T27796] gfs2: not a GFS2 filesystem 10:03:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:37 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i%o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:37 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:37 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 258.040762][T27839] FAULT_INJECTION: forcing a failure. 10:03:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 258.040762][T27839] name failslab, interval 1, probability 0, space 0, times 0 [ 258.053720][T27839] CPU: 3 PID: 27839 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 258.062209][T27839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 258.063623][T27839] Call Trace: [ 258.063623][T27839] dump_stack+0x197/0x210 [ 258.063623][T27839] should_fail.cold+0xa/0x15 [ 258.063623][T27839] ? fault_create_debugfs_attr+0x180/0x180 [ 258.063623][T27839] ? ___might_sleep+0x163/0x2c0 [ 258.063623][T27839] __should_failslab+0x121/0x190 [ 258.063623][T27839] should_failslab+0x9/0x14 [ 258.063623][T27839] __kmalloc+0x2e0/0x770 [ 258.063623][T27839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.063623][T27839] ? d_absolute_path+0x11b/0x170 [ 258.063623][T27839] ? __d_path+0x140/0x140 [ 258.063623][T27839] ? tomoyo_encode2.part.0+0xf5/0x400 [ 258.063623][T27839] tomoyo_encode2.part.0+0xf5/0x400 [ 258.063623][T27839] tomoyo_encode+0x2b/0x50 [ 258.063623][T27839] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 258.063623][T27839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.063623][T27839] tomoyo_check_open_permission+0x2a3/0x3e0 [ 258.063623][T27839] ? tomoyo_path_number_perm+0x520/0x520 [ 258.063623][T27839] ? ___might_sleep+0x163/0x2c0 [ 258.063623][T27839] ? inode_has_perm+0x230/0x230 [ 258.063623][T27839] ? spin_dump+0xac/0xd0 [ 258.063623][T27839] tomoyo_file_open+0xa9/0xd0 [ 258.063623][T27839] security_file_open+0x71/0x300 [ 258.063623][T27839] do_dentry_open+0x37a/0x1380 [ 258.063623][T27839] ? __kasan_check_read+0x11/0x20 [ 258.063623][T27839] ? chown_common+0x5c0/0x5c0 [ 258.063623][T27839] ? inode_permission+0xb4/0x520 [ 258.063623][T27839] vfs_open+0xa0/0xd0 [ 258.063623][T27839] path_openat+0x10e4/0x46d0 [ 258.063623][T27839] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 258.063623][T27839] ? kasan_slab_alloc+0xf/0x20 [ 258.063623][T27839] ? kmem_cache_alloc+0x121/0x710 [ 258.063623][T27839] ? getname_flags+0xd6/0x5b0 [ 258.063623][T27839] ? getname+0x1a/0x20 [ 258.063623][T27839] ? do_sys_open+0x2c9/0x5d0 [ 258.063623][T27839] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 258.063623][T27839] ? __alloc_fd+0x487/0x620 [ 258.063623][T27839] do_filp_open+0x1a1/0x280 [ 258.063623][T27839] ? may_open_dev+0x100/0x100 [ 258.063623][T27839] ? do_raw_spin_unlock+0x178/0x270 [ 258.264233][T27839] ? _raw_spin_unlock+0x28/0x40 [ 258.264233][T27839] ? __alloc_fd+0x487/0x620 [ 258.264233][T27839] do_sys_open+0x3fe/0x5d0 [ 258.264233][T27839] ? filp_open+0x80/0x80 [ 258.264233][T27839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.264233][T27839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.264233][T27839] ? do_syscall_64+0x26/0x790 [ 258.264233][T27839] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.264233][T27839] ? do_syscall_64+0x26/0x790 [ 258.264233][T27839] __x64_sys_open+0x7e/0xc0 [ 258.264233][T27839] do_syscall_64+0xfa/0x790 [ 258.264233][T27839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.264233][T27839] RIP: 0033:0x413f21 [ 258.264233][T27839] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 258.343948][T27839] RSP: 002b:00007f3014338a90 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 258.343948][T27839] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000413f21 [ 258.343948][T27839] RDX: 00007f3014338b1a RSI: 0000000000000002 RDI: 00007f3014338b10 [ 258.343948][T27839] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 258.343948][T27839] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 258.343948][T27839] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 258.402987][T27839] ERROR: Out of memory at tomoyo_realpath_from_path. [ 258.422062][T27820] gfs2: not a GFS2 filesystem 10:03:37 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i*o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:37 executing program 5: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}]}) [ 258.498346][T27849] gfs2: not a GFS2 filesystem 10:03:37 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i*o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:38 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:38 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) [ 258.647554][T27865] gfs2: not a GFS2 filesystem 10:03:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 258.844310][T27877] FAULT_INJECTION: forcing a failure. [ 258.844310][T27877] name failslab, interval 1, probability 0, space 0, times 0 10:03:38 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i+o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) [ 258.857410][T27877] CPU: 1 PID: 27877 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 258.857417][T27877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 258.857421][T27877] Call Trace: [ 258.857438][T27877] dump_stack+0x197/0x210 [ 258.857456][T27877] should_fail.cold+0xa/0x15 [ 258.857473][T27877] ? fault_create_debugfs_attr+0x180/0x180 [ 258.867302][T27877] ? ___might_sleep+0x163/0x2c0 [ 258.867302][T27877] __should_failslab+0x121/0x190 [ 258.867302][T27877] should_failslab+0x9/0x14 [ 258.867302][T27877] __kmalloc+0x2e0/0x770 [ 258.867302][T27877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.867302][T27877] ? d_absolute_path+0x11b/0x170 [ 258.867302][T27877] ? __d_path+0x140/0x140 [ 258.867302][T27877] ? tomoyo_encode2.part.0+0xf5/0x400 [ 258.886769][T27882] gfs2: not a GFS2 filesystem [ 258.878879][T27877] tomoyo_encode2.part.0+0xf5/0x400 [ 258.878879][T27877] tomoyo_encode+0x2b/0x50 [ 258.878879][T27877] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 258.878879][T27877] tomoyo_path_number_perm+0x1dd/0x520 [ 258.878879][T27877] ? tomoyo_path_number_perm+0x193/0x520 [ 258.878879][T27877] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 258.878879][T27877] ? ___might_sleep+0x163/0x2c0 [ 258.888003][T27877] ? selinux_file_mprotect+0x620/0x620 [ 258.888003][T27877] ? __fget+0x37f/0x550 [ 258.888003][T27877] ? ksys_dup3+0x3e0/0x3e0 [ 258.888003][T27877] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 258.888003][T27877] tomoyo_file_ioctl+0x23/0x30 [ 258.888003][T27877] security_file_ioctl+0x77/0xc0 [ 258.888003][T27877] ksys_ioctl+0x57/0xd0 [ 258.888003][T27877] __x64_sys_ioctl+0x73/0xb0 [ 258.888003][T27877] do_syscall_64+0xfa/0x790 [ 258.888003][T27877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.888003][T27877] RIP: 0033:0x45a5c7 [ 258.888003][T27877] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.888003][T27877] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.888003][T27877] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 258.888003][T27877] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 258.888003][T27877] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 258.888003][T27877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 258.888003][T27877] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 259.097163][T27877] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:38 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i+o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 259.403583][T27916] gfs2: not a GFS2 filesystem 10:03:38 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:38 executing program 5: socket$inet6(0xa, 0x80003, 0xff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:38 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@commit={'commit', 0x3d, 0x6}}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) [ 259.509486][T27933] FAULT_INJECTION: forcing a failure. [ 259.509486][T27933] name failslab, interval 1, probability 0, space 0, times 0 [ 259.522491][T27933] CPU: 2 PID: 27933 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 259.530811][T27933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 259.532399][T27933] Call Trace: [ 259.532399][T27933] dump_stack+0x197/0x210 [ 259.532399][T27933] should_fail.cold+0xa/0x15 [ 259.532399][T27933] ? fault_create_debugfs_attr+0x180/0x180 [ 259.532399][T27933] ? ___might_sleep+0x163/0x2c0 [ 259.532399][T27933] __should_failslab+0x121/0x190 [ 259.532399][T27933] should_failslab+0x9/0x14 [ 259.532399][T27933] kmem_cache_alloc+0x2aa/0x710 [ 259.532399][T27933] ? __kasan_check_read+0x11/0x20 [ 259.532399][T27933] ? mark_lock+0xc2/0x1220 [ 259.532399][T27933] ? __kasan_check_read+0x11/0x20 [ 259.532399][T27933] __kernfs_new_node+0xf0/0x6e0 [ 259.532399][T27933] ? __lock_acquire+0x16f2/0x4a00 [ 259.532399][T27933] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 259.532399][T27933] ? __kasan_check_read+0x11/0x20 [ 259.532399][T27933] ? __lock_acquire+0x16f2/0x4a00 [ 259.532399][T27933] ? mark_held_locks+0xf0/0xf0 [ 259.532399][T27933] ? set_user_nice.part.0+0x299/0x680 [ 259.532399][T27933] kernfs_new_node+0x96/0x120 [ 259.532399][T27933] kernfs_create_dir_ns+0x52/0x160 [ 259.532399][T27933] internal_create_group+0x7f4/0xc40 [ 259.532399][T27933] ? lock_downgrade+0x920/0x920 [ 259.532399][T27933] ? remove_files.isra.0+0x190/0x190 [ 259.532399][T27933] ? __kasan_check_write+0x14/0x20 [ 259.532399][T27933] ? up_write+0x150/0x490 [ 259.532399][T27933] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.532399][T27933] sysfs_create_group+0x20/0x30 [ 259.532399][T27933] loop_set_fd+0xd5f/0x13c0 [ 259.532399][T27933] lo_ioctl+0x1a3/0x1460 [ 259.532399][T27933] ? loop_set_fd+0x13c0/0x13c0 [ 259.532399][T27933] blkdev_ioctl+0x12e4/0x1dc0 [ 259.532399][T27933] ? blkpg_ioctl+0xa90/0xa90 [ 259.532399][T27933] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 259.532399][T27933] ? ___might_sleep+0x163/0x2c0 [ 259.532399][T27933] block_ioctl+0xee/0x130 [ 259.532399][T27933] ? blkdev_fallocate+0x410/0x410 [ 259.532399][T27933] do_vfs_ioctl+0xdb6/0x13e0 [ 259.532399][T27933] ? ioctl_preallocate+0x210/0x210 [ 259.532399][T27933] ? selinux_file_mprotect+0x620/0x620 [ 259.532399][T27933] ? __fget+0x37f/0x550 [ 259.532399][T27933] ? ksys_dup3+0x3e0/0x3e0 [ 259.532399][T27933] ? do_sys_open+0x31d/0x5d0 [ 259.532399][T27933] ? tomoyo_file_ioctl+0x23/0x30 [ 259.532399][T27933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.532399][T27933] ? security_file_ioctl+0x8d/0xc0 [ 259.532399][T27933] ksys_ioctl+0xab/0xd0 [ 259.532399][T27933] __x64_sys_ioctl+0x73/0xb0 [ 259.532399][T27933] do_syscall_64+0xfa/0x790 [ 259.532399][T27933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.532399][T27933] RIP: 0033:0x45a5c7 [ 259.532399][T27933] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.532399][T27933] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.532399][T27933] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 259.532399][T27933] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 259.532399][T27933] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 259.532399][T27933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 259.532399][T27933] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 259.976547][T27941] gfs2: not a GFS2 filesystem 10:03:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i,o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb76"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:39 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb76"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 260.144893][T27957] FAULT_INJECTION: forcing a failure. [ 260.144893][T27957] name failslab, interval 1, probability 0, space 0, times 0 [ 260.158240][T27957] CPU: 0 PID: 27957 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 260.158247][T27957] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 260.158251][T27957] Call Trace: [ 260.158297][T27957] dump_stack+0x197/0x210 [ 260.158316][T27957] should_fail.cold+0xa/0x15 [ 260.158329][T27957] ? fault_create_debugfs_attr+0x180/0x180 [ 260.158343][T27957] ? ___might_sleep+0x163/0x2c0 [ 260.158357][T27957] __should_failslab+0x121/0x190 [ 260.158369][T27957] should_failslab+0x9/0x14 [ 260.158379][T27957] __kmalloc+0x2e0/0x770 [ 260.158395][T27957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.168144][T27957] ? d_absolute_path+0x11b/0x170 [ 260.168144][T27957] ? __d_path+0x140/0x140 [ 260.168144][T27957] ? tomoyo_encode2.part.0+0xf5/0x400 [ 260.168144][T27957] tomoyo_encode2.part.0+0xf5/0x400 [ 260.168144][T27957] tomoyo_encode+0x2b/0x50 [ 260.168144][T27957] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 260.168144][T27957] tomoyo_path_number_perm+0x1dd/0x520 [ 260.168144][T27957] ? tomoyo_path_number_perm+0x193/0x520 [ 260.168144][T27957] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 260.168144][T27957] ? ___might_sleep+0x163/0x2c0 [ 260.168144][T27957] ? selinux_file_mprotect+0x620/0x620 [ 260.168144][T27957] ? __fget+0x37f/0x550 [ 260.168144][T27957] ? ksys_dup3+0x3e0/0x3e0 [ 260.168144][T27957] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 260.168144][T27957] tomoyo_file_ioctl+0x23/0x30 [ 260.168144][T27957] security_file_ioctl+0x77/0xc0 [ 260.168144][T27957] ksys_ioctl+0x57/0xd0 [ 260.168144][T27957] __x64_sys_ioctl+0x73/0xb0 [ 260.168144][T27957] do_syscall_64+0xfa/0x790 [ 260.168144][T27957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.168144][T27957] RIP: 0033:0x45a5c7 [ 260.168144][T27957] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.168144][T27957] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.168144][T27957] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 260.168144][T27957] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 260.168144][T27957] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 260.168144][T27957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 260.168144][T27957] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 260.196348][T27957] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb76"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:39 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i,o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:39 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}]}) 10:03:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:39 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i-o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 260.582311][T27991] FAULT_INJECTION: forcing a failure. [ 260.582311][T27991] name failslab, interval 1, probability 0, space 0, times 0 [ 260.583348][T27985] gfs2: not a GFS2 filesystem [ 260.606512][T27991] CPU: 3 PID: 27991 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 260.613878][T27991] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 260.613878][T27991] Call Trace: [ 260.613878][T27991] dump_stack+0x197/0x210 [ 260.613878][T27991] should_fail.cold+0xa/0x15 [ 260.613878][T27991] ? fault_create_debugfs_attr+0x180/0x180 [ 260.613878][T27991] ? ___might_sleep+0x163/0x2c0 [ 260.613878][T27991] __should_failslab+0x121/0x190 [ 260.613878][T27991] should_failslab+0x9/0x14 [ 260.613878][T27991] kmem_cache_alloc_trace+0x2d3/0x790 [ 260.613878][T27991] ? lockdep_init_map+0x1be/0x6d0 [ 260.613878][T27991] ? loop_info64_to_compat+0x6d0/0x6d0 [ 260.613878][T27991] __kthread_create_on_node+0xf2/0x460 [ 260.613878][T27991] ? loop_set_fd+0x661/0x13c0 [ 260.613878][T27991] ? kthread_parkme+0xb0/0xb0 [ 260.613878][T27991] ? loop_set_fd+0x661/0x13c0 [ 260.613878][T27991] ? do_raw_spin_unlock+0x178/0x270 [ 260.613878][T27991] ? loop_info64_to_compat+0x6d0/0x6d0 [ 260.613878][T27991] kthread_create_on_node+0xbb/0xf0 [ 260.613878][T27991] ? __kthread_create_on_node+0x460/0x460 [ 260.613878][T27991] ? lockdep_init_map+0x1be/0x6d0 [ 260.613878][T27991] ? lockdep_init_map+0x1be/0x6d0 [ 260.613878][T27991] loop_set_fd+0x312/0x13c0 [ 260.613878][T27991] lo_ioctl+0x1a3/0x1460 [ 260.613878][T27991] ? loop_set_fd+0x13c0/0x13c0 [ 260.613878][T27991] blkdev_ioctl+0x12e4/0x1dc0 [ 260.613878][T27991] ? blkpg_ioctl+0xa90/0xa90 [ 260.613878][T27991] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 260.613878][T27991] ? ___might_sleep+0x163/0x2c0 [ 260.613878][T27991] block_ioctl+0xee/0x130 [ 260.613878][T27991] ? blkdev_fallocate+0x410/0x410 [ 260.613878][T27991] do_vfs_ioctl+0xdb6/0x13e0 [ 260.613878][T27991] ? ioctl_preallocate+0x210/0x210 [ 260.613878][T27991] ? selinux_file_mprotect+0x620/0x620 [ 260.613878][T27991] ? __fget+0x37f/0x550 [ 260.613878][T27991] ? ksys_dup3+0x3e0/0x3e0 [ 260.613878][T27991] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 260.613878][T27991] ? tomoyo_file_ioctl+0x23/0x30 [ 260.613878][T27991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.613878][T27991] ? security_file_ioctl+0x8d/0xc0 [ 260.613878][T27991] ksys_ioctl+0xab/0xd0 [ 260.613878][T27991] __x64_sys_ioctl+0x73/0xb0 [ 260.613878][T27991] do_syscall_64+0xfa/0x790 [ 260.613878][T27991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.613878][T27991] RIP: 0033:0x45a5c7 [ 260.613878][T27991] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.613878][T27991] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.613878][T27991] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 260.613878][T27991] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 260.613878][T27991] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 260.613878][T27991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 260.613878][T27991] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:40 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:03:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:03:40 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i-o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:40 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 261.092271][T28012] FAULT_INJECTION: forcing a failure. [ 261.092271][T28012] name failslab, interval 1, probability 0, space 0, times 0 10:03:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 261.108650][T28012] CPU: 3 PID: 28012 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 261.115373][T28012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 261.115373][T28012] Call Trace: [ 261.115373][T28012] dump_stack+0x197/0x210 [ 261.115373][T28012] should_fail.cold+0xa/0x15 [ 261.115373][T28012] ? fault_create_debugfs_attr+0x180/0x180 [ 261.143983][T28012] ? ___might_sleep+0x163/0x2c0 [ 261.143983][T28012] __should_failslab+0x121/0x190 [ 261.143983][T28012] should_failslab+0x9/0x14 [ 261.143983][T28012] kmem_cache_alloc+0x2aa/0x710 [ 261.143983][T28012] ? kernfs_activate+0x192/0x1f0 [ 261.143983][T28012] __kernfs_new_node+0xf0/0x6e0 [ 261.143983][T28012] ? kernfs_activate+0x34/0x1f0 [ 261.143983][T28012] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 261.143983][T28012] ? mutex_trylock+0x2f0/0x2f0 [ 261.143983][T28012] ? __kasan_check_write+0x14/0x20 [ 261.143983][T28012] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 261.143983][T28012] ? wait_for_completion+0x440/0x440 [ 261.143983][T28012] kernfs_new_node+0x96/0x120 [ 261.143983][T28012] __kernfs_create_file+0x51/0x340 [ 261.143983][T28012] sysfs_add_file_mode_ns+0x222/0x560 [ 261.143983][T28012] internal_create_group+0x359/0xc40 [ 261.143983][T28012] ? remove_files.isra.0+0x190/0x190 [ 261.143983][T28012] ? __kasan_check_write+0x14/0x20 [ 261.143983][T28012] ? up_write+0x150/0x490 [ 261.143983][T28012] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.143983][T28012] sysfs_create_group+0x20/0x30 [ 261.143983][T28012] loop_set_fd+0xd5f/0x13c0 [ 261.143983][T28012] lo_ioctl+0x1a3/0x1460 [ 261.143983][T28012] ? loop_set_fd+0x13c0/0x13c0 [ 261.143983][T28012] blkdev_ioctl+0x12e4/0x1dc0 [ 261.143983][T28012] ? blkpg_ioctl+0xa90/0xa90 [ 261.143983][T28012] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 261.143983][T28012] ? ___might_sleep+0x163/0x2c0 [ 261.143983][T28012] block_ioctl+0xee/0x130 [ 261.143983][T28012] ? blkdev_fallocate+0x410/0x410 [ 261.143983][T28012] do_vfs_ioctl+0xdb6/0x13e0 [ 261.143983][T28012] ? ioctl_preallocate+0x210/0x210 [ 261.143983][T28012] ? selinux_file_mprotect+0x620/0x620 [ 261.143983][T28012] ? __fget+0x37f/0x550 [ 261.143983][T28012] ? ksys_dup3+0x3e0/0x3e0 [ 261.143983][T28012] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 261.143983][T28012] ? tomoyo_file_ioctl+0x23/0x30 [ 261.143983][T28012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.143983][T28012] ? security_file_ioctl+0x8d/0xc0 [ 261.143983][T28012] ksys_ioctl+0xab/0xd0 [ 261.143983][T28012] __x64_sys_ioctl+0x73/0xb0 [ 261.143983][T28012] do_syscall_64+0xfa/0x790 [ 261.143983][T28012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.143983][T28012] RIP: 0033:0x45a5c7 [ 261.143983][T28012] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.143983][T28012] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.143983][T28012] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 261.143983][T28012] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 261.143983][T28012] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 261.143983][T28012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 261.143983][T28012] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:03:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 261.695476][T28029] gfs2: not a GFS2 filesystem 10:03:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i.o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:41 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:41 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:03:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 261.748272][T28056] FAULT_INJECTION: forcing a failure. [ 261.748272][T28056] name failslab, interval 1, probability 0, space 0, times 0 [ 261.764907][T28056] CPU: 2 PID: 28056 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 261.773712][T28056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 261.773879][T28056] Call Trace: [ 261.773879][T28056] dump_stack+0x197/0x210 [ 261.773879][T28056] should_fail.cold+0xa/0x15 [ 261.773879][T28056] ? fault_create_debugfs_attr+0x180/0x180 [ 261.773879][T28056] ? ___might_sleep+0x163/0x2c0 [ 261.773879][T28056] __should_failslab+0x121/0x190 [ 261.773879][T28056] should_failslab+0x9/0x14 [ 261.773879][T28056] kmem_cache_alloc+0x2aa/0x710 [ 261.773879][T28056] ? lock_downgrade+0x920/0x920 [ 261.773879][T28056] ? kernfs_activate+0x34/0x1f0 [ 261.773879][T28056] __kernfs_new_node+0xf0/0x6e0 [ 261.773879][T28056] ? __kasan_check_write+0x14/0x20 [ 261.773879][T28056] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 261.773879][T28056] ? wait_for_completion+0x440/0x440 [ 261.773879][T28056] ? mutex_unlock+0x1b/0x30 [ 261.773879][T28056] ? kernfs_activate+0x192/0x1f0 [ 261.773879][T28056] kernfs_new_node+0x96/0x120 [ 261.773879][T28056] __kernfs_create_file+0x51/0x340 [ 261.773879][T28056] sysfs_add_file_mode_ns+0x222/0x560 [ 261.773879][T28056] internal_create_group+0x359/0xc40 [ 261.773879][T28056] ? remove_files.isra.0+0x190/0x190 [ 261.773879][T28056] ? __kasan_check_write+0x14/0x20 [ 261.773879][T28056] ? up_write+0x150/0x490 [ 261.773879][T28056] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.773879][T28056] sysfs_create_group+0x20/0x30 [ 261.773879][T28056] loop_set_fd+0xd5f/0x13c0 [ 261.773879][T28056] lo_ioctl+0x1a3/0x1460 [ 261.773879][T28056] ? loop_set_fd+0x13c0/0x13c0 [ 261.773879][T28056] blkdev_ioctl+0x12e4/0x1dc0 [ 261.773879][T28056] ? blkpg_ioctl+0xa90/0xa90 [ 261.773879][T28056] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 261.773879][T28056] ? ___might_sleep+0x163/0x2c0 [ 261.773879][T28056] block_ioctl+0xee/0x130 [ 261.773879][T28056] ? blkdev_fallocate+0x410/0x410 [ 261.773879][T28056] do_vfs_ioctl+0xdb6/0x13e0 [ 261.773879][T28056] ? ioctl_preallocate+0x210/0x210 [ 261.773879][T28056] ? selinux_file_mprotect+0x620/0x620 [ 261.773879][T28056] ? __fget+0x37f/0x550 [ 261.773879][T28056] ? ksys_dup3+0x3e0/0x3e0 [ 261.773879][T28056] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 261.773879][T28056] ? tomoyo_file_ioctl+0x23/0x30 [ 261.773879][T28056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.773879][T28056] ? security_file_ioctl+0x8d/0xc0 [ 261.773879][T28056] ksys_ioctl+0xab/0xd0 [ 261.773879][T28056] __x64_sys_ioctl+0x73/0xb0 [ 261.773879][T28056] do_syscall_64+0xfa/0x790 [ 261.773879][T28056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.773879][T28056] RIP: 0033:0x45a5c7 [ 261.773879][T28056] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.773879][T28056] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 261.773879][T28056] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 261.773879][T28056] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 261.773879][T28056] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 261.773879][T28056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 261.773879][T28056] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:41 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i.o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:41 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 262.247077][T28060] gfs2: not a GFS2 filesystem [ 262.375314][T28084] FAULT_INJECTION: forcing a failure. [ 262.375314][T28084] name failslab, interval 1, probability 0, space 0, times 0 [ 262.392962][T28084] CPU: 2 PID: 28084 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 262.393880][T28084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 262.393880][T28084] Call Trace: [ 262.393880][T28084] dump_stack+0x197/0x210 [ 262.393880][T28084] should_fail.cold+0xa/0x15 [ 262.393880][T28084] ? fault_create_debugfs_attr+0x180/0x180 [ 262.424172][T28084] ? ___might_sleep+0x163/0x2c0 [ 262.424172][T28084] __should_failslab+0x121/0x190 [ 262.434132][T28084] should_failslab+0x9/0x14 [ 262.434132][T28084] kmem_cache_alloc+0x2aa/0x710 [ 262.434132][T28084] ? lock_downgrade+0x920/0x920 [ 262.434132][T28084] ? kernfs_activate+0x34/0x1f0 [ 262.434132][T28084] __kernfs_new_node+0xf0/0x6e0 [ 262.434132][T28084] ? __kasan_check_write+0x14/0x20 [ 262.434132][T28084] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 262.434132][T28084] ? wait_for_completion+0x440/0x440 [ 262.434132][T28084] ? mutex_unlock+0x1b/0x30 [ 262.434132][T28084] ? kernfs_activate+0x192/0x1f0 [ 262.434132][T28084] kernfs_new_node+0x96/0x120 [ 262.434132][T28084] __kernfs_create_file+0x51/0x340 [ 262.434132][T28084] sysfs_add_file_mode_ns+0x222/0x560 [ 262.434132][T28084] internal_create_group+0x359/0xc40 [ 262.504012][T28084] ? remove_files.isra.0+0x190/0x190 [ 262.504012][T28084] ? __kasan_check_write+0x14/0x20 [ 262.504012][T28084] ? up_write+0x150/0x490 [ 262.504012][T28084] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 262.504012][T28084] sysfs_create_group+0x20/0x30 [ 262.504012][T28084] loop_set_fd+0xd5f/0x13c0 [ 262.504012][T28084] lo_ioctl+0x1a3/0x1460 [ 262.504012][T28084] ? loop_set_fd+0x13c0/0x13c0 [ 262.504012][T28084] blkdev_ioctl+0x12e4/0x1dc0 [ 262.504012][T28084] ? blkpg_ioctl+0xa90/0xa90 [ 262.504012][T28084] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 262.504012][T28084] ? ___might_sleep+0x163/0x2c0 [ 262.504012][T28084] block_ioctl+0xee/0x130 [ 262.504012][T28084] ? blkdev_fallocate+0x410/0x410 [ 262.504012][T28084] do_vfs_ioctl+0xdb6/0x13e0 [ 262.584156][T28084] ? ioctl_preallocate+0x210/0x210 [ 262.584156][T28084] ? selinux_file_mprotect+0x620/0x620 [ 262.593984][T28084] ? __fget+0x37f/0x550 [ 262.593984][T28084] ? ksys_dup3+0x3e0/0x3e0 [ 262.593984][T28084] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 262.593984][T28084] ? tomoyo_file_ioctl+0x23/0x30 [ 262.593984][T28084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.593984][T28084] ? security_file_ioctl+0x8d/0xc0 [ 262.593984][T28084] ksys_ioctl+0xab/0xd0 [ 262.593984][T28084] __x64_sys_ioctl+0x73/0xb0 [ 262.593984][T28084] do_syscall_64+0xfa/0x790 [ 262.593984][T28084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.593984][T28084] RIP: 0033:0x45a5c7 [ 262.593984][T28084] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.593984][T28084] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.593984][T28084] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 262.593984][T28084] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 262.593984][T28084] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 262.593984][T28084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 262.593984][T28084] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:42 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i0o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:42 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 10:03:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 263.021538][T28104] gfs2: not a GFS2 filesystem 10:03:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:42 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i0o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:42 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 263.285152][T28134] FAULT_INJECTION: forcing a failure. [ 263.285152][T28134] name failslab, interval 1, probability 0, space 0, times 0 10:03:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x0, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:42 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iXo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:42 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@obj_type={'obj_type', 0x3d, '&'}}, {@appraise='appraise'}]}) [ 263.299094][T28134] CPU: 0 PID: 28134 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 10:03:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 263.307730][T28134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 263.314231][T28134] Call Trace: [ 263.314231][T28134] dump_stack+0x197/0x210 [ 263.314231][T28134] should_fail.cold+0xa/0x15 [ 263.314231][T28134] ? fault_create_debugfs_attr+0x180/0x180 [ 263.314231][T28134] ? ___might_sleep+0x163/0x2c0 [ 263.314231][T28134] __should_failslab+0x121/0x190 [ 263.314231][T28134] should_failslab+0x9/0x14 [ 263.314231][T28134] kmem_cache_alloc+0x2aa/0x710 [ 263.314231][T28134] ? lock_downgrade+0x920/0x920 [ 263.314231][T28134] ? kernfs_activate+0x34/0x1f0 [ 263.314231][T28134] __kernfs_new_node+0xf0/0x6e0 [ 263.314231][T28134] ? __kasan_check_write+0x14/0x20 [ 263.314231][T28134] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 263.314231][T28134] ? wait_for_completion+0x440/0x440 [ 263.314231][T28134] ? mutex_unlock+0x1b/0x30 [ 263.314231][T28134] ? kernfs_activate+0x192/0x1f0 [ 263.314231][T28134] kernfs_new_node+0x96/0x120 [ 263.314231][T28134] __kernfs_create_file+0x51/0x340 [ 263.314231][T28134] sysfs_add_file_mode_ns+0x222/0x560 [ 263.314231][T28134] internal_create_group+0x359/0xc40 [ 263.314231][T28134] ? remove_files.isra.0+0x190/0x190 [ 263.314231][T28134] ? __kasan_check_write+0x14/0x20 [ 263.314231][T28134] ? up_write+0x150/0x490 [ 263.314231][T28134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.314231][T28134] sysfs_create_group+0x20/0x30 [ 263.314231][T28134] loop_set_fd+0xd5f/0x13c0 [ 263.314231][T28134] lo_ioctl+0x1a3/0x1460 [ 263.314231][T28134] ? loop_set_fd+0x13c0/0x13c0 [ 263.314231][T28134] blkdev_ioctl+0x12e4/0x1dc0 [ 263.314231][T28134] ? blkpg_ioctl+0xa90/0xa90 [ 263.314231][T28134] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 263.314231][T28134] ? ___might_sleep+0x163/0x2c0 [ 263.314231][T28134] block_ioctl+0xee/0x130 [ 263.314231][T28134] ? blkdev_fallocate+0x410/0x410 [ 263.314231][T28134] do_vfs_ioctl+0xdb6/0x13e0 [ 263.314231][T28134] ? ioctl_preallocate+0x210/0x210 [ 263.314231][T28134] ? selinux_file_mprotect+0x620/0x620 [ 263.314231][T28134] ? __fget+0x37f/0x550 [ 263.314231][T28134] ? ksys_dup3+0x3e0/0x3e0 [ 263.314231][T28134] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 263.314231][T28134] ? tomoyo_file_ioctl+0x23/0x30 [ 263.314231][T28134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.314231][T28134] ? security_file_ioctl+0x8d/0xc0 [ 263.314231][T28134] ksys_ioctl+0xab/0xd0 [ 263.314231][T28134] __x64_sys_ioctl+0x73/0xb0 [ 263.314231][T28134] do_syscall_64+0xfa/0x790 [ 263.314231][T28134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.314231][T28134] RIP: 0033:0x45a5c7 [ 263.314231][T28134] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.314231][T28134] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.314231][T28134] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 263.314231][T28134] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 263.314231][T28134] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 263.314231][T28134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 263.314231][T28134] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x0, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 263.703205][T28156] gfs2: not a GFS2 filesystem 10:03:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x0, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:43 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iXo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:43 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:43 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@appraise='appraise'}]}) 10:03:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:43 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='i\\o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 263.950177][T28196] FAULT_INJECTION: forcing a failure. [ 263.950177][T28196] name failslab, interval 1, probability 0, space 0, times 0 [ 263.964330][T28196] CPU: 1 PID: 28196 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 263.973457][T28196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 263.973977][T28196] Call Trace: [ 263.973977][T28196] dump_stack+0x197/0x210 [ 263.973977][T28196] should_fail.cold+0xa/0x15 [ 263.973977][T28196] ? fault_create_debugfs_attr+0x180/0x180 [ 263.973977][T28196] ? ___might_sleep+0x163/0x2c0 [ 263.973977][T28196] __should_failslab+0x121/0x190 [ 263.973977][T28196] should_failslab+0x9/0x14 [ 263.973977][T28196] kmem_cache_alloc+0x2aa/0x710 [ 263.973977][T28196] ? lock_downgrade+0x920/0x920 [ 263.973977][T28196] ? kernfs_activate+0x34/0x1f0 [ 263.973977][T28196] __kernfs_new_node+0xf0/0x6e0 [ 263.973977][T28196] ? __kasan_check_write+0x14/0x20 [ 263.973977][T28196] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 263.973977][T28196] ? wait_for_completion+0x440/0x440 [ 263.973977][T28196] ? mutex_unlock+0x1b/0x30 [ 263.973977][T28196] ? kernfs_activate+0x192/0x1f0 [ 263.973977][T28196] kernfs_new_node+0x96/0x120 [ 263.973977][T28196] __kernfs_create_file+0x51/0x340 [ 263.973977][T28196] sysfs_add_file_mode_ns+0x222/0x560 [ 263.973977][T28196] internal_create_group+0x359/0xc40 [ 263.973977][T28196] ? remove_files.isra.0+0x190/0x190 [ 263.973977][T28196] ? __kasan_check_write+0x14/0x20 [ 263.973977][T28196] ? up_write+0x150/0x490 [ 263.973977][T28196] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.973977][T28196] sysfs_create_group+0x20/0x30 [ 263.973977][T28196] loop_set_fd+0xd5f/0x13c0 [ 263.973977][T28196] lo_ioctl+0x1a3/0x1460 [ 263.973977][T28196] ? loop_set_fd+0x13c0/0x13c0 [ 263.973977][T28196] blkdev_ioctl+0x12e4/0x1dc0 [ 263.973977][T28196] ? blkpg_ioctl+0xa90/0xa90 [ 263.973977][T28196] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 263.973977][T28196] ? ___might_sleep+0x163/0x2c0 [ 263.973977][T28196] block_ioctl+0xee/0x130 [ 263.973977][T28196] ? blkdev_fallocate+0x410/0x410 [ 263.973977][T28196] do_vfs_ioctl+0xdb6/0x13e0 [ 263.973977][T28196] ? ioctl_preallocate+0x210/0x210 [ 263.973977][T28196] ? selinux_file_mprotect+0x620/0x620 [ 263.973977][T28196] ? __fget+0x37f/0x550 [ 263.973977][T28196] ? ksys_dup3+0x3e0/0x3e0 [ 263.973977][T28196] ? do_sys_open+0x31d/0x5d0 [ 263.973977][T28196] ? tomoyo_file_ioctl+0x23/0x30 [ 263.973977][T28196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.973977][T28196] ? security_file_ioctl+0x8d/0xc0 [ 263.973977][T28196] ksys_ioctl+0xab/0xd0 [ 263.973977][T28196] __x64_sys_ioctl+0x73/0xb0 [ 263.973977][T28196] do_syscall_64+0xfa/0x790 [ 263.973977][T28196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.973977][T28196] RIP: 0033:0x45a5c7 [ 263.973977][T28196] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.973977][T28196] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.973977][T28196] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 263.973977][T28196] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 263.973977][T28196] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 263.973977][T28196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 263.973977][T28196] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 264.319027][T28188] gfs2: not a GFS2 filesystem 10:03:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:43 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:43 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='i\\o9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x0, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 264.638535][T28220] FAULT_INJECTION: forcing a failure. [ 264.638535][T28220] name failslab, interval 1, probability 0, space 0, times 0 [ 264.652745][T28220] CPU: 3 PID: 28220 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 264.661423][T28220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 264.662024][T28220] Call Trace: [ 264.673944][T28220] dump_stack+0x197/0x210 [ 264.673944][T28220] should_fail.cold+0xa/0x15 [ 264.673944][T28220] ? fault_create_debugfs_attr+0x180/0x180 [ 264.673944][T28220] ? ___might_sleep+0x163/0x2c0 [ 264.673944][T28220] __should_failslab+0x121/0x190 [ 264.673944][T28220] should_failslab+0x9/0x14 [ 264.673944][T28220] kmem_cache_alloc_node+0x268/0x740 [ 264.673944][T28220] ? find_held_lock+0x35/0x130 [ 264.673944][T28220] ? netlink_has_listeners+0x23b/0x3e0 [ 264.673944][T28220] __alloc_skb+0xd5/0x5e0 [ 264.673944][T28220] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 264.673944][T28220] ? __kasan_check_read+0x11/0x20 [ 264.673944][T28220] alloc_uevent_skb+0x83/0x1e2 [ 264.673944][T28220] kobject_uevent_env+0xaa3/0x10a6 [ 264.673944][T28220] kobject_uevent+0x20/0x26 [ 264.673944][T28220] loop_set_fd+0xdec/0x13c0 [ 264.673944][T28220] lo_ioctl+0x1a3/0x1460 [ 264.673944][T28220] ? loop_set_fd+0x13c0/0x13c0 [ 264.673944][T28220] blkdev_ioctl+0x12e4/0x1dc0 [ 264.673944][T28220] ? blkpg_ioctl+0xa90/0xa90 [ 264.673944][T28220] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 264.673944][T28220] ? ___might_sleep+0x163/0x2c0 [ 264.673944][T28220] block_ioctl+0xee/0x130 [ 264.673944][T28220] ? blkdev_fallocate+0x410/0x410 [ 264.673944][T28220] do_vfs_ioctl+0xdb6/0x13e0 [ 264.673944][T28220] ? ioctl_preallocate+0x210/0x210 [ 264.673944][T28220] ? selinux_file_mprotect+0x620/0x620 [ 264.673944][T28220] ? __fget+0x37f/0x550 [ 264.673944][T28220] ? ksys_dup3+0x3e0/0x3e0 [ 264.673944][T28220] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 264.673944][T28220] ? tomoyo_file_ioctl+0x23/0x30 [ 264.673944][T28220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.673944][T28220] ? security_file_ioctl+0x8d/0xc0 [ 264.673944][T28220] ksys_ioctl+0xab/0xd0 [ 264.673944][T28220] __x64_sys_ioctl+0x73/0xb0 [ 264.673944][T28220] do_syscall_64+0xfa/0x790 [ 264.673944][T28220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.673944][T28220] RIP: 0033:0x45a5c7 [ 264.673944][T28220] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.673944][T28220] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.673944][T28220] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 264.673944][T28220] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 264.673944][T28220] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 264.673944][T28220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 264.673944][T28220] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 10:03:44 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@appraise='appraise'}]}) 10:03:44 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='ico9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x0, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:44 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 10:03:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x0, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 265.292249][T28248] gfs2: not a GFS2 filesystem [ 265.303766][T28253] FAULT_INJECTION: forcing a failure. [ 265.303766][T28253] name failslab, interval 1, probability 0, space 0, times 0 10:03:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0x0, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 265.320508][T28253] CPU: 1 PID: 28253 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 265.327525][T28253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 265.327525][T28253] Call Trace: [ 265.327525][T28253] dump_stack+0x197/0x210 [ 265.327525][T28253] should_fail.cold+0xa/0x15 [ 265.327525][T28253] ? fault_create_debugfs_attr+0x180/0x180 [ 265.327525][T28253] ? ___might_sleep+0x163/0x2c0 [ 265.327525][T28253] __should_failslab+0x121/0x190 [ 265.327525][T28253] should_failslab+0x9/0x14 [ 265.327525][T28253] kmem_cache_alloc+0x2aa/0x710 [ 265.327525][T28253] ? lock_downgrade+0x920/0x920 [ 265.327525][T28253] ? kernfs_activate+0x34/0x1f0 [ 265.327525][T28253] __kernfs_new_node+0xf0/0x6e0 [ 265.327525][T28253] ? __kasan_check_write+0x14/0x20 [ 265.327525][T28253] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 265.327525][T28253] ? wait_for_completion+0x440/0x440 [ 265.327525][T28253] ? mutex_unlock+0x1b/0x30 [ 265.327525][T28253] ? kernfs_activate+0x192/0x1f0 [ 265.327525][T28253] kernfs_new_node+0x96/0x120 [ 265.327525][T28253] __kernfs_create_file+0x51/0x340 [ 265.327525][T28253] sysfs_add_file_mode_ns+0x222/0x560 [ 265.327525][T28253] internal_create_group+0x359/0xc40 [ 265.327525][T28253] ? remove_files.isra.0+0x190/0x190 [ 265.327525][T28253] ? __kasan_check_write+0x14/0x20 [ 265.327525][T28253] ? up_write+0x150/0x490 [ 265.327525][T28253] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.327525][T28253] sysfs_create_group+0x20/0x30 [ 265.327525][T28253] loop_set_fd+0xd5f/0x13c0 [ 265.327525][T28253] lo_ioctl+0x1a3/0x1460 [ 265.327525][T28253] ? loop_set_fd+0x13c0/0x13c0 [ 265.327525][T28253] blkdev_ioctl+0x12e4/0x1dc0 [ 265.327525][T28253] ? blkpg_ioctl+0xa90/0xa90 [ 265.327525][T28253] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 265.327525][T28253] ? ___might_sleep+0x163/0x2c0 [ 265.327525][T28253] block_ioctl+0xee/0x130 [ 265.327525][T28253] ? blkdev_fallocate+0x410/0x410 [ 265.327525][T28253] do_vfs_ioctl+0xdb6/0x13e0 [ 265.327525][T28253] ? ioctl_preallocate+0x210/0x210 [ 265.327525][T28253] ? selinux_file_mprotect+0x620/0x620 [ 265.327525][T28253] ? __fget+0x37f/0x550 [ 265.327525][T28253] ? ksys_dup3+0x3e0/0x3e0 [ 265.327525][T28253] ? do_sys_open+0x31d/0x5d0 [ 265.327525][T28253] ? tomoyo_file_ioctl+0x23/0x30 [ 265.327525][T28253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.327525][T28253] ? security_file_ioctl+0x8d/0xc0 [ 265.327525][T28253] ksys_ioctl+0xab/0xd0 [ 265.327525][T28253] __x64_sys_ioctl+0x73/0xb0 [ 265.327525][T28253] do_syscall_64+0xfa/0x790 [ 265.327525][T28253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.327525][T28253] RIP: 0033:0x45a5c7 [ 265.327525][T28253] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.327525][T28253] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.327525][T28253] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 265.327525][T28253] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 265.327525][T28253] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 265.327525][T28253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 265.327525][T28253] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0x0, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:45 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='ico9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000001500000000000000620a00ff00001900959bbb7604a9da0c"], &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 10:03:45 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:45 executing program 3: syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@norgrplvb='norgrplvb'}, {@quota_account='quota=account'}, {@locktable={'locktable', 0x3d, 'iso9660\x00'}}], [{@appraise='appraise'}]}) 10:03:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0x0, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 265.953077][T28284] FAULT_INJECTION: forcing a failure. [ 265.953077][T28284] name failslab, interval 1, probability 0, space 0, times 0 [ 265.966820][T28284] CPU: 0 PID: 28284 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 265.975771][T28284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 265.976585][T28284] Call Trace: [ 265.976585][T28284] dump_stack+0x197/0x210 [ 265.976585][T28284] should_fail.cold+0xa/0x15 [ 265.976585][T28284] ? fault_create_debugfs_attr+0x180/0x180 [ 265.976585][T28284] ? ___might_sleep+0x163/0x2c0 [ 265.976585][T28284] __should_failslab+0x121/0x190 [ 265.976585][T28284] should_failslab+0x9/0x14 [ 265.976585][T28284] kmem_cache_alloc_trace+0x2d3/0x790 [ 265.976585][T28284] kobject_uevent_env+0x387/0x10a6 [ 265.976585][T28284] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.976585][T28284] kobject_uevent+0x20/0x26 [ 265.976585][T28284] loop_set_fd+0xdec/0x13c0 [ 265.976585][T28284] lo_ioctl+0x1a3/0x1460 [ 265.976585][T28284] ? loop_set_fd+0x13c0/0x13c0 [ 265.976585][T28284] blkdev_ioctl+0x12e4/0x1dc0 [ 265.976585][T28284] ? blkpg_ioctl+0xa90/0xa90 [ 265.976585][T28284] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 265.976585][T28284] ? ___might_sleep+0x163/0x2c0 [ 265.976585][T28284] block_ioctl+0xee/0x130 [ 265.976585][T28284] ? blkdev_fallocate+0x410/0x410 [ 265.976585][T28284] do_vfs_ioctl+0xdb6/0x13e0 [ 265.976585][T28284] ? ioctl_preallocate+0x210/0x210 [ 265.976585][T28284] ? selinux_file_mprotect+0x620/0x620 [ 265.976585][T28284] ? __fget+0x37f/0x550 [ 265.976585][T28284] ? ksys_dup3+0x3e0/0x3e0 [ 265.976585][T28284] ? do_sys_open+0x31d/0x5d0 [ 266.113962][T28284] ? tomoyo_file_ioctl+0x23/0x30 [ 266.113962][T28284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.113962][T28284] ? security_file_ioctl+0x8d/0xc0 [ 266.113962][T28284] ksys_ioctl+0xab/0xd0 [ 266.113962][T28284] __x64_sys_ioctl+0x73/0xb0 [ 266.113962][T28284] do_syscall_64+0xfa/0x790 [ 266.113962][T28284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.113962][T28284] RIP: 0033:0x45a5c7 [ 266.113962][T28284] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.113962][T28284] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.113962][T28284] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 266.113962][T28284] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.113962][T28284] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 266.113962][T28284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 266.113962][T28284] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 266.332481][T28287] gfs2: not a GFS2 filesystem 10:03:45 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='ido9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:45 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:45 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:45 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 266.545273][T28311] FAULT_INJECTION: forcing a failure. [ 266.545273][T28311] name failslab, interval 1, probability 0, space 0, times 0 [ 266.560626][T28311] CPU: 1 PID: 28311 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 266.570432][T28311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 266.570432][T28311] Call Trace: [ 266.570432][T28311] dump_stack+0x197/0x210 [ 266.570432][T28311] should_fail.cold+0xa/0x15 [ 266.570432][T28311] ? fault_create_debugfs_attr+0x180/0x180 [ 266.570432][T28311] ? ___might_sleep+0x163/0x2c0 [ 266.570432][T28311] __should_failslab+0x121/0x190 [ 266.570432][T28311] should_failslab+0x9/0x14 [ 266.570432][T28311] kmem_cache_alloc_node+0x268/0x740 [ 266.570432][T28311] ? find_held_lock+0x35/0x130 [ 266.570432][T28311] ? netlink_has_listeners+0x23b/0x3e0 [ 266.570432][T28311] __alloc_skb+0xd5/0x5e0 [ 266.570432][T28311] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 266.570432][T28311] ? __kasan_check_read+0x11/0x20 [ 266.570432][T28311] alloc_uevent_skb+0x83/0x1e2 [ 266.570432][T28311] kobject_uevent_env+0xaa3/0x10a6 [ 266.570432][T28311] kobject_uevent+0x20/0x26 [ 266.570432][T28311] loop_set_fd+0xdec/0x13c0 [ 266.570432][T28311] lo_ioctl+0x1a3/0x1460 [ 266.570432][T28311] ? loop_set_fd+0x13c0/0x13c0 [ 266.570432][T28311] blkdev_ioctl+0x12e4/0x1dc0 [ 266.570432][T28311] ? blkpg_ioctl+0xa90/0xa90 [ 266.570432][T28311] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 266.570432][T28311] ? ___might_sleep+0x163/0x2c0 [ 266.570432][T28311] block_ioctl+0xee/0x130 [ 266.570432][T28311] ? blkdev_fallocate+0x410/0x410 [ 266.570432][T28311] do_vfs_ioctl+0xdb6/0x13e0 [ 266.570432][T28311] ? ioctl_preallocate+0x210/0x210 [ 266.570432][T28311] ? selinux_file_mprotect+0x620/0x620 [ 266.570432][T28311] ? __fget+0x37f/0x550 [ 266.570432][T28311] ? ksys_dup3+0x3e0/0x3e0 [ 266.570432][T28311] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 266.570432][T28311] ? tomoyo_file_ioctl+0x23/0x30 [ 266.570432][T28311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.570432][T28311] ? security_file_ioctl+0x8d/0xc0 [ 266.570432][T28311] ksys_ioctl+0xab/0xd0 [ 266.570432][T28311] __x64_sys_ioctl+0x73/0xb0 [ 266.570432][T28311] do_syscall_64+0xfa/0x790 [ 266.570432][T28311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.570432][T28311] RIP: 0033:0x45a5c7 [ 266.570432][T28311] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.570432][T28311] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 266.570432][T28311] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 266.570432][T28311] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 266.570432][T28311] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 266.570432][T28311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 266.570432][T28311] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:46 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='ido9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:46 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:46 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:46 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:46 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iio9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:46 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") [ 267.220533][T28341] FAULT_INJECTION: forcing a failure. [ 267.220533][T28341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 267.225190][T28341] CPU: 0 PID: 28341 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 267.225190][T28341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 267.225190][T28341] Call Trace: [ 267.225190][T28341] dump_stack+0x197/0x210 [ 267.225190][T28341] should_fail.cold+0xa/0x15 [ 267.225190][T28341] ? fault_create_debugfs_attr+0x180/0x180 [ 267.225190][T28341] ? __kasan_check_read+0x11/0x20 [ 267.225190][T28341] ? __lock_acquire+0x16f2/0x4a00 [ 267.225190][T28341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.225190][T28341] should_fail_alloc_page+0x50/0x60 [ 267.225190][T28341] __alloc_pages_nodemask+0x1a1/0x910 [ 267.225190][T28341] ? fs_reclaim_release+0xf/0x30 [ 267.225190][T28341] ? __alloc_pages_slowpath+0x2920/0x2920 [ 267.225190][T28341] ? fs_reclaim_release+0xf/0x30 [ 267.225190][T28341] ? fault_create_debugfs_attr+0x180/0x180 [ 267.225190][T28341] cache_grow_begin+0x90/0xd00 [ 267.225190][T28341] ? kobject_uevent_env+0x387/0x10a6 [ 267.225190][T28341] ? trace_hardirqs_off+0x62/0x240 [ 267.225190][T28341] kmem_cache_alloc_trace+0x6b3/0x790 [ 267.225190][T28341] kobject_uevent_env+0x387/0x10a6 [ 267.225190][T28341] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.225190][T28341] kobject_uevent+0x20/0x26 [ 267.225190][T28341] loop_set_fd+0xdec/0x13c0 [ 267.225190][T28341] lo_ioctl+0x1a3/0x1460 [ 267.225190][T28341] ? loop_set_fd+0x13c0/0x13c0 [ 267.225190][T28341] blkdev_ioctl+0x12e4/0x1dc0 [ 267.225190][T28341] ? blkpg_ioctl+0xa90/0xa90 [ 267.225190][T28341] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 267.225190][T28341] ? ___might_sleep+0x163/0x2c0 [ 267.225190][T28341] block_ioctl+0xee/0x130 [ 267.225190][T28341] ? blkdev_fallocate+0x410/0x410 [ 267.225190][T28341] do_vfs_ioctl+0xdb6/0x13e0 [ 267.225190][T28341] ? ioctl_preallocate+0x210/0x210 [ 267.225190][T28341] ? selinux_file_mprotect+0x620/0x620 [ 267.225190][T28341] ? __fget+0x37f/0x550 [ 267.225190][T28341] ? ksys_dup3+0x3e0/0x3e0 [ 267.225190][T28341] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 267.225190][T28341] ? tomoyo_file_ioctl+0x23/0x30 [ 267.225190][T28341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.225190][T28341] ? security_file_ioctl+0x8d/0xc0 [ 267.225190][T28341] ksys_ioctl+0xab/0xd0 [ 267.225190][T28341] __x64_sys_ioctl+0x73/0xb0 [ 267.225190][T28341] do_syscall_64+0xfa/0x790 [ 267.225190][T28341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.225190][T28341] RIP: 0033:0x45a5c7 [ 267.225190][T28341] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.225190][T28341] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.225190][T28341] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 267.225190][T28341] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.225190][T28341] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 267.225190][T28341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 267.225190][T28341] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:47 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='ilo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:47 executing program 3: socket$inet6(0xa, 0x80003, 0xff) 10:03:47 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iio9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:47 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:47 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:47 executing program 3: socket$inet6(0xa, 0x0, 0xff) 10:03:47 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") [ 267.945712][T28392] FAULT_INJECTION: forcing a failure. [ 267.945712][T28392] name failslab, interval 1, probability 0, space 0, times 0 10:03:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) [ 267.963268][T28392] CPU: 1 PID: 28392 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 267.969344][T28392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 267.980058][T28392] Call Trace: [ 267.980058][T28392] dump_stack+0x197/0x210 [ 267.980058][T28392] should_fail.cold+0xa/0x15 [ 267.980058][T28392] ? fault_create_debugfs_attr+0x180/0x180 [ 267.980058][T28392] ? ___might_sleep+0x163/0x2c0 [ 267.980058][T28392] __should_failslab+0x121/0x190 [ 267.980058][T28392] should_failslab+0x9/0x14 [ 267.980058][T28392] kmem_cache_alloc_node+0x268/0x740 [ 267.980058][T28392] ? find_held_lock+0x35/0x130 [ 267.980058][T28392] ? netlink_has_listeners+0x23b/0x3e0 [ 267.980058][T28392] __alloc_skb+0xd5/0x5e0 [ 267.980058][T28392] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 267.980058][T28392] ? __kasan_check_read+0x11/0x20 [ 267.980058][T28392] alloc_uevent_skb+0x83/0x1e2 [ 267.980058][T28392] kobject_uevent_env+0xaa3/0x10a6 [ 267.980058][T28392] kobject_uevent+0x20/0x26 [ 267.980058][T28392] loop_set_fd+0xdec/0x13c0 [ 267.980058][T28392] lo_ioctl+0x1a3/0x1460 [ 267.980058][T28392] ? loop_set_fd+0x13c0/0x13c0 [ 267.980058][T28392] blkdev_ioctl+0x12e4/0x1dc0 [ 267.980058][T28392] ? blkpg_ioctl+0xa90/0xa90 [ 267.980058][T28392] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 267.980058][T28392] ? ___might_sleep+0x163/0x2c0 [ 267.980058][T28392] block_ioctl+0xee/0x130 [ 267.980058][T28392] ? blkdev_fallocate+0x410/0x410 [ 267.980058][T28392] do_vfs_ioctl+0xdb6/0x13e0 [ 267.980058][T28392] ? ioctl_preallocate+0x210/0x210 [ 267.980058][T28392] ? selinux_file_mprotect+0x620/0x620 [ 267.980058][T28392] ? __fget+0x37f/0x550 [ 267.980058][T28392] ? ksys_dup3+0x3e0/0x3e0 [ 267.980058][T28392] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 267.980058][T28392] ? tomoyo_file_ioctl+0x23/0x30 [ 267.980058][T28392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.980058][T28392] ? security_file_ioctl+0x8d/0xc0 [ 267.980058][T28392] ksys_ioctl+0xab/0xd0 [ 267.980058][T28392] __x64_sys_ioctl+0x73/0xb0 [ 267.980058][T28392] do_syscall_64+0xfa/0x790 [ 267.980058][T28392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.980058][T28392] RIP: 0033:0x45a5c7 [ 267.980058][T28392] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.980058][T28392] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 267.980058][T28392] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 267.980058][T28392] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 267.980058][T28392] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 267.980058][T28392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 267.980058][T28392] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:47 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:47 executing program 4: r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:47 executing program 3: socket$inet6(0xa, 0x0, 0xff) [ 268.422395][T28415] FAULT_INJECTION: forcing a failure. [ 268.422395][T28415] name failslab, interval 1, probability 0, space 0, times 0 [ 268.438918][T28415] CPU: 0 PID: 28415 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 268.445414][T28415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 268.450836][T28415] Call Trace: [ 268.450836][T28415] dump_stack+0x197/0x210 [ 268.450836][T28415] should_fail.cold+0xa/0x15 [ 268.450836][T28415] ? fault_create_debugfs_attr+0x180/0x180 [ 268.450836][T28415] ? ___might_sleep+0x163/0x2c0 [ 268.450836][T28415] __should_failslab+0x121/0x190 [ 268.450836][T28415] should_failslab+0x9/0x14 [ 268.450836][T28415] __kmalloc+0x2e0/0x770 [ 268.450836][T28415] ? kobject_get_path+0xc4/0x1b0 [ 268.450836][T28415] kobject_get_path+0xc4/0x1b0 [ 268.450836][T28415] kobject_uevent_env+0x3ab/0x10a6 [ 268.504094][T28415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.504094][T28415] kobject_uevent+0x20/0x26 [ 268.504094][T28415] loop_set_fd+0xdec/0x13c0 [ 268.504094][T28415] lo_ioctl+0x1a3/0x1460 [ 268.504094][T28415] ? loop_set_fd+0x13c0/0x13c0 [ 268.504094][T28415] blkdev_ioctl+0x12e4/0x1dc0 [ 268.504094][T28415] ? blkpg_ioctl+0xa90/0xa90 [ 268.504094][T28415] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 268.504094][T28415] ? ___might_sleep+0x163/0x2c0 [ 268.504094][T28415] block_ioctl+0xee/0x130 [ 268.504094][T28415] ? blkdev_fallocate+0x410/0x410 [ 268.504094][T28415] do_vfs_ioctl+0xdb6/0x13e0 [ 268.504094][T28415] ? ioctl_preallocate+0x210/0x210 [ 268.504094][T28415] ? selinux_file_mprotect+0x620/0x620 [ 268.504094][T28415] ? __fget+0x37f/0x550 [ 268.504094][T28415] ? ksys_dup3+0x3e0/0x3e0 [ 268.584072][T28415] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 268.584072][T28415] ? tomoyo_file_ioctl+0x23/0x30 [ 268.593959][T28415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.593959][T28415] ? security_file_ioctl+0x8d/0xc0 [ 268.593959][T28415] ksys_ioctl+0xab/0xd0 [ 268.593959][T28415] __x64_sys_ioctl+0x73/0xb0 [ 268.593959][T28415] do_syscall_64+0xfa/0x790 [ 268.593959][T28415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.593959][T28415] RIP: 0033:0x45a5c7 [ 268.593959][T28415] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.593959][T28415] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.593959][T28415] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 000000000045a5c7 [ 268.593959][T28415] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 268.593959][T28415] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 268.593959][T28415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 268.593959][T28415] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='ioo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:48 executing program 4: r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:48 executing program 3: socket$inet6(0xa, 0x0, 0xff) 10:03:48 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='ilo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:48 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x0, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 10:03:48 executing program 4: r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:48 executing program 3: socket$inet6(0xa, 0x80003, 0x0) 10:03:48 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") [ 268.948224][T28450] FAULT_INJECTION: forcing a failure. [ 268.948224][T28450] name failslab, interval 1, probability 0, space 0, times 0 [ 268.962905][T28450] CPU: 3 PID: 28450 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 268.972256][T28450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 268.972377][T28450] Call Trace: [ 268.972377][T28450] dump_stack+0x197/0x210 10:03:48 executing program 3: socket$inet6(0xa, 0x80003, 0x0) [ 268.972377][T28450] should_fail.cold+0xa/0x15 [ 268.972377][T28450] ? fault_create_debugfs_attr+0x180/0x180 [ 268.972377][T28450] ? ___might_sleep+0x163/0x2c0 [ 268.972377][T28450] __should_failslab+0x121/0x190 [ 268.972377][T28450] should_failslab+0x9/0x14 [ 268.972377][T28450] __kmalloc+0x2e0/0x770 [ 268.972377][T28450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.972377][T28450] ? d_absolute_path+0x11b/0x170 [ 268.972377][T28450] ? __d_path+0x140/0x140 [ 268.972377][T28450] ? tomoyo_encode2.part.0+0xf5/0x400 [ 268.972377][T28450] tomoyo_encode2.part.0+0xf5/0x400 [ 268.972377][T28450] tomoyo_encode+0x2b/0x50 [ 268.972377][T28450] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 268.972377][T28450] tomoyo_path_number_perm+0x1dd/0x520 [ 268.972377][T28450] ? tomoyo_path_number_perm+0x193/0x520 [ 268.972377][T28450] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 268.972377][T28450] ? find_held_lock+0x35/0x130 [ 268.972377][T28450] ? putname+0xef/0x130 [ 268.972377][T28450] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 268.972377][T28450] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 268.972377][T28450] ? trace_hardirqs_on+0x67/0x240 [ 268.972377][T28450] ? kmem_cache_free+0x26b/0x320 [ 268.972377][T28450] tomoyo_path_mkdir+0xaa/0xf0 [ 268.972377][T28450] ? tomoyo_file_ioctl+0x30/0x30 [ 268.972377][T28450] ? kern_path_mountpoint+0x40/0x40 [ 268.972377][T28450] ? strncpy_from_user+0x2b4/0x400 [ 268.972377][T28450] security_path_mkdir+0x113/0x170 [ 268.972377][T28450] do_mkdirat+0x160/0x2a0 [ 268.972377][T28450] ? __ia32_sys_mknod+0xb0/0xb0 [ 268.972377][T28450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 268.972377][T28450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.972377][T28450] ? do_syscall_64+0x26/0x790 [ 268.972377][T28450] ? lockdep_hardirqs_on+0x421/0x5e0 [ 268.972377][T28450] __x64_sys_mkdir+0x5c/0x80 [ 268.972377][T28450] do_syscall_64+0xfa/0x790 [ 268.972377][T28450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.972377][T28450] RIP: 0033:0x459bd7 [ 268.972377][T28450] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.972377][T28450] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 268.972377][T28450] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 268.972377][T28450] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 268.972377][T28450] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 268.972377][T28450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 268.972377][T28450] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 269.264422][T28450] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='ipo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:48 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:48 executing program 3: socket$inet6(0xa, 0x80003, 0x0) 10:03:48 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='ioo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:48 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:48 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:48 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) [ 269.536524][T28514] FAULT_INJECTION: forcing a failure. [ 269.536524][T28514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 269.548070][T28514] CPU: 0 PID: 28514 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 269.548070][T28514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 269.548070][T28514] Call Trace: [ 269.548070][T28514] dump_stack+0x197/0x210 [ 269.548070][T28514] should_fail.cold+0xa/0x15 [ 269.548070][T28514] ? is_bpf_text_address+0xac/0x160 [ 269.548070][T28514] ? fault_create_debugfs_attr+0x180/0x180 [ 269.548070][T28514] ? is_bpf_text_address+0xac/0x160 [ 269.548070][T28514] should_fail_alloc_page+0x50/0x60 [ 269.548070][T28514] __alloc_pages_nodemask+0x1a1/0x910 [ 269.548070][T28514] ? __alloc_pages_slowpath+0x2920/0x2920 [ 269.548070][T28514] ? __kasan_check_read+0x11/0x20 [ 269.548070][T28514] ? fault_create_debugfs_attr+0x180/0x180 [ 269.574037][T28514] cache_grow_begin+0x90/0xd00 [ 269.574037][T28514] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 269.574037][T28514] ? trace_hardirqs_off+0x62/0x240 [ 269.574037][T28514] __kmalloc+0x6b2/0x770 [ 269.574037][T28514] ? mark_held_locks+0xf0/0xf0 [ 269.574037][T28514] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 269.574037][T28514] tomoyo_realpath_from_path+0xcd/0x7b0 [ 269.574037][T28514] ? tomoyo_path_number_perm+0x193/0x520 [ 269.574037][T28514] tomoyo_path_number_perm+0x1dd/0x520 [ 269.574037][T28514] ? tomoyo_path_number_perm+0x193/0x520 [ 269.574037][T28514] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 269.574037][T28514] ? find_held_lock+0x35/0x130 [ 269.574037][T28514] ? putname+0xef/0x130 [ 269.574037][T28514] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 269.574037][T28514] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 269.574037][T28514] ? trace_hardirqs_on+0x67/0x240 [ 269.574037][T28514] ? kmem_cache_free+0x26b/0x320 [ 269.574037][T28514] tomoyo_path_mkdir+0xaa/0xf0 [ 269.574037][T28514] ? tomoyo_file_ioctl+0x30/0x30 [ 269.574037][T28514] ? kern_path_mountpoint+0x40/0x40 [ 269.574037][T28514] ? strncpy_from_user+0x2b4/0x400 [ 269.574037][T28514] security_path_mkdir+0x113/0x170 [ 269.574037][T28514] do_mkdirat+0x160/0x2a0 [ 269.574037][T28514] ? __ia32_sys_mknod+0xb0/0xb0 [ 269.574037][T28514] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 269.574037][T28514] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.574037][T28514] ? do_syscall_64+0x26/0x790 [ 269.574037][T28514] ? lockdep_hardirqs_on+0x421/0x5e0 [ 269.574037][T28514] __x64_sys_mkdir+0x5c/0x80 [ 269.574037][T28514] do_syscall_64+0xfa/0x790 [ 269.574037][T28514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.574037][T28514] RIP: 0033:0x459bd7 [ 269.574037][T28514] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.794039][T28514] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 269.794039][T28514] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 269.794039][T28514] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 269.794039][T28514] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 269.794039][T28514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 269.794039][T28514] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:49 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 10:03:49 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iuo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:49 executing program 4: socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:49 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:49 executing program 4: socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") [ 270.014191][T28549] FAULT_INJECTION: forcing a failure. [ 270.014191][T28549] name failslab, interval 1, probability 0, space 0, times 0 [ 270.027952][T28549] CPU: 0 PID: 28549 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 270.036689][T28549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 270.037464][T28549] Call Trace: [ 270.037464][T28549] dump_stack+0x197/0x210 [ 270.037464][T28549] should_fail.cold+0xa/0x15 [ 270.037464][T28549] ? fault_create_debugfs_attr+0x180/0x180 [ 270.037464][T28549] ? ___might_sleep+0x163/0x2c0 [ 270.037464][T28549] __should_failslab+0x121/0x190 [ 270.037464][T28549] should_failslab+0x9/0x14 [ 270.037464][T28549] __kmalloc+0x2e0/0x770 [ 270.037464][T28549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.037464][T28549] ? d_absolute_path+0x11b/0x170 [ 270.037464][T28549] ? __d_path+0x140/0x140 [ 270.037464][T28549] ? tomoyo_encode2.part.0+0xf5/0x400 [ 270.037464][T28549] tomoyo_encode2.part.0+0xf5/0x400 [ 270.037464][T28549] tomoyo_encode+0x2b/0x50 [ 270.113951][T28549] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 270.113951][T28549] tomoyo_path_number_perm+0x1dd/0x520 [ 270.113951][T28549] ? tomoyo_path_number_perm+0x193/0x520 [ 270.113951][T28549] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 270.113951][T28549] ? find_held_lock+0x35/0x130 [ 270.113951][T28549] ? putname+0xef/0x130 [ 270.113951][T28549] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 270.113951][T28549] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 270.113951][T28549] ? trace_hardirqs_on+0x67/0x240 [ 270.113951][T28549] ? kmem_cache_free+0x26b/0x320 [ 270.113951][T28549] tomoyo_path_mkdir+0xaa/0xf0 [ 270.113951][T28549] ? tomoyo_file_ioctl+0x30/0x30 [ 270.113951][T28549] ? kern_path_mountpoint+0x40/0x40 [ 270.113951][T28549] ? strncpy_from_user+0x2b4/0x400 [ 270.113951][T28549] security_path_mkdir+0x113/0x170 [ 270.113951][T28549] do_mkdirat+0x160/0x2a0 [ 270.113951][T28549] ? __ia32_sys_mknod+0xb0/0xb0 [ 270.113951][T28549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.113951][T28549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.113951][T28549] ? do_syscall_64+0x26/0x790 [ 270.113951][T28549] ? lockdep_hardirqs_on+0x421/0x5e0 [ 270.113951][T28549] __x64_sys_mkdir+0x5c/0x80 [ 270.113951][T28549] do_syscall_64+0xfa/0x790 [ 270.113951][T28549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.113951][T28549] RIP: 0033:0x459bd7 [ 270.113951][T28549] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.113951][T28549] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 270.113951][T28549] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 270.113951][T28549] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 270.113951][T28549] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 270.113951][T28549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 270.113951][T28549] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 270.316568][T28549] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:49 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 10:03:49 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='ipo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:49 executing program 4: socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) 10:03:49 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 10:03:49 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 10:03:50 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='ixo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:50 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) 10:03:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:50 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 270.685576][T28595] FAULT_INJECTION: forcing a failure. [ 270.685576][T28595] name failslab, interval 1, probability 0, space 0, times 0 [ 270.698753][T28595] CPU: 1 PID: 28595 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 270.707158][T28595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 270.707163][T28595] Call Trace: [ 270.707187][T28595] dump_stack+0x197/0x210 [ 270.707206][T28595] should_fail.cold+0xa/0x15 [ 270.707220][T28595] ? fault_create_debugfs_attr+0x180/0x180 [ 270.707231][T28595] ? ___might_sleep+0x163/0x2c0 [ 270.707243][T28595] __should_failslab+0x121/0x190 [ 270.707253][T28595] should_failslab+0x9/0x14 [ 270.707262][T28595] __kmalloc+0x2e0/0x770 [ 270.707271][T28595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.707279][T28595] ? d_absolute_path+0x11b/0x170 [ 270.707287][T28595] ? __d_path+0x140/0x140 [ 270.707296][T28595] ? tomoyo_encode2.part.0+0xf5/0x400 [ 270.707307][T28595] tomoyo_encode2.part.0+0xf5/0x400 [ 270.707321][T28595] tomoyo_encode+0x2b/0x50 [ 270.707330][T28595] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 270.707344][T28595] tomoyo_path_number_perm+0x1dd/0x520 [ 270.707352][T28595] ? tomoyo_path_number_perm+0x193/0x520 [ 270.707362][T28595] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 270.707372][T28595] ? find_held_lock+0x35/0x130 [ 270.707396][T28595] ? putname+0xef/0x130 [ 270.708665][T28595] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 270.708665][T28595] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 270.708665][T28595] ? trace_hardirqs_on+0x67/0x240 [ 270.708665][T28595] ? kmem_cache_free+0x26b/0x320 [ 270.708665][T28595] tomoyo_path_mkdir+0xaa/0xf0 [ 270.708665][T28595] ? tomoyo_file_ioctl+0x30/0x30 [ 270.708665][T28595] ? kern_path_mountpoint+0x40/0x40 [ 270.708665][T28595] ? strncpy_from_user+0x2b4/0x400 [ 270.708665][T28595] security_path_mkdir+0x113/0x170 [ 270.708665][T28595] do_mkdirat+0x160/0x2a0 [ 270.708665][T28595] ? __ia32_sys_mknod+0xb0/0xb0 [ 270.708665][T28595] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 270.708665][T28595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.708665][T28595] ? do_syscall_64+0x26/0x790 [ 270.708665][T28595] ? lockdep_hardirqs_on+0x421/0x5e0 [ 270.708665][T28595] __x64_sys_mkdir+0x5c/0x80 [ 270.708665][T28595] do_syscall_64+0xfa/0x790 [ 270.708665][T28595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.708665][T28595] RIP: 0033:0x459bd7 [ 270.708665][T28595] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.766446][T28595] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 270.766446][T28595] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 270.766446][T28595] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 270.766446][T28595] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 270.766446][T28595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 270.766446][T28595] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 270.990026][T28595] ERROR: Out of memory at tomoyo_realpath_from_path. 10:03:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 10:03:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}, [@ldst={0x2, 0x3, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 10:03:50 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iuo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:50 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:03:50 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) 10:03:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) 10:03:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) 10:03:50 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) 10:03:50 executing program 5: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 10:03:50 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='is\"9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:50 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:50 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() 10:03:50 executing program 3: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 271.402280][T28649] FAULT_INJECTION: forcing a failure. [ 271.402280][T28649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 271.414548][T28649] CPU: 0 PID: 28649 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 271.414548][T28649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 271.414548][T28649] Call Trace: [ 271.414548][T28649] dump_stack+0x197/0x210 [ 271.414548][T28649] should_fail.cold+0xa/0x15 [ 271.414548][T28649] ? fault_create_debugfs_attr+0x180/0x180 [ 271.414548][T28649] ? __kasan_check_read+0x11/0x20 [ 271.414548][T28649] ? __lock_acquire+0x16f2/0x4a00 [ 271.414548][T28649] should_fail_alloc_page+0x50/0x60 [ 271.414548][T28649] __alloc_pages_nodemask+0x1a1/0x910 [ 271.414548][T28649] ? fs_reclaim_release+0xf/0x30 [ 271.414548][T28649] ? __alloc_pages_slowpath+0x2920/0x2920 [ 271.414548][T28649] ? fs_reclaim_release+0xf/0x30 [ 271.414548][T28649] ? fault_create_debugfs_attr+0x180/0x180 [ 271.414548][T28649] cache_grow_begin+0x90/0xd00 [ 271.414548][T28649] ? getname_flags+0xd6/0x5b0 [ 271.414548][T28649] ? trace_hardirqs_off+0x62/0x240 [ 271.414548][T28649] kmem_cache_alloc+0x64e/0x710 [ 271.414548][T28649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.414548][T28649] getname_flags+0xd6/0x5b0 [ 271.414548][T28649] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 271.414548][T28649] do_mkdirat+0xa0/0x2a0 [ 271.414548][T28649] ? __ia32_sys_mknod+0xb0/0xb0 [ 271.414548][T28649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 271.414548][T28649] ? do_syscall_64+0x26/0x790 [ 271.463955][T28649] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.463955][T28649] ? do_syscall_64+0x26/0x790 [ 271.463955][T28649] ? lockdep_hardirqs_on+0x421/0x5e0 [ 271.463955][T28649] __x64_sys_mkdir+0x5c/0x80 [ 271.463955][T28649] do_syscall_64+0xfa/0x790 [ 271.463955][T28649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.463955][T28649] RIP: 0033:0x459bd7 [ 271.463955][T28649] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.463955][T28649] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 271.463955][T28649] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 271.463955][T28649] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 271.463955][T28649] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 271.463955][T28649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 271.463955][T28649] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:51 executing program 5: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 10:03:51 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 10:03:51 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='ixo9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:51 executing program 3: clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:03:51 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:51 executing program 5: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 10:03:51 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 10:03:51 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 272.019897][T28701] FAULT_INJECTION: forcing a failure. [ 272.019897][T28701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.026323][T28701] CPU: 3 PID: 28701 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 272.026323][T28701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 272.026323][T28701] Call Trace: [ 272.026323][T28701] dump_stack+0x197/0x210 [ 272.026323][T28701] should_fail.cold+0xa/0x15 [ 272.026323][T28701] ? is_bpf_text_address+0xac/0x160 [ 272.026323][T28701] ? fault_create_debugfs_attr+0x180/0x180 [ 272.026323][T28701] ? is_bpf_text_address+0xac/0x160 [ 272.026323][T28701] should_fail_alloc_page+0x50/0x60 [ 272.026323][T28701] __alloc_pages_nodemask+0x1a1/0x910 [ 272.026323][T28701] ? __alloc_pages_slowpath+0x2920/0x2920 [ 272.026323][T28701] ? __kasan_check_read+0x11/0x20 [ 272.026323][T28701] ? fault_create_debugfs_attr+0x180/0x180 [ 272.104002][T28701] cache_grow_begin+0x90/0xd00 [ 272.104002][T28701] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 272.104002][T28701] ? trace_hardirqs_off+0x62/0x240 [ 272.104002][T28701] __kmalloc+0x6b2/0x770 [ 272.104002][T28701] ? mark_held_locks+0xf0/0xf0 [ 272.104002][T28701] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 272.104002][T28701] tomoyo_realpath_from_path+0xcd/0x7b0 [ 272.104002][T28701] ? tomoyo_path_number_perm+0x193/0x520 [ 272.104002][T28701] tomoyo_path_number_perm+0x1dd/0x520 [ 272.104002][T28701] ? tomoyo_path_number_perm+0x193/0x520 [ 272.104002][T28701] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 272.104002][T28701] ? find_held_lock+0x35/0x130 [ 272.104002][T28701] ? putname+0xef/0x130 [ 272.104002][T28701] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 272.183946][T28701] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 272.183946][T28701] ? trace_hardirqs_on+0x67/0x240 [ 272.183946][T28701] ? kmem_cache_free+0x26b/0x320 [ 272.183946][T28701] tomoyo_path_mkdir+0xaa/0xf0 [ 272.183946][T28701] ? tomoyo_file_ioctl+0x30/0x30 [ 272.183946][T28701] ? kern_path_mountpoint+0x40/0x40 [ 272.183946][T28701] ? strncpy_from_user+0x2b4/0x400 [ 272.183946][T28701] security_path_mkdir+0x113/0x170 [ 272.183946][T28701] do_mkdirat+0x160/0x2a0 [ 272.183946][T28701] ? __ia32_sys_mknod+0xb0/0xb0 [ 272.183946][T28701] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 272.183946][T28701] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.183946][T28701] ? do_syscall_64+0x26/0x790 [ 272.183946][T28701] ? lockdep_hardirqs_on+0x421/0x5e0 [ 272.183946][T28701] __x64_sys_mkdir+0x5c/0x80 [ 272.183946][T28701] do_syscall_64+0xfa/0x790 [ 272.183946][T28701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.183946][T28701] RIP: 0033:0x459bd7 [ 272.183946][T28701] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.183946][T28701] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 272.183946][T28701] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 272.183946][T28701] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 272.183946][T28701] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 272.183946][T28701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 272.183946][T28701] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 10:03:51 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='is%9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x']) 10:03:51 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) 10:03:51 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:03:51 executing program 5: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x4206, r0) 10:03:51 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") 10:03:51 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='is\"9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=', @ANYRESDEC]) 10:03:51 executing program 5: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:03:51 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 10:03:51 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='unhide,map=off,session=0x', @ANYRESDEC]) 10:03:52 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") 10:03:52 executing program 5: clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x2) [ 272.629300][T28728] FAULT_INJECTION: forcing a failure. [ 272.629300][T28728] name failslab, interval 1, probability 0, space 0, times 0 [ 272.643427][T28728] CPU: 3 PID: 28728 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 272.652043][T28728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 272.652842][T28728] Call Trace: [ 272.652842][T28728] dump_stack+0x197/0x210 [ 272.652842][T28728] should_fail.cold+0xa/0x15 [ 272.652842][T28728] ? fault_create_debugfs_attr+0x180/0x180 [ 272.652842][T28728] __should_failslab+0x121/0x190 [ 272.652842][T28728] should_failslab+0x9/0x14 [ 272.652842][T28728] kmem_cache_alloc+0x47/0x710 [ 272.652842][T28728] ? __kasan_check_write+0x14/0x20 [ 272.674106][T28728] ? do_raw_write_lock+0x124/0x290 10:03:52 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, '\x03\x8a\xa1t\xe3\xc4\x94u\xb5m\x1b\x88\xa8\xa4u\b\x00\x81\x80', 0x60}]}, 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, '\x03\x8a\xa1t\xe3\xc4\x94u\xb5m\x1b\x88\xa8\xa4u\b\x00\x81\x80', 0x60}]}, 0xfdef) [ 272.674106][T28728] __es_insert_extent+0x2cc/0xf20 [ 272.674106][T28728] ext4_es_insert_extent+0x2d2/0xa70 [ 272.674106][T28728] ? ext4_es_scan_clu+0xe0/0xe0 [ 272.674106][T28728] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 272.674106][T28728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.674106][T28728] ? ext4_es_find_extent_range+0x131/0x660 [ 272.674106][T28728] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 272.674106][T28728] ? ext4_rereserve_cluster+0x240/0x240 [ 272.674106][T28728] ? ext4_find_extent+0x76e/0x9d0 [ 272.674106][T28728] ? ext4_find_extent+0x6a6/0x9d0 [ 272.674106][T28728] ext4_ext_map_blocks+0x1930/0x3ac0 [ 272.674106][T28728] ? ext4_ext_release+0x10/0x10 [ 272.674106][T28728] ? __kasan_check_write+0x14/0x20 [ 272.711666][T28728] ? down_read+0x109/0x430 [ 272.711666][T28728] ? down_read_killable+0x490/0x490 [ 272.711666][T28728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.711666][T28728] ? ext4_es_lookup_extent+0x426/0xd40 [ 272.711666][T28728] ext4_map_blocks+0xdc7/0x17e0 [ 272.711666][T28728] ? ext4_issue_zeroout+0x190/0x190 [ 272.711666][T28728] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 272.714158][T28728] ? __kasan_check_write+0x14/0x20 [ 272.731660][T28728] ext4_getblk+0xc4/0x570 [ 272.731660][T28728] ? ext4_iomap_begin+0x1000/0x1000 [ 272.731660][T28728] ext4_bread+0x8f/0x390 [ 272.731660][T28728] ? ext4_getblk+0x570/0x570 [ 272.731660][T28728] ext4_append+0x155/0x370 [ 272.731660][T28728] ext4_mkdir+0x632/0xe20 [ 272.731660][T28728] ? ext4_init_dot_dotdot+0x520/0x520 [ 272.731660][T28728] ? selinux_inode_mkdir+0x23/0x30 [ 272.731660][T28728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.731660][T28728] ? security_inode_mkdir+0xe4/0x120 [ 272.731660][T28728] vfs_mkdir+0x42e/0x670 [ 272.731660][T28728] do_mkdirat+0x234/0x2a0 [ 272.731660][T28728] ? __ia32_sys_mknod+0xb0/0xb0 [ 272.731660][T28728] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 272.731660][T28728] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.731660][T28728] ? do_syscall_64+0x26/0x790 [ 272.731660][T28728] ? lockdep_hardirqs_on+0x421/0x5e0 [ 272.731660][T28728] __x64_sys_mkdir+0x5c/0x80 [ 272.731660][T28728] do_syscall_64+0xfa/0x790 [ 272.731660][T28728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.731660][T28728] RIP: 0033:0x459bd7 [ 272.731660][T28728] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d bd fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.731660][T28728] RSP: 002b:00007f3014338a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 272.731660][T28728] RAX: ffffffffffffffda RBX: 00007f3014338b10 RCX: 0000000000459bd7 [ 272.731660][T28728] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 272.731660][T28728] RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a [ 272.731660][T28728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 272.731660][T28728] R13: 00000000004b2e08 R14: 00000000006f61e0 R15: 0000000000000003 [ 273.083909][ C1] hrtimer: interrupt took 23140 ns [ 395.673865][ C2] rcu: INFO: rcu_preempt self-detected stall on CPU [ 395.677439][ C2] rcu: 2-....: (1 GPs behind) idle=4fa/1/0x4000000000000004 softirq=34904/36117 fqs=5124 [ 395.681888][ C2] (t=10500 jiffies g=37381 q=785) [ 395.681888][ C2] NMI backtrace for cpu 2 [ 395.681888][ C2] CPU: 2 PID: 28749 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 395.681888][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 [ 395.681888][ C2] Call Trace: [ 395.681888][ C2] [ 395.681888][ C2] dump_stack+0x197/0x210 [ 395.681888][ C2] nmi_cpu_backtrace.cold+0x70/0xb2 [ 395.681888][ C2] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 395.681888][ C2] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 395.681888][ C2] arch_trigger_cpumask_backtrace+0x14/0x20 [ 395.681888][ C2] rcu_dump_cpu_stacks+0x183/0x1cf [ 395.681888][ C2] ? find_next_bit+0x107/0x130 [ 395.681888][ C2] rcu_sched_clock_irq.cold+0x509/0xc02 [ 395.681888][ C2] ? raise_softirq+0x138/0x340 [ 395.681888][ C2] update_process_times+0x2d/0x70 [ 395.681888][ C2] tick_sched_handle+0xa2/0x190 [ 395.681888][ C2] tick_sched_timer+0x53/0x140 [ 395.681888][ C2] __hrtimer_run_queues+0x364/0xe40 [ 395.681888][ C2] ? tick_sched_do_timer+0x1b0/0x1b0 [ 395.681888][ C2] ? hrtimer_init+0x330/0x330 [ 395.681888][ C2] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 395.681888][ C2] ? ktime_get_update_offsets_now+0x2ce/0x430 [ 395.681888][ C2] hrtimer_interrupt+0x314/0x770 [ 395.681888][ C2] smp_apic_timer_interrupt+0x160/0x610 [ 395.681888][ C2] apic_timer_interrupt+0xf/0x20 [ 395.681888][ C2] RIP: 0010:kmem_cache_alloc+0x283/0x710 [ 395.681888][ C2] Code: 7e 0f 85 dc fe ff ff e8 ec c8 4e ff e9 d2 fe ff ff e8 51 c9 c8 ff 48 83 3d a1 95 61 07 00 0f 84 51 03 00 00 48 8b 7d d0 57 9d <0f> 1f 44 00 00 e9 68 fe ff ff 31 d2 be 35 02 00 00 48 c7 c7 7e 56 [ 395.681888][ C2] RSP: 0018:ffff88802d709980 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 395.681888][ C2] RAX: 0000000000000007 RBX: 0000000000000a20 RCX: 0000000000000002 [ 395.681888][ C2] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000282 [ 395.681888][ C2] RBP: ffff88802d7099e8 R08: 1ffffffff15377b2 R09: fffffbfff15377b3 [ 395.681888][ C2] R10: fffffbfff15377b2 R11: ffffffff8a9bbd97 R12: ffff88802bfed1c0 [ 395.681888][ C2] R13: ffff88802bfed1c0 R14: 0000000000000a20 R15: ffff88802443b3c0 [ 395.681888][ C2] ? apic_timer_interrupt+0xa/0x20 [ 395.681888][ C2] ? lock_downgrade+0x920/0x920 [ 395.681888][ C2] dst_alloc+0x10e/0x200 [ 395.681888][ C2] ip6_dst_alloc+0x34/0xa0 [ 395.681888][ C2] icmp6_dst_alloc+0x69/0x4a0 [ 395.681888][ C2] ndisc_send_skb+0xfb7/0x1490 [ 395.681888][ C2] ? __phys_addr+0xa4/0x120 [ 395.681888][ C2] ? nf_hook.constprop.0+0x560/0x560 [ 395.681888][ C2] ? memcpy+0x46/0x50 [ 395.681888][ C2] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.681888][ C2] ndisc_send_rs+0x134/0x720 [ 395.681888][ C2] addrconf_rs_timer+0x30f/0x6e0 [ 395.681888][ C2] ? ipv6_get_lladdr+0x490/0x490 [ 395.681888][ C2] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 395.681888][ C2] call_timer_fn+0x1ac/0x780 [ 395.681888][ C2] ? ipv6_get_lladdr+0x490/0x490 [ 395.681888][ C2] ? msleep_interruptible+0x150/0x150 [ 395.681888][ C2] ? run_timer_softirq+0x6b1/0x1790 [ 395.681888][ C2] ? trace_hardirqs_on+0x67/0x240 [ 395.681888][ C2] ? ipv6_get_lladdr+0x490/0x490 [ 395.681888][ C2] ? ipv6_get_lladdr+0x490/0x490 [ 395.681888][ C2] run_timer_softirq+0x6c3/0x1790 [ 395.681888][ C2] ? add_timer+0x930/0x930 [ 395.681888][ C2] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 395.681888][ C2] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 395.681888][ C2] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 395.681888][ C2] __do_softirq+0x262/0x98c [ 395.681888][ C2] ? sched_clock_cpu+0x14e/0x1b0 [ 395.681888][ C2] irq_exit+0x19b/0x1e0 [ 395.681888][ C2] smp_apic_timer_interrupt+0x1a3/0x610 [ 395.681888][ C2] apic_timer_interrupt+0xf/0x20 [ 395.681888][ C2] [ 395.681888][ C2] RIP: 0010:_raw_spin_unlock_irq+0x4f/0x80 [ 395.681888][ C2] Code: c0 68 34 13 89 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 12 6a 96 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 e7 ab d3 f9 65 8b 05 18 54 85 78 85 c0 74 06 41 [ 395.681888][ C2] RSP: 0018:ffff8880686bf8d8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 395.681888][ C2] RAX: 1ffffffff122668d RBX: ffff88802795c500 RCX: 0000000000000006 [ 395.681888][ C2] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88802795cd94 [ 395.681888][ C2] RBP: ffff8880686bf8e0 R08: 1ffffffff15377c3 R09: fffffbfff15377c4 [ 395.681888][ C2] R10: fffffbfff15377c3 R11: ffffffff8a9bbe1f R12: ffff88802d737380 [ 395.681888][ C2] R13: ffff88802a559840 R14: ffff88802bd5e500 R15: 0000000000000402 [ 395.681888][ C2] ? _raw_spin_unlock_irq+0x23/0x80 [ 395.681888][ C2] finish_task_switch+0x147/0x750 [ 395.681888][ C2] ? finish_task_switch+0x119/0x750 [ 395.681888][ C2] __schedule+0x8e9/0x1f30 [ 395.681888][ C2] ? __sched_text_start+0x8/0x8 [ 395.681888][ C2] ? __this_cpu_preempt_check+0x35/0x190 [ 395.681888][ C2] ? retint_kernel+0x2b/0x2b [ 395.681888][ C2] ? perf_duration_warn+0x40/0x40 [ 395.681888][ C2] ? preempt_schedule+0x4b/0x60 [ 395.681888][ C2] preempt_schedule_common+0x4f/0xe0 [ 395.681888][ C2] ? __perf_event_enable+0x930/0x930 [ 395.681888][ C2] preempt_schedule+0x4b/0x60 [ 395.681888][ C2] ___preempt_schedule+0x16/0x18 [ 395.681888][ C2] ? smp_call_function_single+0x40b/0x480 [ 395.681888][ C2] smp_call_function_single+0x410/0x480 [ 395.681888][ C2] ? perf_duration_warn+0x40/0x40 [ 395.681888][ C2] ? generic_exec_single+0x4c0/0x4c0 [ 395.681888][ C2] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 395.681888][ C2] ? __perf_event_enable+0x930/0x930 [ 395.681888][ C2] task_function_call+0xe9/0x180 [ 395.681888][ C2] ? perf_event_addr_filters_exec+0x310/0x310 [ 395.681888][ C2] ? __do_sys_perf_event_open+0x174c/0x2c70 [ 395.681888][ C2] ? __perf_event_enable+0x930/0x930 [ 395.681888][ C2] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.681888][ C2] ? exclusive_event_installable+0x257/0x320 [ 395.681888][ C2] perf_install_in_context+0x308/0x5a0 [ 395.681888][ C2] ? list_add_event+0xed0/0xed0 [ 395.681888][ C2] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.681888][ C2] ? __perf_event_header_size.isra.0+0x166/0x1c0 [ 395.681888][ C2] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.681888][ C2] __do_sys_perf_event_open+0x1cbc/0x2c70 [ 395.681888][ C2] ? perf_event_set_output+0x4e0/0x4e0 [ 395.681888][ C2] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.681888][ C2] ? put_timespec64+0xda/0x140 [ 395.681888][ C2] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 395.681888][ C2] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 395.681888][ C2] ? do_syscall_64+0x26/0x790 [ 395.681888][ C2] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.681888][ C2] ? do_syscall_64+0x26/0x790 [ 395.681888][ C2] __x64_sys_perf_event_open+0xbe/0x150 [ 395.681888][ C2] do_syscall_64+0xfa/0x790 [ 395.681888][ C2] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.681888][ C2] RIP: 0033:0x45a759 [ 395.681888][ C2] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.681888][ C2] RSP: 002b:00007f27e8b41c88 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 395.681888][ C2] RAX: ffffffffffffffda RBX: 000000000071bf00 RCX: 000000000045a759 [ 395.681888][ C2] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000180 [ 395.681888][ C2] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000 [ 395.681888][ C2] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f27e8b426d4 [ 395.681888][ C2] R13: 00000000004aec17 R14: 00000000006f1cb0 R15: 00000000ffffffff